Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

Latest Citrix vulnerability could be every bit as bad as Citrix Bleed | Computer Weekly

By Computer Weekly by By Computer Weekly
June 25, 2025
Home Uncategorized
Share on FacebookShare on Twitter


Cyber security experts are urging operators of Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway appliances to get in front of a new vulnerability – quietly patched last week – that it is now believed could lead to a repeat of the infamous Citrix Bleed incident.

Tracked as CVE-2025-5777, the flaw arises from insufficient input validation, resulting in memory overread in various NetScaler configurations. Ultimately, its effect is to enable a threat actor to steal a valid session token from memory by inputting malicious requests, which means that they can get around authentication measures.

It affects multiple customer-managed versions of both ADC and Gateway, including two that have now entered end-of-life.

At the same time, Citrix patched CVE-2025-5349, which arises from improper access controls on the NetScaler management interface.

“Cloud Software Group strongly urges affected customers of NetScaler ADC and NetScaler Gateway to install the relevant updated versions as soon as possible,” Citrix said in a 17 June security bulletin addressing the issues.

Citrix additionally recommends terminating active ICA and PCoIP sessions after all NetScaler appliances are upgraded. Its bulletin provides specific commands to do this.

If it bleeds, it leads

The similarities between CVE-2025-5777 and Citrix Bleed, CVE-2023-4966 are quite striking. Citrix Bleed was an information disclosure flaw that also enabled attackers to take control of authenticated sessions and bypass authentication methods, including multifactor authentication (MFA), which rendered it particularly dangerous.

First addressed in October 2023 – although it was exploited in the wild well before that – multiple ransomware gangs piled on in the wake of Citrix Bleed, notably LockBit which was still active at the time, and used it against Boeing. It swiftly became one of the most exploited vulnerabilities in the world, and was still being taken advantage of to great effect a year later.

At the time of writing, no evidence has emerged to suggest that anybody is taking advantage of CVE-2025-5777 in similar fashion, but writing on his blog, cyber analyst Kevin Beaumont described it as Citrix Bleed 2: Electric Boogaloo, and warned that since there is not yet any detection guidance, organisations that don’t wish to become case studies should patch immediately.

Benjamin Harris, CEO and founder of attack surface management specialist watchTowr, said it was likely that CVE-2025-577 was shaping up to be every bit as serious as Citrix Bleed.

In emailed comments, he noted that the details surrounding the new flaw had “quietly shifted” since its first disclosure, with a number of “fairly important” prerequisites or limitations being removed from the National Vulnerability Database (NVD) CVE description in the past few days.

“Specifically, the comment that this vulnerability was in the lesser-exposed management interface has now been removed – leading us to believe that this vulnerability is significantly more painful than perhaps first signalled,” said Harris.

“This vulnerability checks all the boxes for inevitable attacker interest. In the wild exploitation will happen at some point, and organisations should be dealing with this as an IT incident. Patch now – this vulnerability is likely to be in your KEV feeds soon.”



Source link

By Computer Weekly

By Computer Weekly

Next Post
Pia Appoints New CEO To Lead Next Phase of Growth: Exclusive

Pia Appoints New CEO To Lead Next Phase of Growth: Exclusive

Recommended.

vivo X200 FE Arrives: the All-Round Flagship Designed for Gen Z

vivo X200 FE Arrives: the All-Round Flagship Designed for Gen Z

June 26, 2025
Stocks making the biggest moves midday: Petco Health, Tesla, Circle, Lululemon and more

Stocks making the biggest moves midday: Petco Health, Tesla, Circle, Lululemon and more

June 6, 2025

Trending.

⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More

⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More

October 6, 2025
Cloud Computing on the Rise: Market Projected to Reach .6 Trillion by 2030

Cloud Computing on the Rise: Market Projected to Reach $1.6 Trillion by 2030

August 1, 2025
Stocks making the biggest moves midday: Autodesk, PayPal, Rivian, Nebius, Waters and more

Stocks making the biggest moves midday: Autodesk, PayPal, Rivian, Nebius, Waters and more

July 14, 2025
The Ultimate MSP Guide to Structuring and Selling vCISO Services

The Ultimate MSP Guide to Structuring and Selling vCISO Services

February 19, 2025
Translators’ Voices: China shares technological achievements with the world for mutual benefit

Translators’ Voices: China shares technological achievements with the world for mutual benefit

June 3, 2025

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio