Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Cisco ISE, CitrixBleed 2 Vulnerabilities Exploited as Zero-Days: Amazon

Amazon has seen a threat actor exploiting CVE-2025-20337 and CVE-2025-5777, two critical Cisco and Citrix vulnerabilities, as zero-days.

Vulnerability

A threat actor was seen exploiting two critical Citrix and Cisco vulnerabilities as zero-days weeks before patches were released, Amazon reports.

The Citrix flaw, tracked as CVE-2025-5777 (CVSS score of 9.3), is an insufficient input validation issue leading to an out-of-bounds memory read in NetScaler ADC and NetScaler Gateway.

It was patched on June 17 and was soon after dubbed CitrixBleed 2 by security researcher Kevin Beaumont, who compared it to the CitrixBleed bug (CVE-2023-4966) that allowed attackers to bypass multi-factor authentication.

Roughly one week later, the first exploitation attempts targeting CitrixBleed 2 were seen, and technical details and exploits emerged several days later. In mid-July, CISA warned that the flaw poses an unacceptable risk to federal agencies.

Now, Amazon says its honeypot service detected exploitation attempts prior to the defect’s public disclosure. An APT “had been exploiting the vulnerability as a zero-day,” the company says.

Amazon’s investigation into the attacks also uncovered zero-day exploitation of CVE-2025-20337 (CVSS score of 10/10), a Cisco Identity Service Engine (ISE) vulnerability disclosed on July 16.

Advertisement. Scroll to continue reading.

Affecting a specific API of ISE and ISE Passive Identity Connector (ISE-PIC), the flaw allows unauthenticated attackers to execute arbitrary code on the underlying operating system with root privileges.

Shortly after disclosing the vulnerability, Cisco warned that it had evidence that threat actors were exploiting it in the wild, along with another critical bug in the same API, namely CVE-2025-20281.

According to Amazon’s new report, in-the-wild exploitation of the Cisco ISE flaw started before comprehensive patches were released.

The APT was seen deploying a custom web shell posing as a legitimate ISE component, which operated in-memory and relied on Java reflection to inject itself into running threads.

The malware, a backdoor specifically targeting ISE environments, would monitor all HTTP requests across the Tomcat server, could evade detection using DES encryption with non-standard Base64 encoding, and could be accessed only via specific HTTP headers.

“The threat actor’s custom tooling demonstrated a deep understanding of enterprise Java applications, Tomcat internals, and the specific architectural nuances of the Cisco Identity Service Engine,” Amazon says.

The company believes the attacks were orchestrated by a highly resourced threat actor that had access to the unpublished zero-days either through advanced vulnerability research capabilities or through access to non-public vulnerability information.

Asked by SecurityWeek whether it has been able to link the attacks to a specific threat actor, Amazon said it could not share any information on attribution.

Related: CitrixBleed 2: 100 Organizations Hacked, Thousands of Instances Still Vulnerable

Related: Cisco Patches Critical Vulnerabilities in Contact Center Appliance

Related: Cisco, Fortinet, Palo Alto Networks Devices Targeted in Coordinated Campaign

Related: Citrix Patches Exploited NetScaler Zero-Day

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Malwarebytes has named Chung Ip as Chief Financial Officer.

Semperis has appointed John Podboy as Chief Information Security Officer.

Randy Menon has become Chief Product and Marketing Officer at One Identity.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.