Overview
- The Netherlands National Cyber Security Centre confirmed that CVE-2025-6543 was exploited as a zero-day from early May to breach multiple critical organizations and that attackers actively removed forensic evidence.
- Investigators discovered malicious web shells on compromised Citrix NetScaler appliances, indicating that threat actors maintain persistent remote access.
- Security groups report thousands of NetScaler devices remain unpatched against CVE-2025-6543 and the related CitrixBleed 2 flaw (CVE-2025-5777), leaving high-value internet-facing gateways exposed.
- The U.S. Cybersecurity and Infrastructure Security Agency added both CVE-2025-6543 and CVE-2025-5777 to its Known Exploited Vulnerabilities catalog, heightening compliance requirements for federal entities.
- NCSC-NL and Citrix advise organizations to apply updates, terminate active sessions, run IOC-hunting scripts and engage incident response teams to eliminate existing compromises as investigations continue.