CVE-2025-5777

Insufficient input validation leading to memory overread when the NetScaler is configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:fips:*:*:*
cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:fips:*:*:*
cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:ndcpp:*:*:*
cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:-:*:*:*
cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:-:*:*:*
cpe:2.3:a:citrix:netscaler_gateway:*:*:*:*:*:*:*:*
cpe:2.3:a:citrix:netscaler_gateway:*:*:*:*:*:*:*:*

History

14 Aug 2025, 14:52

Type Values Removed Values Added
References () https://citrixbleed.com - () https://citrixbleed.com - Third Party Advisory

13 Aug 2025, 19:15

Type Values Removed Values Added
References
  • () https://citrixbleed.com -

14 Jul 2025, 21:09

Type Values Removed Values Added
References () https://horizon3.ai/attack-research/attack-blogs/cve-2025-5777-citrixbleed-2-write-up-maybe/ - () https://horizon3.ai/attack-research/attack-blogs/cve-2025-5777-citrixbleed-2-write-up-maybe/ - Third Party Advisory
References () https://labs.watchtowr.com/how-much-more-must-we-bleed-citrix-netscaler-memory-disclosure-citrixbleed-2-cve-2025-5777/ - () https://labs.watchtowr.com/how-much-more-must-we-bleed-citrix-netscaler-memory-disclosure-citrixbleed-2-cve-2025-5777/ - Third Party Advisory
References () https://www.bleepingcomputer.com/news/security/cisa-tags-citrix-bleed-2-as-exploited-gives-agencies-a-day-to-patch/ - () https://www.bleepingcomputer.com/news/security/cisa-tags-citrix-bleed-2-as-exploited-gives-agencies-a-day-to-patch/ - Press/Media Coverage, Third Party Advisory
References () https://www.netscaler.com/blog/news/netscaler-critical-security-updates-for-cve-2025-6543-and-cve-2025-5777/ - () https://www.netscaler.com/blog/news/netscaler-critical-security-updates-for-cve-2025-6543-and-cve-2025-5777/ - Third Party Advisory
References () https://www.theregister.com/2025/07/10/cisa_citrixbleed_kev/ - () https://www.theregister.com/2025/07/10/cisa_citrixbleed_kev/ - Press/Media Coverage
References () https://reliaquest.com/blog/threat-spotlight-citrix-bleed-2-vulnerability-in-netscaler-adc-gateway-devices/ - () https://reliaquest.com/blog/threat-spotlight-citrix-bleed-2-vulnerability-in-netscaler-adc-gateway-devices/ - Third Party Advisory

12 Jul 2025, 01:15

Type Values Removed Values Added
References
  • () https://horizon3.ai/attack-research/attack-blogs/cve-2025-5777-citrixbleed-2-write-up-maybe/ -
  • () https://labs.watchtowr.com/how-much-more-must-we-bleed-citrix-netscaler-memory-disclosure-citrixbleed-2-cve-2025-5777/ -
  • () https://www.bleepingcomputer.com/news/security/cisa-tags-citrix-bleed-2-as-exploited-gives-agencies-a-day-to-patch/ -
  • () https://www.netscaler.com/blog/news/netscaler-critical-security-updates-for-cve-2025-6543-and-cve-2025-5777/ -
  • () https://www.theregister.com/2025/07/10/cisa_citrixbleed_kev/ -

10 Jul 2025, 17:15

Type Values Removed Values Added
References
  • () https://reliaquest.com/blog/threat-spotlight-citrix-bleed-2-vulnerability-in-netscaler-adc-gateway-devices/ -

10 Jul 2025, 16:15

Type Values Removed Values Added
CWE CWE-908
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CPE cpe:2.3:a:citrix:netscaler_gateway:*:*:*:*:*:*:*:*
cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:ndcpp:*:*:*
cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:-:*:*:*
cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:fips:*:*:*
First Time Citrix netscaler Gateway
Citrix netscaler Application Delivery Controller
Citrix
References () https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX693420 - () https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX693420 - Vendor Advisory
References () https://doublepulsar.com/citrixbleed-2-exploitation-started-mid-june-how-to-spot-it-f3106392aa71 - () https://doublepulsar.com/citrixbleed-2-exploitation-started-mid-june-how-to-spot-it-f3106392aa71 - Third Party Advisory

09 Jul 2025, 18:15

Type Values Removed Values Added
References
  • () https://doublepulsar.com/citrixbleed-2-exploitation-started-mid-june-how-to-spot-it-f3106392aa71 -
CWE CWE-457

24 Jun 2025, 01:15

Type Values Removed Values Added
Summary
  • (es) Validación de entrada insuficiente que provoca una sobrelectura de memoria en la interfaz de administración de NetScaler, NetScaler ADC y NetScaler Gateway
Summary (en) Insufficient input validation leading to memory overread on the NetScaler Management Interface NetScaler ADC and NetScaler Gateway (en) Insufficient input validation leading to memory overread when the NetScaler is configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server

17 Jun 2025, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-17 13:15

Updated : 2025-08-14 14:52


NVD link : CVE-2025-5777

Mitre link : CVE-2025-5777

CVE.ORG link : CVE-2025-5777


JSON object : View

Products Affected

citrix

  • netscaler_application_delivery_controller
  • netscaler_gateway
CWE
CWE-125

Out-of-bounds Read

CWE-908

Use of Uninitialized Resource

CWE-457

Use of Uninitialized Variable