Article Details

Scrape Timestamp (UTC): 2025-06-25 21:12:29.016

Source: https://www.theregister.com/2025/06/25/citrix_netscaler_critical_bug_exploited/

Original Article Text

Click to Toggle View

Citrix bleeds again: This time a zero-day exploited - patch now. Two emergency patches issued in two weeks. Hot on the heels of patching a critical bug in Citrix-owned Netscaler ADC and NetScaler Gateway that one security researcher dubbed "CitrixBleed 2," the embattled networking device vendor today issued an emergency patch for yet another super-serious flaw in the same products — but not before criminals found and exploited it as a zero-day. This new critical vulnerability, tracked as CVE-2025-6543, received a 9.2 severity score. It's a memory overflow vulnerability that can lead to unintended control flow and denial of service when the affected security appliances are configured as a gateway virtual server or an authentication, authorization, and accounting (AAA) virtual server. It affects: And, according to the vendor, miscreants exploited CVE-2025-6543 as a zero-day vulnerability before Citrix fixed the flaw.  "Exploits of CVE-2025-6543 on unmitigated appliances have been observed," according to a security bulletin. Citrix did not respond to The Register's inquiries about the flaw, including how many devices have been compromised and what the intruders have done with their illicit access. According to watchTowr CEO Benjamin Harris, however, the 9.2 critical CVSS rating and the fact that it was exploited as a zero-day indicate that the miscreants abusing this hole are doing more than just denial-of-service (DoS) attacks. "The CVSS metrics reflect code execution or similar, not DoS as the most impactful outcome," Harris told The Register. "Vulnerable appliances being observed to enter a 'denial of service condition' likely reflects failed exploitation, given the class of vulnerability being discussed here. "As watchTowr has seen with other in-the-wild exploited vulnerabilities recently, the reality is, unfortunately, miserable," he added. "Devices vulnerable right now may already be backdoored, and patching has not typically removed backdoors. We've seen this exact behavior with SAP NetWeaver, Ivanti's EPMM, Fortinet Fortigate appliances and more." Citrix also has yet to respond to The Register's questions about the earlier critical vulnerability, CVE-2025-5777, which affects the same products and can be exploited remotely and without any authentication. This earlier vuln could let an attacker read session tokens or other sensitive information in memory from NetScaler devices that are configured as a gateway or AAA virtual server, along the lines of what we saw with CitrixBleed back in 2023. To prevent exploitation of CVE-2025-5777, organizations must not only upgrade their NetScaler software, but also terminate all active ICA and PCoIP sessions after upgrading. Mandiant Consulting Chief Technology Officer Charles Carmakal pointed this out in a LinkedIn post urging Citrix customers to patch both vulnerabilities "immediately." "Many organizations did not terminate sessions when remediating a similar vulnerability in 2023 (CVE-2023-4966 aka 'Citrix Bleed')," Carmakal said. "In those cases, session secrets were stolen before companies patched, and the sessions were hijacked after the patch. Many of those compromises resulted in nation-state espionage or ransomware deployment." While we don't have any indication that the earlier CVE-2025-5777 is under active exploitation, as Harris told The Register yesterday: "In-the-wild exploitation will happen at some point, and organizations should be dealing with this as an IT incident — exploitation is not a matter of if, but when."

Daily Brief Summary

CYBERCRIME // Citrix Issues Urgent Patches for Two Critical Vulnerabilities

Citrix released emergency patches for two critical vulnerabilities affecting NetScaler ADC and Gateway products, with one already exploited as a zero-day.

The new vulnerability, tracked as CVE-2025-6543, features a 9.2 severity score and allows for unintended control flow and potential denial of service.

CVE-2025-6543 exploitation led to unauthorized access before Citrix could distribute fixes, indicating attacks beyond simple denial-of-service outcomes.

Security experts observed that patching might not remove potential backdoors installed during the exploitation period, posing ongoing risks.

The earlier vulnerability, CVE-2025-5777, also critical, could permit attackers to read session tokens or sensitive data without authentication.

Charles Carmakal from Mandiant Consulting emphasized the necessity of not only patching but also terminating active sessions to fully mitigate risks, learning from past exploitations leading to espionage or ransomware deployment.

Citrix has been slow to respond to inquiries about the specifics of the exploits and the extent of the breaches or the measures needed beyond patching.