← Back to CVEs
CVE-2025-5777
HIGHCISA KEV7.5
Description
Insufficient input validation leading to memory overread when the NetScaler is configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server
CVE Details
CVSS v3.1 Score7.5
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published6/17/2025
Last Modified10/30/2025
Sourcekev
Honeypot Sightings0
CISA KEV
VendorCitrix
ProductNetScaler ADC and Gateway
Vulnerability NameCitrix NetScaler ADC and Gateway Out-of-Bounds Read Vulnerability
KEV Date Added2025-07-10
Remediation Due Date2025-07-11
Ransomware UseKnown
Affected Products
citrix:netscaler_application_delivery_controllercitrix:netscaler_gateway
Weaknesses (CWE)
CWE-125CWE-908CWE-457
References
https://citrixbleed.com(af854a3a-2127-422b-91ae-364da2661108)
https://horizon3.ai/attack-research/attack-blogs/cve-2025-5777-citrixbleed-2-write-up-maybe/(af854a3a-2127-422b-91ae-364da2661108)
https://labs.watchtowr.com/how-much-more-must-we-bleed-citrix-netscaler-memory-disclosure-citrixbleed-2-cve-2025-5777/(af854a3a-2127-422b-91ae-364da2661108)
https://www.bleepingcomputer.com/news/security/cisa-tags-citrix-bleed-2-as-exploited-gives-agencies-a-day-to-patch/(af854a3a-2127-422b-91ae-364da2661108)
https://www.netscaler.com/blog/news/netscaler-critical-security-updates-for-cve-2025-6543-and-cve-2025-5777/(af854a3a-2127-422b-91ae-364da2661108)
https://www.theregister.com/2025/07/10/cisa_citrixbleed_kev/(af854a3a-2127-422b-91ae-364da2661108)
https://doublepulsar.com/citrixbleed-2-exploitation-started-mid-june-how-to-spot-it-f3106392aa71(134c704f-9b21-4f2e-91b3-4a467353bcc0)
https://reliaquest.com/blog/threat-spotlight-citrix-bleed-2-vulnerability-in-netscaler-adc-gateway-devices/(134c704f-9b21-4f2e-91b3-4a467353bcc0)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-5777(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.