Article Details

Original Article Text

Click to Toggle View

Critical Citrix Bleed 2 flaw now likely exploited in attacks. A critical NetScaler ADC and Gateway vulnerability dubbed "Citrix Bleed 2" (CVE-2025-5777) is now likely exploited in attacks, according to cybersecurity firm ReliaQuest, seeing an increase in suspicious sessions on Citrix devices. Citrix Bleed 2, named by cybersecurity researcher Kevin Beaumont due to its similarity to the original Citrix Bleed (CVE-2023-4966), is an out-of-bounds memory read vulnerability that allows unauthenticated attackers to access portions of memory that should typically be inaccessible. This could allow attackers to steal session tokens, credentials, and other sensitive data from public-facing gateways and virtual servers, enabling them to hijack user sessions and bypass multi-factor authentication (MFA). Citrix's advisor also confirms this risk, warning users to end all ICA and PCoIP sessions after installing security updates to block access to any hijacked sessions. The flaw, tracked as CVE-2025-5777, was addressed by Citrix on June 17, 2025, with no reports of active exploitation. However, Beaumont warned about the high likelihood of exploitation earlier this week. The researcher's worries now seem justified, as ReliaQuest says with medium confidence that CVE-2025-5777 is already being leveraged in targeted attacks. "While no public exploitation of CVE-2025-5777, dubbed "Citrix Bleed 2," has been reported, ReliaQuest assesses with medium confidence that attackers are actively exploiting this vulnerability to gain initial access to targeted environments," warns ReliaQuest. This conclusion is based on the following observations from actual attacks seen recently: The above is consistent with post-exploitation activity following unauthorized Citrix access, reinforcing the assessment that CVE-2025-5777 is being exploited in the wild. To protect against this activity, potentially impacted users should upgrade to versions 14.1-43.56+, 13.1-58.32+, or 13.1-FIPS/NDcPP 13.1-37.235+ to remediate the vulnerability. After installing the latest firmware, admins should terminate all active ICA and PCoIP sessions, as they may have already been hijacked. Before killing active sessions, admins should first review them for suspicious activity using the show icaconnection command and  NetScaler Gateway > PCoIP > Connections. After reviewing the active sessions, admins can then terminate them using these commands: If the immediate installation of security updates is impossible, it is recommended that external access to NetScaler be limited via network ACLs or firewall rules. BleepingComputer contacted Citrix multiple times about the exploitation status of CVE-2025-5777 but has not received any replies. Why IT teams are ditching manual patch management Patching used to mean complex scripts, long hours, and endless fire drills. Not anymore. In this new guide, Tines breaks down how modern IT orgs are leveling up with automation. Patch faster, reduce overhead, and focus on strategic work -- no complex scripts required.

Daily Brief Summary

CYBERCRIME // Critical Citrix Bleed 2 Vulnerability Likely Exploited in Recent Attacks

ReliaQuest has observed an increase in suspicious activity indicating potential exploitation of the Citrix Bleed 2 vulnerability (CVE-2025-5777).

This vulnerability involves an out-of-bounds memory read, allowing unauthenticated attackers to steal session tokens and credentials, effectively hijacking user sessions and bypassing multi-factor authentication.

Citrix addressed the vulnerability with a security update on June 17, 2025, but recent signs suggest that attackers are actively exploiting it.

Beaumont initially named and highlighted the similarity of CVE-2025-5777 to a previous vulnerability, emphasizing the high risk of exploitation.

Citrix recommends terminating all active ICA and PCoIP sessions after applying the security updates to prevent misuse of possibly hijacked sessions.

Administrators should monitor and review active sessions for any unusual activity before terminating them to ensure security.

In cases where immediate update installation is not feasible, it is advised to limit external access to the vulnerable Citrix devices through network ACLs or firewall rules.