Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»CISA Tag Citrix Bleed 2 As exploitation, gives agencies a day patches
    Security

    CISA Tag Citrix Bleed 2 As exploitation, gives agencies a day patches

    PineapplesUpdateBy PineapplesUpdateJuly 13, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    CISA Tag Citrix Bleed 2 As exploitation, gives agencies a day patches
    Share
    Facebook Twitter LinkedIn Pinterest Email

    CISA Tag Citrix Bleed 2 As exploitation, gives agencies a day patches

    The US Cyber Security and Infrastructure Security Agency has confirmed the active exploitation of Citrix Netscaler Adc and Citrixbled 2 vulnerability (CVE-2025-5777) in Gateway and is giving one day to federal agencies to apply fixes.

    Such a short time frame is unprecedented to install the patch as CISA released the known exploited weaknesses (KEV) catalogs, showing the seriousness of the attacks exploiting the security issues.

    Agency Added the blame Yesterday, for the end of June 11, federal agencies to order mitigation to order federal agencies tomorrow for their known exploited vulnerability (KV) catalogs.

    The CVE-2025-5777 is an important memory safety vulnerability (out-of-bounds memory reed) that provides an informal attacker access to restricted parts of memory.

    The problem affects Netscaler devices that are configured as a gateway or aaa virtual server, in versions before 14.1-43.56, 13.1-58.32, 13.1-37.235-FIPS/NDCpp, and 2.1-55.328-Fips.

    Addressing vulnerability through Citrix Updates issued on 17 June,

    A week later, security researcher Kevin Beomont warned of the ability of blame for exploitation in a blog post, its severity and results are abandoned.

    Beaumont said the Flaw ‘Citrixbleed 2’, which was exploited by all types of cyber criminal actors in wild due to similarity with the notorious Citrixbleed vulnerability (CVE-2023-4966).

    Citrixbled 2’s first warning occurred from reliaquest on 27 June. On July 7, the Watchtower and Horizone 3 security researchers for Cve-2015-5777 published proof-off-concept explopies (POCs), showing how the defects can be taken into an attack.

    At that time, the indications of definite active exploitation in the wild remained elusive, but with the availability of POC and ease of exploitation, it was only some time until the attackers began to take advantage of it on a large scale.

    For the past two weeks, however, the actor of danger has been active to discuss the reaction on POC for discussion, work, testing and publicly Citrix Bleed 2 vulnerability on the hacker forums.

    He showed interest in how he has made available the adventures available in the attacks. His activity has increased in the last few days and several exploits have been published for vulnerability.

    With the CISA Citrixbled 2 actively use in attacks, it is likely that the danger actors have now developed their own exploits based on technical information released last week.

    “Apply mitigation as per seller instructions, follow the BOD 22-01 guidance applied to cloud services, or stop using the product if the laxity is unavailable,” Sisa warns,

    To reduce the problem, users are recommended to strongly upgrade firmware versions 14.1-43.56+, 13.1- 58.32+, or 13.1-Fips/NDCPP 13.1- 37.235+.

    After updating, the admins should disconnect all active ICA and PCOIP sessions, as they can already compromise.

    Before doing this, they should review the current sessions for suspicious behavior 'show icaconnection' Command or Netscaler Gateway> Pcoip> Through connection.

    Then, finish sessions using the following orders:

    • kill icaconnection -all
    • kill pcoipconnection -all

    If it is not possible to update immediately, limit the external access to the netscaler using firewall rules or ACL.

    Although CISA confirms exploitation, it is important to note that Citrix still has to update it. Original security bulletin From 27 June, there is no evidence of exploiting CVE -2025-5777 in the wild.

    Bleepingcomputer contacted Citrix whether there are any updates on the exploitation of Citrixbleed 2, and we will update this post after a statement is available.


    Tines needle

    While cloud attacks can be more sophisticated, the attackers still succeed with surprisingly simple techniques.

    Drawing by the detection of Vij in thousands of organizations, this report reveals the 8 major techniques used by Claude-Floid danger actors.

    agencies Bleed CISA Citrix Day exploitation patches Tag
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous Article5 ways Ubuntu changed how I use my PC
    Next Article 5 plants that love the sun and will avoid a heat
    PineapplesUpdate
    • Website

    Related Posts

    Startups

    I finally found a pair of smart glasses that last all day, but there’s a compromise

    January 14, 2026
    Startups

    This Bose speaker will reach EOL in 2026 – but open source is here to save the day

    January 13, 2026
    Startups

    Why I Keep This Bluetooth Tracker Tag on My Keychain Instead of an AirTag – and I Don’t Regret It

    January 7, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Google tests AI-operated audio overview in search results for some questions

    June 16, 20250 Views

    Yes, this was the original voice of the Garat in the trailer for the thief VR

    June 16, 20250 Views

    Best LC10 loadout in call of duty: Warzone

    June 16, 20250 Views
    Our Picks

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2026 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.