Particle.news

Download on the App Store

CISA Confirms Active CitrixBleed 2 Exploitation and Mandates One-Day Patch

It follows proof-of-concept exploits fueling surging scans that left federal networks vulnerable to session hijacks

Image
Image

Overview

  • The agency added CVE-2025-5777 to its Known Exploited Vulnerabilities catalog after confirming real-world abuse of Citrix NetScaler ADC and Gateway devices.
  • Federal entities have 24 hours to install the June 17 Citrix update and terminate active sessions that may already be compromised.
  • Citrix issued fixes on June 17 but has declined to address reports of in-the-wild attacks or estimate the number of affected systems.
  • Researchers from watchTowr and Horizon3 published proof-of-concept exploits and Akamai noted a sharp increase in scanner traffic targeting CitrixBleed 2 since late June.
  • The critical out-of-bounds memory-read flaw allows unauthenticated actors to steal session tokens, bypass MFA and hijack sessions, though the full impact remains unclear.