Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Error’d: Pickup Sticklers

      September 27, 2025

      From Prompt To Partner: Designing Your Custom AI Assistant

      September 27, 2025

      Microsoft unveils reimagined Marketplace for cloud solutions, AI apps, and more

      September 27, 2025

      Design Dialects: Breaking the Rules, Not the System

      September 27, 2025

      Building personal apps with open source and AI

      September 12, 2025

      What Can We Actually Do With corner-shape?

      September 12, 2025

      Craft, Clarity, and Care: The Story and Work of Mengchu Yao

      September 12, 2025

      Cailabs secures €57M to accelerate growth and industrial scale-up

      September 12, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Using phpinfo() to Debug Common and Not-so-Common PHP Errors and Warnings

      September 28, 2025
      Recent

      Using phpinfo() to Debug Common and Not-so-Common PHP Errors and Warnings

      September 28, 2025

      Mastering PHP File Uploads: A Guide to php.ini Settings and Code Examples

      September 28, 2025

      The first browser with JavaScript landed 30 years ago

      September 27, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured
      Recent
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»CISA Adds Citrix Vulnerabilities to KEV Catalog as New Flaws Emerge

    CISA Adds Citrix Vulnerabilities to KEV Catalog as New Flaws Emerge

    August 27, 2025

    Citrix vulnerabilities exploited NetScaler

    The U.S. Cybersecurity and Information Security Agency (CISA) has added two Citrix vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog just as new Citrix vulnerabilities emerge – one of which is actively being exploited.

    The vulnerabilities added to the KEV catalog on August 25 are rated medium severity (5.1) and were patched in November 2024. They are:

    • CVE-2024-8069: a Citrix Session Recording Deserialization of Untrusted Data vulnerability
    • CVE-2024-8068: a Citrix Session Recording Improper Privilege Management vulnerability

    Per the agency’s standard practice, CISA did not provide any details on how the vulnerabilities are being exploited. The agency also added one additional vulnerability to the KEV catalog: CVE-2025-48384, an 8.0-severity Git Link Following vulnerability.

    New NetScaler Vulnerability Exploited

    Citrix issued a bulletin on August 26 warning of an actively exploited zero-day vulnerability in NetScaler ADC and NetScaler Gateway – the third NetScaler vulnerability to be targeted by hackers in two months.

    Of the three vulnerabilities in the bulletin – CVE-2025-7775, CVE-2025-7776 and CVE-2025-8424 – Citrix noted that “Exploits of CVE-2025-7775 on unmitigated appliances have been observed.”

    Security researcher Kevin Beaumont said in a Mastodon post that CVE-2025-7775 in particular is being exploited “to drop webshells to backdoor orgs.”

    Organizations will have to perform incident response “as technical details emerge of [the] backdoor,” he said.

    CVE-2025-7775 is a 9.2-rated memory overflow vulnerability leading to Remote Code Execution or Denial of Service in NetScaler ADC and NetScaler Gateway when NetScaler is configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy), AAA virtual server, or meets other virtual server conditions.

    CVE-2025-7776 is an 8.8-rated memory overflow vulnerability leading to unpredictable or erroneous behavior and Denial of Service, and CVE-2025-8424 is an 8.7-severity improper access control flaw on the NetScaler Management Interface.

    Affected NetScaler ADC and NetScaler Gateway customers are urged to update to patched versions as soon as possible. Updated versions include:

    • NetScaler ADC and NetScaler Gateway 14.1-47.48 and later releases
    • NetScaler ADC and NetScaler Gateway 13.1-59.22 and later releases of 13.1
    • NetScaler ADC 13.1-FIPS and 13.1-NDcPP 13.1-37.241 and later releases of 13.1-FIPS and 13.1-NDcPP
    • NetScaler ADC 12.1-FIPS and 12.1-NDcPP 12.1-55.330 and later releases of 12.1-FIPS and 12.1-NDcPP

    NetScaler ADC and NetScaler Gateway versions 12.1 and 13.0 are End Of Life (EOL) and no longer supported, Citrix said, and customers are urged to upgrade their appliances to a supported version.

    Secure Private Access on-prem and Secure Private Access Hybrid deployments using NetScaler instances are also affected by the vulnerabilities and must be upgraded.

    Citrix acknowledged the work of security researchers Jimi Sebree of Horizon3.ai, Jonathan Hetzer of Schramm & Partner GmbH, and François Hämmerli.

    Other Recent Exploited Citrix Vulnerabilities

    NetScaler ADC and NetScaler Gateway vulnerabilities were also targeted by hackers in June and July. CISA added CVE-2025-6543 to the KEV catalog on June 30, and CVE-2025-5777 on July 10.

    CVE-2025-5777 has been dubbed “Citrix Bleed 2” by some because of similarities to 2023’s “Citrix Bleed” vulnerability (CVE-2023-4966).

    CVE-2025-5777, a 9.3-rated Out-of-bounds Read vulnerability, was reportedly exploited as early as June 23, nearly two weeks before a public proof-of-concept (PoC) was released on July 4, and almost three weeks before it was added to the KEV catalog.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticlePair programming
    Next Article Citrix Patches Three NetScaler Flaws, Confirms Active Exploitation of CVE-2025-7775

    Related Posts

    Development

    Using phpinfo() to Debug Common and Not-so-Common PHP Errors and Warnings

    September 28, 2025
    Development

    Mastering PHP File Uploads: A Guide to php.ini Settings and Code Examples

    September 28, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Smashing Security podcast #411: The fall of Troy, and whisky barrel scammers

    Development

    GitHub’s AI-powered Spark lets you build apps using natural language – here’s how to access it

    News & Updates

    Luna AI and MongoDB Throw Lifeline to Product Teams

    Databases

    Danabot: Analyzing a fallen empire

    Development

    Highlights

    OttoKit WordPress Plugin Admin Creation Vulnerability Under Active Exploitation Development

    OttoKit WordPress Plugin Admin Creation Vulnerability Under Active Exploitation

    April 11, 2025

    A newly disclosed high-severity security flaw impacting OttoKit (formerly SureTriggers) has come under active exploitation…

    CitrixBleed 2 situation update — everybody already got owned

    July 15, 2025

    Why React Didn’t Kill XSS: The New JavaScript Injection Playbook

    July 29, 2025

    Skywings Marketing – Leading SEO Company Ghaziabad for Digital Excellence

    April 17, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.