Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-5777— NetScaler ADC and NetScaler Gateway - Insufficient input validation leading to memory overread

KEV · Ransomware EPSS 66.67% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-5777

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
NetScaler ADC and NetScaler Gateway - Insufficient input validation leading to memory overread
Source: NVD (National Vulnerability Database)
Vulnerability Description
Insufficient input validation leading to memory overread when the NetScaler is configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
跨界内存读
Source: NVD (National Vulnerability Database)
Vulnerability Title
Citrix NetScaler ADC和Citrix NetScaler Gateway 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Citrix NetScaler ADC和Citrix NetScaler Gateway都是美国Citrix公司的产品。Citrix NetScaler ADC是一个应用程序交付和安全性平台。Citrix NetScaler Gateway是一种安全远程访问的解决方案。 Citrix NetScaler ADC和Citrix NetScaler Gateway存在安全漏洞,该漏洞源于NetScaler Management Interface输入验证不足,可能导致内存过度读取。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
NetScalerADC 14.1 ~ 43.56 -
NetScalerGateway 14.1 ~ 43.56 -

II. Public POCs for CVE-2025-5777

#POC DescriptionSource LinkShenlong Link
1Insufficient input validation leading to memory overread on the NetScaler Management Interface NetScaler ADC and NetScaler Gateway https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-5777.yamlPOC Details
2详细讲解CitrixBleed 2 — CVE-2025-5777(越界泄漏)PoC 和检测套件https://github.com/mingshenhk/CitrixBleed-2-CVE-2025-5777-PoC-POC Details
3CitrixBleed-2 (CVE-2025-5777) – proof-of-concept exploit for NetScaler ADC/Gateway “memory bleed”https://github.com/RickGeex/CVE-2025-5777-CitrixBleedPOC Details
4CitrixBleed2 pochttps://github.com/idobarel/CVE-2025-5777POC Details
5Memory disclosure vulnerability in Citrix NetScaler ADC and Gateway when configured as a Gateway (VPN virtual server, ICA proxy, CVPN, RDP Proxy).https://github.com/nocerainfosec/cve-2025-5777POC Details
6Citrix Bleed 2 PoC Scanner (CVE-2025-5777)https://github.com/RaR1991/citrix_bleed_2POC Details
7CitrixBleed-2 Checker & Poc automatic exploit and check token.https://github.com/orange0Mint/CitrixBleed-2-CVE-2025-5777POC Details
8CitrixBleed 2 (CVE-2025-5777)https://github.com/Chocapikk/CVE-2025-5777POC Details
9CVE-2025-5777 (CitrixBleed 2) - Critical memory leak vulnerability affecting Citrix NetScaler ADC and Gateway deviceshttps://github.com/win3zz/CVE-2025-5777POC Details
10CitrixBleed2 powershell versionhttps://github.com/FrenzisRed/CVE-2025-5777POC Details
11CVE-2025-5777 Citrix NetScaler Memory Leak Exploit (CitrixBleed 2)https://github.com/bughuntar/CVE-2025-5777POC Details
12Citrix NetScaler Memory Leak PoChttps://github.com/0xgh057r3c0n/CVE-2025-5777POC Details
13CVE-2025-5777 (CitrixBleed 2) - [Citrix NetScaler ADC] [Citrix Gateway]https://github.com/SleepNotF0und/CVE-2025-5777POC Details
14An advanced, powerful, and easy-to-use tool designed to detect and exploit CVE-2025-5777 (CitrixBleed 2). This script not only identifies the vulnerability but also helps in demonstrating its impact by parsing human-readable information from the memory leak.https://github.com/cyberleelawat/ExploitVeerPOC Details
15CVE-2025-5777https://github.com/B1ack4sh/Blackash-CVE-2025-5777POC Details
16PoC for CVE-2025-5777 – Auth Bypass and RCE in Trend Micro Apex Centralhttps://github.com/Shivshantp/CVE-2025-5777-TrendMicro-ApexCentral-RCEPOC Details
17Nonehttps://github.com/rob0tstxt/POC-CVE-2025-5777POC Details
18CitrixBleed 2 NetScaler honeypot logshttps://github.com/below0day/Honeypot-Logs-CVE-2025-5777POC Details
19Nonehttps://github.com/soltanali0/CVE-2025-5777-ExploitPOC Details
20Update the old POC of CVE-2025-5777 Citrix NetScaler Memory leakhttps://github.com/rootxsushant/Citrix-NetScaler-Memory-Leak-CVE-2025-5777POC Details
21Exploit for CVE-2025-5777: Citrix NetScaler Memory Disclosure (CitrixBleed 2)https://github.com/ndr-repo/CVE-2025-5777POC Details
22🛠️ Explore the CVE-2025-5777 memory leak vulnerability in Citrix NetScaler, illustrating the risks of uninitialized memory in parsing malformed POST data.https://github.com/Lakiya673/CVE-2025-5777POC Details
23Citrix NetScaler Memory Leak PoChttps://github.com/zr1p3r/CVE-2025-5777POC Details
24placeholder for CitrixBleed 2.0 CVE-2025-5777https://github.com/mr-r3b00t/CVE-2025-5777POC Details
25Nonehttps://github.com/rashedhasan090/CVE-2025-5777POC Details
26CVE-2025-5777https://github.com/Ashwesker/Blackash-CVE-2025-5777POC Details
27CVE-2025-5777https://github.com/Ashwesker/Ashwesker-CVE-2025-5777POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-5777

登录查看更多情报信息。

Same Patch Batch · NetScaler · 2025-06-17 · 3 CVEs total

CVE-2025-5349NetScaler ADC and NetScaler Gateway - Improper access control on the NetScaler Management
CVE-2025-4365NetScaler Console and NetScaler SDX (SVM) - Arbitrary file read

IV. Related Vulnerabilities

V. Comments for CVE-2025-5777

No comments yet


Leave a comment