{"uuid": "07234762-c7df-4dde-a778-fbc97a0c452a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "name": "CitrixBleed 2", "description": "> Citrix patched a critical vulnerability in its NetScaler ADC and NetScaler Gateway products that is already being compared to the infamous CitrixBleed flaw exploited by ransomware gangs and other cyber scum, although there haven't been any reports of active exploitation. Yet.\n> \n> Security analyst Kevin Beaumont dubbed the vulnerability \"CitrixBleed 2.\" As The Register's readers likely remember, that earlier flaw (CVE-2023-4966) allowed attackers to access a device's memory, find session tokens, and then use those to impersonate an authenticated user while bypassing multi-factor authentication \u2014 which is also possible with this new bug.\n\nhttps://www.theregister.com/2025/06/24/critical_citrix_bug_citrixbleed/", "creation_timestamp": "2025-06-25T09:04:23.600517+00:00", "timestamp": "2025-06-25T09:04:23.600517+00:00", "related_vulnerabilities": ["CVE-2023-4966", "CVE-2025-5777"], "meta": [{"ref": ["https://www.theregister.com/2025/06/24/critical_citrix_bug_citrixbleed/"]}], "author": {"login": "cedric", "name": "C\u00e9dric Bonhomme", "uuid": "af0120d0-3dac-4a6a-974b-a9f33d2a9846"}}
