Article Details
Scrape Timestamp (UTC): 2025-07-02 16:23:29.599
Original Article Text
Click to Toggle View
Citrix warns of login issues after NetScaler auth bypass patch. Citrix warns that patching recently disclosed vulnerabilities that can be exploited to bypass authentication and launch denial-of-service attacks may also break login pages on NetScaler ADC and Gateway appliances. This happens because starting with NetScaler 14.1.47.46 and 13.1.59.19, the Content Security Policy (CSP) header, which mitigates risks associated with cross-site scripting (XSS), code injection, and other client-side attacks, is enabled by default. However, while it is designed to block unauthorized scripts and external content from executing in the browser, the policy also inadvertently restricts legitimate scripts or resources loaded by DUO configuration based on Radius authentication, integrations, custom SAML setups, or other IDP configurations not compliant with the strict CSP rules. "There's an issue related to authentication that you may observe after upgrading NetScaler to build 14.1 47.46 or 13.1 59.19," the company explains in an advisory that's also warning admins to immediately patch their appliances against two security critical vulnerabilities. "This can manifest as a 'broken' login page, especially when using authentication methods like DUO configurations based on Radius authentication, SAML, or any Identity Provider (IDP) that relies on custom scripts. This behavior can be attributed to the Content Security Policy (CSP) header being enabled by default in this NetScaler build, especially when CSP was not enabled prior to the upgrade." The first of the two security flaws (tracked as CVE-2025-5777 and dubbed Citrix Bleed 2) enables threat actors to bypass authentication by hijacking user sessions, while the second (CVE-2025-6543) is now actively exploited in denial-of-service attacks. To temporarily address this known issue, Citrix recommends that administrators disable the default CSP header on affected NetScaler appliances (via the user interface or command line) and clear the cache to ensure that the changes take effect immediately. After disabling the CSP header, admins are also advised to access the NetScaler Gateway authentication portal to check if the issue is resolved. "If the issue persists after following these steps, please reach out to Citrix Support for further assistance. Provide them with details of your configuration and the steps you have already taken," the company adds in a separate advisory issued on Monday. "Please reach out to the support team so that we can identify the issue with CSP and fix it for your configuration." 8 Common Threats in 2025 While cloud attacks may be growing more sophisticated, attackers still succeed with surprisingly simple techniques. Drawing from Wiz's detections across thousands of organizations, this report reveals 8 key techniques used by cloud-fluent threat actors.
Daily Brief Summary
Citrix has issued warnings about potential login disruptions on NetScaler ADC and Gateway appliances following patches for severe security vulnerabilities.
Patching the vulnerabilities, which could lead to authentication bypass and denial-of-service attacks, triggers issues due to the newly default-enabled Content Security Policy (CSP).
The implemented CSP is intended to mitigate risks like cross-site scripting and code injections but inadvertently blocks legitimate scripts required for authentication methods like DUO, SAML, or other IDP configurations.
The disruptions manifest as broken login pages, particularly under configurations relying on custom scripts not compliant with the strict CSP rules.
Two critical vulnerabilities identified, CVE-2025-5777 ("Citrix Bleed 2") and CVE-2025-6543, are addressed by the patches; the latter is actively exploited in DoS attacks.
Citrix recommends that administrators disable the CSP temporarily and clear the cache to resolve the login issues while further solutions are developed.
Citrix offers further assistance through their support team for unresolved issues post-CSP adjustment.