Article Details
Scrape Timestamp (UTC): 2025-07-08 05:13:09.516
Source: https://thehackernews.com/2025/07/cisa-adds-four-critical-vulnerabilities.html
Original Article Text
Click to Toggle View
CISA Adds Four Critical Vulnerabilities to KEV Catalog Due to Active Exploitation. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added four security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The list of flaws is as follows - There are currently no public reports on how the first three vulnerabilities are being exploited in real-world attacks. The abuse of CVE-2019-9621, on the other hand, was attributed by Trend Micro to a China-linked threat actor known as Earth Lusca in September 2023 to drop web shells and Cobalt Strike. In light of active exploitation, Federal Civilian Executive Branch (FCEB) agencies are recommended to apply the necessary updates by July 28, 2025, to secure their networks. Technical Details of Citrix Bleed 2 Out The development comes as watchTowr Labs and Horizon3.ai have released technical analyses for a critical security flaw in Citrix NetScaler ADC (CVE-2025-5777 aka Citrix Bleed 2), which is assessed to have come under active exploitation. "We're seeing active exploitation of both CVE-2025-5777 and CVE-2025-6543 in the wild," watchTowr CEO Benjamin Harris told The Hacker News. "This vulnerability allows reading of memory, which we believe attackers are using to read sensitive information (for example, information sent within HTTP requests that are then processed in-memory), credentials, valid Citrix session tokens, and more." The findings show that it's possible to send a login request to the "/p/u/doAuthentication.do" endpoint and cause it (and other endpoints susceptible to the flaw) to reflect the user-supplied login value in the response, regardless of success or failure. Horizon3.ai noted that the vulnerability could be used to leak approximately 127 bytes of data via a specially crafted HTTP request with a modified "login=" without an equal sign or value, thereby making it possible to extract session tokens or other sensitive information. The shortcoming, watchTowr explained, stems from the use of the snprintf function along with a format string containing the "%.*s" format. "The %.*s format tells snprintf: 'Print up to N characters, or stop at the first null byte (\\0) - whichever comes first.' That null byte eventually appears somewhere in memory, so while the leak doesn't run indefinitely, you still get a handful of bytes with each invocation," the company said. "So, every time you hit that endpoint without the =, you pull more uninitialized stack data into the response. Repeat it enough times, and eventually, you might land on something valuable."
Daily Brief Summary
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently updated its Known Exploited Vulnerabilities (KEV) catalog, adding four critical security flaws.
These updates were prompted by actual incidents of exploitation by cybercriminals, particularly highlighting a vulnerability linked to a China-associated threat actor, Earth Lusca, using CVE-2019-9621 to install web shells and Cobalt Strike.
New technical disclosures reveal significant issues in the Citrix NetScaler ADC system, specifically CVE-2025-5777, known as Citrix Bleed 2, which has also been actively exploited.
Hackers exploit these Citrix vulnerabilities to steal sensitive data such as credentials and session tokens by manipulating memory read functions in the server.
Federal Civilian Executive Branch (FCEB) agencies are urged to rectify these vulnerabilities by July 28, 2025, to mitigate potential security risks.
Technical insights provided by watchTowr and Horizon3.ai indicate that attackers are compromising endpoints by crafting malicious HTTP requests aimed at data exfiltration.