Original Article Text

Click to Toggle View

Over 1,200 Citrix servers unpatched against critical auth bypass flaw. Over 1,200 Citrix NetScaler ADC and NetScaler Gateway appliances exposed online are unpatched against a critical vulnerability believed to be actively exploited, allowing threat actors to bypass authentication by hijacking user sessions. Tracked as CVE-2025-5777 and referred to as Citrix Bleed 2, this out-of-bounds memory read vulnerability results from insufficient input validation, enabling unauthenticated attackers to access restricted memory regions. A similar Citrix security flaw, dubbed "CitrixBleed," was exploited in ransomware attacks and breaches targeting governments in 2023 to hack NetScaler devices and move laterally across compromised networks. Successfully exploiting CVE-2025-5777 could allow threat actors to steal session tokens, credentials, and other sensitive data from public-facing gateways and virtual servers, enabling them to hijack user sessions and bypass multi-factor authentication (MFA). In a June 17 advisory, Citrix warned customers to terminate all active ICA and PCoIP sessions after upgrading all their NetScaler appliances to a patched version to block potential attacks. On Monday, security analysts from the internet security nonprofit Shadowserver Foundation have discovered over the weekend that 2,100 appliances were still vulnerable to CVE-2025-5777 attacks. While Citrix has yet to confirm that this security flaw is being exploited in the wild, saying that "currently, there is no evidence to suggest exploitation of CVE-2025-5777," cybersecurity firm ReliaQuest reported on Thursday with medium confidence that the vulnerability is already being abused in targeted attacks. "While no public exploitation of CVE-2025-5777, dubbed 'Citrix Bleed 2,' has been reported, ReliaQuest assesses with medium confidence that attackers are actively exploiting this vulnerability to gain initial access to targeted environments," ReliaQuest warned. ReliaQuest identified indicators suggesting post-exploitation activity following unauthorized Citrix access, including a hijacked Citrix web session indicating a successful MFA bypass attempt, session reuse across multiple IP addresses (including suspicious ones), and LDAP queries linked to Active Directory reconnaissance activities. Shadowserver also found over 2,100 NetScaler appliances unpatched against another critical vulnerability (CVE-2025-6543), which is now being exploited in denial-of-service (DoS) attacks. With both flaws being tagged as critical severity vulnerabilities, administrators are advised to deploy the latest patches from Citrix as soon as possible. Companies should also review their access controls and monitor Citrix NetScaler appliances for suspicious user sessions and activity. Why IT teams are ditching manual patch management Patching used to mean complex scripts, long hours, and endless fire drills. Not anymore. In this new guide, Tines breaks down how modern IT orgs are leveling up with automation. Patch faster, reduce overhead, and focus on strategic work -- no complex scripts required.

Daily Brief Summary

CYBERCRIME // Over 1,200 Citrix Servers Exposed to Authentication Bypass Flaw

Over 1,200 Citrix NetScaler ADC and Gateway appliances are vulnerable to a critical security flaw, CVE-2025-5777, named Citrix Bleed 2.

This vulnerability allows threat actors to bypass authentication, hijack user sessions, steal session tokens, credentials, and access sensitive data by exploiting an out-of-bounds memory read issue.

CitrixBleed vulnerability previously exploited in ransomware attacks and data breaches against governments in 2023 has similarities in how it targeted NetScaler devices.

Citrix issued a security advisory urging customers to patch affected systems and terminate all active sessions to mitigate risks.

According to the Shadowserver Foundation, over 2,100 appliances were still unpatched as of their recent analysis.

ReliaQuest reported with medium confidence that this vulnerability is being actively exploited in targeted attacks, indicating post-exploitation activities like MFA bypass and suspicious session activities.

Shadowserver also reported a separate vulnerability, CVE-2025-6543, affecting over 2,100 appliances and exploited in denial-of-service attacks.

Citrix and cybersecurity firms urge the immediate application of patches and enhanced monitoring of NetScaler appliances to safeguard against potential exploits.