# NetScaler ADC 和 NetScaler Gateway - 足够的输入验证导致内存溢出读取
## 概述
NetScaler 配置为网关(VPN 虚拟服务器、ICA 代理、CVPN、RDP 代理)或 AAA 虚拟服务器时,由于输入验证不足,存在内存过度读取漏洞。
## 影响版本
未提供具体版本信息。
## 细节
当 NetScaler 作为网关(包括 VPN 虚拟服务器、ICA 代理、CVPN、RDP 代理)或 AAA 虚拟服务器进行配置时,由于输入验证不充分,攻击者可以利用此漏洞进行内存过度读取攻击,从而导致信息泄露。
## 影响
此漏洞可能导致敏感信息泄露,使未经授权的用户能够访问受保护的数据。
是否为 Web 类漏洞: 是
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | Insufficient input validation leading to memory overread on the NetScaler Management Interface NetScaler ADC and NetScaler Gateway | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-5777.yaml | POC详情 |
| 2 | 详细讲解CitrixBleed 2 — CVE-2025-5777(越界泄漏)PoC 和检测套件 | https://github.com/mingshenhk/CitrixBleed-2-CVE-2025-5777-PoC- | POC详情 |
| 3 | CitrixBleed-2 (CVE-2025-5777) – proof-of-concept exploit for NetScaler ADC/Gateway “memory bleed” | https://github.com/RickGeex/CVE-2025-5777-CitrixBleed | POC详情 |
| 4 | CitrixBleed2 poc | https://github.com/idobarel/CVE-2025-5777 | POC详情 |
| 5 | Memory disclosure vulnerability in Citrix NetScaler ADC and Gateway when configured as a Gateway (VPN virtual server, ICA proxy, CVPN, RDP Proxy). | https://github.com/nocerainfosec/cve-2025-5777 | POC详情 |
| 6 | Citrix Bleed 2 PoC Scanner (CVE-2025-5777) | https://github.com/RaR1991/citrix_bleed_2 | POC详情 |
| 7 | CitrixBleed-2 Checker & Poc automatic exploit and check token. | https://github.com/orange0Mint/CitrixBleed-2-CVE-2025-5777 | POC详情 |
| 8 | CitrixBleed 2 (CVE-2025-5777) | https://github.com/Chocapikk/CVE-2025-5777 | POC详情 |
| 9 | CVE-2025-5777 (CitrixBleed 2) - Critical memory leak vulnerability affecting Citrix NetScaler ADC and Gateway devices | https://github.com/win3zz/CVE-2025-5777 | POC详情 |
| 10 | CitrixBleed2 powershell version | https://github.com/FrenzisRed/CVE-2025-5777 | POC详情 |
| 11 | CVE-2025-5777 Citrix NetScaler Memory Leak Exploit (CitrixBleed 2) | https://github.com/bughuntar/CVE-2025-5777 | POC详情 |
| 12 | Citrix NetScaler Memory Leak PoC | https://github.com/0xgh057r3c0n/CVE-2025-5777 | POC详情 |
| 13 | CVE-2025-5777 (CitrixBleed 2) - [Citrix NetScaler ADC] [Citrix Gateway] | https://github.com/SleepNotF0und/CVE-2025-5777 | POC详情 |
| 14 | An advanced, powerful, and easy-to-use tool designed to detect and exploit CVE-2025-5777 (CitrixBleed 2). This script not only identifies the vulnerability but also helps in demonstrating its impact by parsing human-readable information from the memory leak. | https://github.com/cyberleelawat/ExploitVeer | POC详情 |
| 15 | CVE-2025-5777 | https://github.com/B1ack4sh/Blackash-CVE-2025-5777 | POC详情 |
| 16 | PoC for CVE-2025-5777 – Auth Bypass and RCE in Trend Micro Apex Central | https://github.com/Shivshantp/CVE-2025-5777-TrendMicro-ApexCentral-RCE | POC详情 |
| 17 | None | https://github.com/rob0tstxt/POC-CVE-2025-5777 | POC详情 |
| 18 | CitrixBleed 2 NetScaler honeypot logs | https://github.com/below0day/Honeypot-Logs-CVE-2025-5777 | POC详情 |
| 19 | None | https://github.com/soltanali0/CVE-2025-5777-Exploit | POC详情 |
| 20 | Update the old POC of CVE-2025-5777 Citrix NetScaler Memory leak | https://github.com/rootxsushant/Citrix-NetScaler-Memory-Leak-CVE-2025-5777 | POC详情 |
| 21 | Exploit for CVE-2025-5777: Citrix NetScaler Memory Disclosure (CitrixBleed 2) | https://github.com/ndr-repo/CVE-2025-5777 | POC详情 |
| 22 | 🛠️ Explore the CVE-2025-5777 memory leak vulnerability in Citrix NetScaler, illustrating the risks of uninitialized memory in parsing malformed POST data. | https://github.com/Lakiya673/CVE-2025-5777 | POC详情 |
| 23 | Citrix NetScaler Memory Leak PoC | https://github.com/zr1p3r/CVE-2025-5777 | POC详情 |
| 24 | placeholder for CitrixBleed 2.0 CVE-2025-5777 | https://github.com/mr-r3b00t/CVE-2025-5777 | POC详情 |
| 25 | None | https://github.com/rashedhasan090/CVE-2025-5777 | POC详情 |
| 26 | CVE-2025-5777 | https://github.com/Ashwesker/Blackash-CVE-2025-5777 | POC详情 |
| 27 | CVE-2025-5777 | https://github.com/Ashwesker/Ashwesker-CVE-2025-5777 | POC详情 |
标题: CITRIX | Support -- 🔗来源链接
标签:
神龙速读:
### 关键信息
#### 漏洞概述
- **漏洞编号**: CVE-2025-5349 和 CVE-2025-5777
- **严重性**: 严重 (Critical)
- **受影响产品**: NetScaler ADC 和 NetScaler Gateway
#### 受影响版本
- NetScaler ADC 和 NetScaler Gateway 14.1 BEFORE 14.1-45.56
- NetScaler ADC 和 NetScaler Gateway 13.1 BEFORE 13.1-58.32
- NetScaler ADC 13.1-FIPS 和 NdPP BEFORE 13.1-37235-FIPS 和 NdPP
- NetScaler ADC 12.1-FIPS BEFORE 12.1-55.328-FIPS
#### 漏洞详情
| CVE ID | 描述 | 前提条件 | CWE | CVSS v4 |
|----------------|--------------------------------|----------------------------------|--------------------|---------|
| CVE-2025-5349 | 网络管理接口上的不当访问控制 | 访问 NSIP、群集管理 IP 或本地 GSLB 站点 IP | CWE-284: 不当访问控制 | 8.7 |
| CVE-2025-5777 | 输入验证不足导致内存溢出 | NetScaler 必须配置为网关(VPN 虚拟服务器、ICA Proxy、CVNPN、RDP Proxy)或 AAA 虚拟服务器 | CWE-125: 越界读取 | 9.3 |
#### 客户应采取的措施
- 升级到以下版本:
- NetScaler ADC 和 NetScaler Gateway 14.1-45.56 及更高版本
- NetScaler ADC 和 NetScaler Gateway 13.1-58.32 及更高版本
- NetScaler ADC 13.1-FIPS 和 NdPP 13.1-37235-FIPS 及更高版本
- NetScaler ADC 12.1-FIPS 12.1-55.328-FIPS 及更高版本
- 运行命令终止所有活动的 ICA 和 PCoIP 会话:
```bash
kill icaconnection all
kill pcoipconnection all
```
#### 注意事项
- NetScaler ADC 和 NetScaler Gateway 版本 12.1 和 13.0 已达到生命周期结束 (EOL),不再受支持。
暂无评论