"CitrixBleed 2": Citrix Netscaler gaps more serious

Citrix recently warned of gaps in Netscaler ADC and Gateway. They are more serious, "CitrixBleed 2" is doing the rounds.

listen Print view
Data center image in red tones

Emergency in the data center

(Image: vchal/Shutterstock.com)

3 min. read

Last week, Citrix had several vulnerabilities in Netscaler ADC and Gateways. One of them was already considered critical. Now Citrix has updated the vulnerability description, which reminds IT security researchers of the CitrixBleed vulnerability from 2023, which is why the word of “CitrixBleed 2” is now doing the rounds.

CitrixBleed is a vulnerability in Netscaler ADC and Gateway (CVE-2023-4966 / EUVD-2023-54802, CVSS 9.4, risk “critical”) that allows attackers to access and extract valid session tokens remotely and without authentication in RAM. This allows them to bypass the login and access systems – and they did so diligently. The original vulnerability description was: “Sensitive information disclosure in NetScaler ADC and NetScaler Gateway when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server.”

The vulnerability from last week first had a more general description, which Citrix updated almost unnoticed on Monday of this week. Initially, it was stated that attackers could read memory areas in Netscaler ADC and Gateway outside the intended limits, which is due to insufficient checking of transferred data (CVE-2025-5777 / EUVD-2025-18497, CVSS 9.3, risk “critical”).

Almost unnoticed, Citrix adjusted the vulnerability description at the beginning of the week.

(Image: Screenshot / dmk)

The CVE entry contains the description change, which now reads in the original: “Insufficient input validation leading to memory overread when the NetScaler is configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server.” – which is very similar to the description of the “CitrixBleed” vulnerability. Citrix servers are usually used in such configurations to enable remote access to company resources.

Videos by heise

IT security researcher Kevin Beaumont stumbled across this and has now reported it. The memory areas that can be read through the gap can contain sensitive information, such as session tokens. In a replay attack, attackers can use them to take over Citrix sessions and bypass multifactor authentication, for example. This was already the case with the CitrixBleed vulnerability abused in the wild in 2023. Beaumont also asked the search engine Shodan for the favicon of Netscaler instances. Most systems are accessible from the network in the USA (13,745), with Germany in second place with, 6810 accessible Netscaler instances. However, the search says nothing about whether the Netscalers are still vulnerable.

IT managers should therefore quickly update their Citrix instances with the available updates. Citrix points out that all active ICA and PCoIP sessions should be hard terminated after the update. This can be done with the commands kill icaconnection -all and kill pcoipConnection -all.

(dmk)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.