Researchers at Watchtowr have released technical details on an exploit for the “CitrixBleed 2” (CVE-2025-5777) vulnerability released on 2025-06-17, leading to the development of a Proof of Concept (PoC) exploit.
A technical breakdown of the vulnerability shows that, in short, supplying the vulnerable authentication endpoint “/p/u/doAuthentication.do” with a modified “login” parameter triggers a memory leak. The resulting request contains the contents of an uninitialized local variable, which due to the behaviour of the compiled code means that contents of the application’s memory are copied and displayed in the body of the HTTP response.
This is important from a security perspective because the application’s memory can contain critical information, including cached login credentials, IP addresses and other sensitive data. Exploitation of this vulnerability can lead to disclosure of this information by remote, unauthenticated threat actors.
The information provided by Watchtowr has informed the development of a PoC exploit by security researcher Guilherme Nocera. The existence of a PoC means that widespread exploitation of vulnerable devices is now highly likely.
The new vulnerability has some relevant similarities to the original (CVE 2023 4966), which are shown below.
Product Affected |
Citrix NetScaler ADC & Gateway |
Component |
Affects devices configured as Gateway or AAA virtual server |
Vulnerability Type |
Out-of-bounds memory read (CWE-125) |
Exploitation |
Remote, unauthenticated, no prior access required |
Leaked Data |
Can include session tokens, credentials, PII, or internal memory |
Attack Result |
Enables session hijacking, MFA bypass, and lateral movement |
Exploit Vector |
Involves sending crafted HTTP requests to vulnerable endpoints (/vpn/, /aaa/, etc.) |
Mitigation |
Requires patch + session termination (kill icaconnection -all) |
Severity |
Both rated CRITICAL (CVSS ≥ 9) |
However, there are some key differences in the nature of the exploit, which also affect detection. The new exploit also allows for leaking of larger arbitrary memory chunks when compared to the previous one.
Vulnerability |
CitrixBleed 1 (CVE‑2023‑4966) |
CitrixBleed 2 (CVE‑2025‑5777) |
Discovered |
Late 2023 |
July 2025 |
Public Exploitation |
Actively exploited before patch disclosure |
Signs of scanning and early exploitation within days of disclosure |
Root Cause |
Improper handling of session tokens (session memory exposure through Host: headers and other fields) |
Similar memory exposure but different buffer overrun condition—distinct vulnerable code path |
Patch Timeline |
Fixed Oct 2023 |
Fixed July 2, 2025 |
Detection Difficulty |
Logs often lacked detail—hard to detect without full memory analysis |
Some logs may show unusual URI patterns so detection is possible |
PoC Behavior |
Specific to leaking session IDs and CSRF tokens |
Designed to brute-force memory windows, possibly leaking larger arbitrary memory chunks |
Exploit Names |
“CitrixBleed” (coined by Mandiant) |
“CitrixBleed 2” (community-named due to technical resemblance) |
As stated above, there are no mitigations for unpatched devices, so patching to the latest version is highly recommended per our advisory on the vulnerability.
Please refer to our original advisory for guidance on updating any vulnerable devices.