Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Optimizing PWAs For Different Display Modes

      August 26, 2025

      Node.js Web App Development Costs: A 2025 Executive Pricing Guide

      August 26, 2025

      Google locking down Android security with upcoming developer verification requirements for sideloaded apps

      August 26, 2025

      Microsoft donates DocumentDB to the Linux Foundation

      August 25, 2025

      Google can translate your voice in real time now – try it free

      August 27, 2025

      The one-click Linux app I use for instant online anonymity

      August 27, 2025

      You can try Android 16’s new lock screen widgets – if you have one of these phones

      August 27, 2025

      Apple’s iPhone 17 event launch date is official – here’s everything we expect

      August 27, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Password Strength Estimator Validation in Laravel

      August 27, 2025
      Recent

      Password Strength Estimator Validation in Laravel

      August 27, 2025

      Laravel’s Enhanced String Validation with Inverse Methods

      August 27, 2025

      Using SQLite in production with Laravel

      August 27, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft Excel just got a Copilot function — but the new AI has some surprising limitations

      August 27, 2025
      Recent

      Microsoft Excel just got a Copilot function — but the new AI has some surprising limitations

      August 27, 2025

      Why Final Fantasy XIV fans are review‑bombing the game on Steam

      August 27, 2025

      Google Chrome VPN under fire for secretly screenshotting users’ browsing habits

      August 27, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»CISA Adds Citrix Vulnerabilities to KEV Catalog as New Flaws Emerge

    CISA Adds Citrix Vulnerabilities to KEV Catalog as New Flaws Emerge

    August 27, 2025

    Citrix vulnerabilities exploited NetScaler

    The U.S. Cybersecurity and Information Security Agency (CISA) has added two Citrix vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog just as new Citrix vulnerabilities emerge – one of which is actively being exploited.

    The vulnerabilities added to the KEV catalog on August 25 are rated medium severity (5.1) and were patched in November 2024. They are:

    • CVE-2024-8069: a Citrix Session Recording Deserialization of Untrusted Data vulnerability
    • CVE-2024-8068: a Citrix Session Recording Improper Privilege Management vulnerability

    Per the agency’s standard practice, CISA did not provide any details on how the vulnerabilities are being exploited. The agency also added one additional vulnerability to the KEV catalog: CVE-2025-48384, an 8.0-severity Git Link Following vulnerability.

    New NetScaler Vulnerability Exploited

    Citrix issued a bulletin on August 26 warning of an actively exploited zero-day vulnerability in NetScaler ADC and NetScaler Gateway – the third NetScaler vulnerability to be targeted by hackers in two months.

    Of the three vulnerabilities in the bulletin – CVE-2025-7775, CVE-2025-7776 and CVE-2025-8424 – Citrix noted that “Exploits of CVE-2025-7775 on unmitigated appliances have been observed.”

    Security researcher Kevin Beaumont said in a Mastodon post that CVE-2025-7775 in particular is being exploited “to drop webshells to backdoor orgs.”

    Organizations will have to perform incident response “as technical details emerge of [the] backdoor,” he said.

    CVE-2025-7775 is a 9.2-rated memory overflow vulnerability leading to Remote Code Execution or Denial of Service in NetScaler ADC and NetScaler Gateway when NetScaler is configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy), AAA virtual server, or meets other virtual server conditions.

    CVE-2025-7776 is an 8.8-rated memory overflow vulnerability leading to unpredictable or erroneous behavior and Denial of Service, and CVE-2025-8424 is an 8.7-severity improper access control flaw on the NetScaler Management Interface.

    Affected NetScaler ADC and NetScaler Gateway customers are urged to update to patched versions as soon as possible. Updated versions include:

    • NetScaler ADC and NetScaler Gateway 14.1-47.48 and later releases
    • NetScaler ADC and NetScaler Gateway 13.1-59.22 and later releases of 13.1
    • NetScaler ADC 13.1-FIPS and 13.1-NDcPP 13.1-37.241 and later releases of 13.1-FIPS and 13.1-NDcPP
    • NetScaler ADC 12.1-FIPS and 12.1-NDcPP 12.1-55.330 and later releases of 12.1-FIPS and 12.1-NDcPP

    NetScaler ADC and NetScaler Gateway versions 12.1 and 13.0 are End Of Life (EOL) and no longer supported, Citrix said, and customers are urged to upgrade their appliances to a supported version.

    Secure Private Access on-prem and Secure Private Access Hybrid deployments using NetScaler instances are also affected by the vulnerabilities and must be upgraded.

    Citrix acknowledged the work of security researchers Jimi Sebree of Horizon3.ai, Jonathan Hetzer of Schramm & Partner GmbH, and François Hämmerli.

    Other Recent Exploited Citrix Vulnerabilities

    NetScaler ADC and NetScaler Gateway vulnerabilities were also targeted by hackers in June and July. CISA added CVE-2025-6543 to the KEV catalog on June 30, and CVE-2025-5777 on July 10.

    CVE-2025-5777 has been dubbed “Citrix Bleed 2” by some because of similarities to 2023’s “Citrix Bleed” vulnerability (CVE-2023-4966).

    CVE-2025-5777, a 9.3-rated Out-of-bounds Read vulnerability, was reportedly exploited as early as June 23, nearly two weeks before a public proof-of-concept (PoC) was released on July 4, and almost three weeks before it was added to the KEV catalog.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleWhat I learned from Inspired
    Next Article Citrix Patches Three NetScaler Flaws, Confirms Active Exploitation of CVE-2025-7775

    Related Posts

    Development

    Password Strength Estimator Validation in Laravel

    August 27, 2025
    Development

    Laravel’s Enhanced String Validation with Inverse Methods

    August 27, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Azure AI just made GPT-4.1 fine-tuning faster and more accessible

    Operating Systems

    CVE-2025-4293 – MRCMS Cross-Site Scripting Vulnerability in Group Edit Page

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-33072 – Azure Azure Network Information Disclosure

    Common Vulnerabilities and Exposures (CVEs)

    lanos/laravel-cashier-stripe-connect

    Development

    Highlights

    Development

    CISA Warns of Critical ICS Flaws in Siemens, Tigo Energy, and EG4 Equipment

    August 22, 2025

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) have released four new Industrial Control Systems…

    CVE-2025-48053 – Discourse Bot URL Availability Denial

    June 9, 2025

    CVE-2025-4270 – TOTOLINK A720R CGI Config Handler Information Disclosure

    May 5, 2025

    Should you upgrade to mesh? I compared it with a traditional Wi-Fi router, and here’s my advice

    August 8, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.