What Happened
Recent Amazon threat intelligence confirms that at least two critical zero-day vulnerabilities have been actively exploited in products from Cisco and Citrix. Specifically:
- CVE‑2025‑20337: This critical Cisco Identity Services Engine (ISE) zero-day is being exploited to achieve pre-authentication remote code execution, giving attackers root-level access without credentials. Beyond Amazon, several other outlets have confirmed active exploitation in the wild.
- CVE‑2025‑5777: Citrix’s memory-overread vulnerability, widely referred to as “CitrixBleed 2”, is being used in real-world attacks against NetScaler ADC and Gateway devices. nGuard covered this back in July when it was first discovered that threat actors were exploiting this flaw before patches were available, mirroring the original CitrixBleed pattern.
- Intelligence from Amazon Web Services and other observers indicates these exploits were used by an advanced persistent threat (APT) actor with custom tooling and significant capabilities.
- The campaign underscores a classic patch-gap exploitation scenario where adversaries weaponize vulnerabilities before full remediations are deployed.
Why It Matters
Infrastructure such as enterprise identity platforms (Cisco ISE) and remote-access gateways (Citrix NetScaler) sits at the core of network trust. When these are compromised:
- Attackers can bypass authentication, escalate privileges, and deploy stealthy web shells specially crafted for these appliances.
- Custom malware operating in-memory, using sophisticated evasion (Java reflection, DES encryption, tailored HTTP headers) has been documented.
- Because these systems control access to networks, compromise of them can serve as a “gateway” into broader enterprise infrastructure, affecting both SMBs and large enterprises.
What You Should Do (Now)
- Patch Immediately: Apply the latest firmware or software updates from Cisco and Citrix. If updates are not yet feasible, isolate or restrict public-access interfaces on affected devices.
- Validate Controls & Hardening: Conduct Firewall & Security Device Audits to confirm devices are configured securely, management interfaces are locked down, and edge-perimeter segmentation is enforced.
- Monitor & Detect: Deploy anomaly detection and behavior-based monitoring. With Managed SIEM, you can surface unusual patterns, unauthorized sessions, or payload-injection attempts.
- Build Incident Readiness: Use Incident Response tabletop exercises to walk teams through core dump analysis, firmware integrity checks, credential resets, and containment decisions before a real compromise occurs.
- Review Identity & Access Controls: Ensure least-privilege access, MFA everywhere, and rotate credentials on legacy or exposed appliances. Pair with Risk Assessments which align your security posture with NIST, CIS and other trusted frameworks.
Takeaway
These zero-day exploits are not just isolated software defects, as they expose a harsh reality: identity and network-access infrastructure are high-value targets. A vulnerability in an appliance trusted to enforce access controls can become the ticket into your enterprise.
Securing those gateways must be a priority. Deploy patching fast, enforce hardening, monitor edge-devices continuously and lean on experts when gaps or resource constraints exist.
