CVE-2025-5777

Insufficient input validation leading to memory overread when the NetScaler is configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:fips:*:*:*
cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:fips:*:*:*
cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:ndcpp:*:*:*
cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:-:*:*:*
cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:-:*:*:*
cpe:2.3:a:citrix:netscaler_gateway:*:*:*:*:*:*:*:*
cpe:2.3:a:citrix:netscaler_gateway:*:*:*:*:*:*:*:*

History

21 Oct 2025, 23:17

Type Values Removed Values Added
References
  • () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-5777 -

21 Oct 2025, 20:20

Type Values Removed Values Added
References
  • {'url': 'https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-5777', 'source': '134c704f-9b21-4f2e-91b3-4a467353bcc0'}

21 Oct 2025, 19:21

Type Values Removed Values Added
References
  • () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-5777 -

14 Aug 2025, 14:52

Type Values Removed Values Added
References () https://citrixbleed.com - () https://citrixbleed.com - Third Party Advisory

13 Aug 2025, 19:15

Type Values Removed Values Added
References
  • () https://citrixbleed.com -

14 Jul 2025, 21:09

Type Values Removed Values Added
References () https://horizon3.ai/attack-research/attack-blogs/cve-2025-5777-citrixbleed-2-write-up-maybe/ - () https://horizon3.ai/attack-research/attack-blogs/cve-2025-5777-citrixbleed-2-write-up-maybe/ - Third Party Advisory
References () https://labs.watchtowr.com/how-much-more-must-we-bleed-citrix-netscaler-memory-disclosure-citrixbleed-2-cve-2025-5777/ - () https://labs.watchtowr.com/how-much-more-must-we-bleed-citrix-netscaler-memory-disclosure-citrixbleed-2-cve-2025-5777/ - Third Party Advisory
References () https://www.bleepingcomputer.com/news/security/cisa-tags-citrix-bleed-2-as-exploited-gives-agencies-a-day-to-patch/ - () https://www.bleepingcomputer.com/news/security/cisa-tags-citrix-bleed-2-as-exploited-gives-agencies-a-day-to-patch/ - Press/Media Coverage, Third Party Advisory
References () https://www.netscaler.com/blog/news/netscaler-critical-security-updates-for-cve-2025-6543-and-cve-2025-5777/ - () https://www.netscaler.com/blog/news/netscaler-critical-security-updates-for-cve-2025-6543-and-cve-2025-5777/ - Third Party Advisory
References () https://www.theregister.com/2025/07/10/cisa_citrixbleed_kev/ - () https://www.theregister.com/2025/07/10/cisa_citrixbleed_kev/ - Press/Media Coverage
References () https://reliaquest.com/blog/threat-spotlight-citrix-bleed-2-vulnerability-in-netscaler-adc-gateway-devices/ - () https://reliaquest.com/blog/threat-spotlight-citrix-bleed-2-vulnerability-in-netscaler-adc-gateway-devices/ - Third Party Advisory

12 Jul 2025, 01:15

Type Values Removed Values Added
References
  • () https://horizon3.ai/attack-research/attack-blogs/cve-2025-5777-citrixbleed-2-write-up-maybe/ -
  • () https://labs.watchtowr.com/how-much-more-must-we-bleed-citrix-netscaler-memory-disclosure-citrixbleed-2-cve-2025-5777/ -
  • () https://www.bleepingcomputer.com/news/security/cisa-tags-citrix-bleed-2-as-exploited-gives-agencies-a-day-to-patch/ -
  • () https://www.netscaler.com/blog/news/netscaler-critical-security-updates-for-cve-2025-6543-and-cve-2025-5777/ -
  • () https://www.theregister.com/2025/07/10/cisa_citrixbleed_kev/ -

10 Jul 2025, 17:15

Type Values Removed Values Added
References
  • () https://reliaquest.com/blog/threat-spotlight-citrix-bleed-2-vulnerability-in-netscaler-adc-gateway-devices/ -

10 Jul 2025, 16:15

Type Values Removed Values Added
References () https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX693420 - () https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX693420 - Vendor Advisory
References () https://doublepulsar.com/citrixbleed-2-exploitation-started-mid-june-how-to-spot-it-f3106392aa71 - () https://doublepulsar.com/citrixbleed-2-exploitation-started-mid-june-how-to-spot-it-f3106392aa71 - Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CWE CWE-908
CPE cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:ndcpp:*:*:*
cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:fips:*:*:*
cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:-:*:*:*
cpe:2.3:a:citrix:netscaler_gateway:*:*:*:*:*:*:*:*
First Time Citrix netscaler Gateway
Citrix
Citrix netscaler Application Delivery Controller

09 Jul 2025, 18:15

Type Values Removed Values Added
CWE CWE-457
References
  • () https://doublepulsar.com/citrixbleed-2-exploitation-started-mid-june-how-to-spot-it-f3106392aa71 -

24 Jun 2025, 01:15

Type Values Removed Values Added
Summary
  • (es) Validación de entrada insuficiente que provoca una sobrelectura de memoria en la interfaz de administración de NetScaler, NetScaler ADC y NetScaler Gateway
Summary (en) Insufficient input validation leading to memory overread on the NetScaler Management Interface NetScaler ADC and NetScaler Gateway (en) Insufficient input validation leading to memory overread when the NetScaler is configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server

17 Jun 2025, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-17 13:15

Updated : 2025-10-21 23:17


NVD link : CVE-2025-5777

Mitre link : CVE-2025-5777

CVE.ORG link : CVE-2025-5777


JSON object : View

Products Affected

citrix

  • netscaler_application_delivery_controller
  • netscaler_gateway
CWE
CWE-125

Out-of-bounds Read

CWE-908

Use of Uninitialized Resource

CWE-457

Use of Uninitialized Variable