Source: BleepingComputer
Author: Lawrence Abrams
URL: https://www.bleepingcomputer.com/news/security/citrix-bleed-2-exploited-weeks-before-pocs-as-citrix-denied-attacks/
ONE SENTENCE SUMMARY:
Citrix’s critical vulnerability “CitrixBleed 2” was exploited before public PoC release, prompting patch urgency and revealing transparency issues.
MAIN POINTS:
- CVE-2025-5777, known as CitrixBleed 2, faced early exploitation despite no initial evidence claims by Citrix.
- GreyNoise detected attacks from China beginning June 23, 2025, before PoC release.
- Exploitation allowed attackers to extract sensitive data by manipulating login parameters.
- Citrix was slow to acknowledge active exploitation and did not update advisories timely.
- Security researcher Kevin Beaumont identified indicators of exploitation attempts in logs.
- Misconfigured session terminations advised by Citrix may not fully prevent exploitation.
- Over 120 companies compromised by the vulnerability as of June 2025.
- Imperva reported 11.5 million attempts, with heavy targeting of the financial sector.
- Citrix urged immediate patching of affected NetScaler versions for security.
- No mitigations exist beyond patching; outdated versions need upgrading.
TAKEAWAYS:
- Immediate patching is essential to protect systems against CVE-2025-5777.
- Citrix’s advisory and communication processes need improvement for better transparency.
- Monitoring specific log activities can help identify attempted exploitations early.
- Organizations must address all session types for complete security.
- Financial and other critical sectors need heightened vigilance due to targeted attacks.