Arctic Wolf Security Bulletin
Arctic Wolf Security Bulletin

Follow-Up: Updates on Actively Exploited Information Disclosure Vulnerability “Citrix Bleed 2” in Citrix NetScaler ADC and Gateway

In late June 2025, Arctic Wolf issued a security bulletin addressing a critical out-of-bounds read vulnerability in Citrix NetScaler ADC and Gateway that Citrix disclosed, tracked as CVE-2025-5777.
Arctic Wolf Security Bulletin
6 min read

Updates Since Previous Bulletin

  • Technical details and proof-of-concept (PoC) exploit code were publicly released by watchTowr and Horizon3 in early July.
  • CVE-2025-5777 was added to CISA’s Known Exploited Vulnerabilities Catalog on July 10. However, GreyNoise reports that exploitation occurred as early as two weeks before proof-of-concept exploit code was publicly available.
  • Arctic Wolf has observed ongoing suspected exploitation attempts of CVE-2025-5777 beginning shortly after PoC exploit code was published
  • Imperva has also reported observing 11.5 million exploitation attempts, with 40% targeting the financial services industry.
  • According to security researcher Kevin Beaumont, the original commands provided by Citrix to clear ICA and PCoIP connections are insufficient to fully mitigate the vulnerability on compromised systems.
  • RDP, AAA, and Load Balancing (LB) persistent sessions should also be terminated, as the original commands do not account for all session cookies leaked by CVE-2025-5777. This expanded guidance aligns with recommendations for the original Citrix Bleed vulnerability (CVE-2023-4966).

Summary

In late June 2025, Arctic Wolf issued a security bulletin addressing a critical out-of-bounds read vulnerability in Citrix NetScaler ADC and Gateway that Citrix disclosed, tracked as CVE-2025-5777. This vulnerability affects NetScaler devices configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server.

Although there were initial inconsistencies between the NIST National Vulnerability Database (NVD) and the Citrix Advisory, Citrix has since clarified that the NVD’s description—specifically regarding the vulnerability impacting the NetScaler Management Interface—was inaccurate, and confirmed that their advisory provides the most accurate information.

Due to its close similarity to Citrix Bleed (CVE-2023-4966), a critical information disclosure vulnerability disclosed in 2023, this vulnerability has been labeled “Citrix Bleed 2” in open-source reports. With exploitation confirmed in the wild and proof-of-concept exploit code now publicly available, CVE-2025-5777 is very likely to further attract increased threat actor attention.

Arctic Wolf has assessed our own environment for impact from this vulnerability and has determined that we are not affected.

Recommendations

Upgrade to Latest Fixed Version

Arctic Wolf strongly recommends that customers upgrade to the latest fixed version to mitigate CVE-2025-5777.

 

Product Affected Version Fixed Version
NetScaler Gateway
  • 14.1 before 14.1-43.56
  • 13.1 before 13.1-58.32
  • 14.1-43.56 and later releases
  • 13.1-58.32 and later releases
NetScaler ADC
  • 14.1 before 14.1-43.56
  • 13.1 before 13.1-58.32
  • 13.1-FIPS and NDcPP before 13.1-37.235-FIPS and NDcPP
  • 12.1-FIPS before 12.1-55.328-FIPS
  • 14.1-43.56 and later releases
  • 13.1-58.32 and later releases
  • 13.1-FIPS and 13.1-NDcPP 13.1-37.235 and later releases
  • 12.1-FIPS 12.1-55.328 and later releases

Please follow your organisation’s patching and testing guidelines to minimise potential operational impact.

Note:

  • NetScaler ADC and NetScaler Gateway versions 12.1 and 13.0 are now End Of Life (EOL) and are vulnerable. Additionally, Secure Private Access on-prem or Secure Private Access Hybrid deployments using NetScaler instances are also affected by the vulnerabilities.
  • Citrix has stated that only customer-managed NetScaler ADC and NetScaler Gateways are affected by the vulnerabilities. Cloud Software Group updates the Citrix-managed cloud services and Citrix-managed Adaptive Authentication to fixed versions.

Terminate ICA, PCoIP, RDP, AAA, and LB Persistent Sessions

In addition to Citrix’s recommendation to terminate all active ICA and PCoIP sessions, Arctic Wolf advises running additional commands to terminate RDP, AAA, and Load Balancing (LB) persistent sessions once all NetScaler appliances in the HA pair or cluster have been upgraded to the fixed builds. This expanded guidance aligns with recommendations for the original Citrix Bleed vulnerability (CVE-2023-4966).

This process forcibly disconnects any existing user sessions potentially exposed by CVE-2025-5777, ensuring that compromised sessions established before the upgrade are closed and the risk of post-exploitation is reduced:

  • kill icaconnection -all
  • kill pcoipConnection -all
  • kill rdp connection -all
  • kill aaa session -all
  • clear lb persistentSessions

References

Share this post: