By zerosday cve bot•July 10, 2025•
cves
CVE-2025-5777: Citrix NetScaler ADC and Gateway Out-of-Bounds Read Vulnerability (Pentest Lab Guide)

CVE-2025-5777: Technical Deep-Dive (Auto Refreshed)
Generated on 2026-03-24T12:46:57.851Z. This file is automatically regenerated every 30 minutes by the CVE AI enrichment job using web sources (NVD, MITRE, CISA KEV, GitHub).
Executive Technical Summary
Insufficient input validation leading to memory overread when the NetScaler is configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server
- Context preserved from previous revision: Insufficient input validation leading to memory overread when the NetScaler is configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server Notes: 📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.
Technical Details
- CVE: CVE-2025-5777
- KEV date added: 2025-07-10
- KEV due date: 2025-07-11
- NVD published: Unknown
- NVD modified: Unknown
- MITRE modified: 2026-02-26
- CVSS base score: N/A
- CVSS vector: N/A
- CVSS exploitability score: N/A
- CVSS impact score: N/A
- Attack vector: Unknown
- Attack complexity: Unknown
- Privileges required: Unknown
- User interaction: Unknown
- Scope: Unknown
- Confidentiality impact: Unknown
- Integrity impact: Unknown
- Availability impact: Unknown
Versions and Products Impacted
- NetScaler / ADC (versions: 14.1, 13.1)
- NetScaler / Gateway (versions: 14.1, 13.1)
Weakness Classification
- CWE-125
- CWE-457
Repositories for Lab Validation (Public Examples)
- No public repository matched this CVE query in the current run.
People and Organizations Mentioned
- Citrix
- NetScaler ADC and Gateway
Practical Defensive Validation (Authorized Only)
- Use only isolated environments and systems you own or are explicitly authorized to test.
- Snapshot infrastructure before validation and preserve baseline logs (EDR, SIEM, OS, app).
- Inventory NetScaler / ADC (versions: 14.1, 13.1) assets and confirm exact vulnerable versions with automated checks.
- Patch in staged environments and validate closure with scanners + service health checks.
- Map detections to MITRE ATT&CK tactics relevant to your environment and tune alert quality.
References
- NVD record: https://nvd.nist.gov/vuln/detail/CVE-2025-5777
- MITRE CVE record: https://www.cve.org/CVERecord?id=CVE-2025-5777
- CISA KEV Catalog: https://www.cisa.gov/known-exploited-vulnerabilities-catalog
- CISA KEV JSON feed: https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json
- KEV notes: https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX693420 ; https://nvd.nist.gov/vuln/detail/CVE-2025-5777
- https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX693420
- https://doublepulsar.com/citrixbleed-2-exploitation-started-mid-june-how-to-spot-it-f3106392aa71
- https://reliaquest.com/blog/threat-spotlight-citrix-bleed-2-vulnerability-in-netscaler-adc-gateway-devices/
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-5777
- https://www.bleepingcomputer.com/news/security/cisa-tags-citrix-bleed-2-as-exploited-gives-agencies-a-day-to-patch/
- https://labs.watchtowr.com/how-much-more-must-we-bleed-citrix-netscaler-memory-disclosure-citrixbleed-2-cve-2025-5777/
- https://www.theregister.com/2025/07/10/cisa_citrixbleed_kev/
- https://horizon3.ai/attack-research/attack-blogs/cve-2025-5777-citrixbleed-2-write-up-maybe/
- https://www.netscaler.com/blog/news/netscaler-critical-security-updates-for-cve-2025-6543-and-cve-2025-5777/
- https://citrixbleed.com
This content is for defensive security training and authorized validation only.
