PT-2025-25651 · Citrix · Citrix Netscaler Adc +1
Jdoe
+1
·
Published
2025-06-17
·
Updated
2026-01-22
·
CVE-2025-5777
CVSS v2.0
10
10
Critical
| Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
Citrix NetScaler ADC and NetScaler Gateway versions prior to 14.1-43.56 and 13.1-58.32
Description
This is a critical vulnerability (CVE-2025-5777), also known as CitrixBleed 2, that allows for memory leakage in Citrix NetScaler ADC and Gateway appliances. The vulnerability stems from insufficient input validation, specifically when processing POST requests with a missing value for the
login parameter. This allows unauthenticated attackers to read sensitive data from the system's memory, including session tokens, potentially leading to session hijacking and unauthorized access. Active exploitation of this vulnerability has been observed, with attackers targeting systems globally. Multiple public exploits and detection signatures are available. Some reports indicate exploitation began before public disclosure. Over 11.5 million attack attempts and over 120,000 exposed systems have been reported. CISA has added this vulnerability to its KEV catalog, mandating federal agencies to patch within 24 hours. Several organizations, including the Pennsylvania Attorney General's office, have been impacted by attacks exploiting this flaw.Recommendations
Apply the latest security updates for Citrix NetScaler ADC and NetScaler Gateway, specifically versions 14.1-43.56 or later, and 13.1-58.32 or later. Terminate all active sessions after patching to prevent the use of potentially compromised session tokens. Rotate any sensitive credentials, such as SSO and LDAP credentials, as a precautionary measure.
Exploit
Fix
DoS
RCE
Use of Uninitialized Resource
Out of bounds Read
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Related Identifiers
BDU:2025-07142
CVE-2025-5777
Affected Products
Citrix Netscaler Adc
Citrix Netscaler Gateway
References · 590
- 🔥 https://github.com/win3zz/CVE-2025-5777⭐ 9 · Exploit
- 🔥 https://github.com/soltanali0/CVE-2025-5777-Exploit⭐ 1 🔗 1 · Exploit
- https://nvd.nist.gov/vuln/detail/CVE-2025-5777 · Security Note
- https://bdu.fstec.ru/vul/2025-07142 · Security Note
- https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX693420 · Vendor Advisory, Security Note
- https://twitter.com/transilienceai/status/1950437985381421243 · Twitter Post
- https://twitter.com/dCypherIO/status/1942561811473051703 · Twitter Post
- https://twitter.com/transilienceai/status/1946458230575497390 · Twitter Post
- https://twitter.com/DecodeWithVarad/status/2006988244785967106 · Twitter Post
- https://twitter.com/tbbhunter/status/1956646262066835706 · Twitter Post
- https://twitter.com/ZeroDayFacts/status/1939865011394068757 · Twitter Post
- https://twitter.com/miguelcarvajalm/status/1944820765444002243 · Twitter Post
- https://twitter.com/ScyScan/status/1939676573034258487 · Twitter Post
- https://twitter.com/transilienceai/status/1939479779373093372 · Twitter Post
- https://twitter.com/transilienceai/status/1945142712392614144 · Twitter Post