17 July 2025

CitrixBleed 2: The NetScaler Flaw Putting Your Business at Risk

Citrix is back in the headlines for all the wrong reasons. A new memory disclosure vulnerability (CVE-2025-5777) has been discovered in NetScaler ADC and Gateway – and attackers are already exploiting it as early as mid-June 2025 according to researchers.

This critical vulnerability is due to memory leak flaw in Citrix NetScaler systems has become the digital equivalent of an open vault door for cybercriminals.

In recent weeks, security teams have observed exploitation attributed to CitrixBleed 2 to business networks. While it's unclear whether all attacks have progressed to ransomware deployment, the signs of compromise are unmistakable.

Despite the technical name, CitrixBleed 2 is no theoretical threat. It's a shockingly simple vulnerability that allows attackers to steal active session tokens and credentials with a single malformed HTTP post request triggers the memory over read which can disclose sensitive sessions / admin tokens to access your business network.

CISA have also added this vulnerability to the exploited vulnerability list on July 10th with US federal agencys required to patch within 24 hours a faster timeframe than usual.

The vulnerability is very similar to the original CitrixBleed vulnerability where Solace responded to multiple incidents that led to ransomware.

If your organisation uses Citrix for remote access, you need to act now. As this requires minimal effort and is pre-authentication that requires no login credentials by the threat actor. As before it is likely that ransomware groups will exploit this over the coming weeks.

How the Attack Works

Several compromises are being reported from this vulnerability and the exploit of it. This is how the threat actors are doing so.

  • Scanning for Targets
    Attackers are probing the internet for vulnerable NetScaler instances with HTTP/2 enabled (which it is by default).

  • Triggering the Memory Leak
    A specially crafted HTTP post request forces the server to spill its memory contents:

  • Stealing the Keys to Your Network
    The leaked memory often contains:

    • Active session tokens (letting attackers bypass login)

    • Admin credentials (for privileged access)

    • Private keys (enabling man-in-the-middle attacks)

How Should You Act?

  • Patch Immediately
    Citrix has released fixed versions. This is critical.

    Affected versions by the vulnerability:

    • NetScaler ADC and NetScaler Gateway 14.1 BEFORE 14.1-43.56

    • NetScaler ADC and NetScaler Gateway 13.1 BEFORE 13.1-58.32

    • NetScaler ADC 13.1-FIPS and NDcPP BEFORE 13.1-37.235-FIPS and NDcPP

    • NetScaler ADC 12.1-FIPS BEFORE 12.1-55.328-FIPS

  • Force logout of all sessions
    Run the following commands after patching:

    • kill icaconnection -all

    • kill pcoipConnection -all

  • Assume You’ve Been Breached

    • Reset all passwords stored on the NetScale

    • Monitor with EDR

    • Check for unusual admin activity and unusual HTTP events within NetScaler logs.

    • Monitor for data exfiltration attempts

Don’t Be the Next Victim

This vulnerability is particularly dangerous because:

No authentication is required – threat actors don’t need a username or password
Exploits are already in the wild – ransomware groups are likely actively targeting organisations
Default configurations are vulnerable – if you haven’t hardened your setup, you’re at risk

Patch now, monitor closely, and prepare your incident response team. CitrixBleed 2 is a live threat that demands immediate action.

Need help securing your NetScaler environment or suffered an attack? Contact the Solace Cyber DFIR team for urgent support.

Solace Cyber, part of Solace Global, helps companies across the UK recover from ransomware attacks and data breaches.

Risk
Offshore
Cyber
Intelligence & Reports
Case Studies

SOLACE GLOBAL CYBER LTD is registered in England & Wales no. 08830710

Incident Response Winner 2025

Solace Global

Twin Sails House,
W Quay Rd,
Poole, BH15 1JF
United Kingdom

Telephone

Please note that calls may be recorded for security and training purposes.