Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Noauth’s vulnerability still affects 9% of Microsoft Entra SaaS apps two years after discovery

Citrix releases emergency patch for CVE-2025-6543 actively utilized in Netscaler ADC

Bumble to solve 30% of employees

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » A defect in Citrix Bleed 2 allows token theft. SAP GUI is flawed in the risk of sensitive data exposure
Identity

A defect in Citrix Bleed 2 allows token theft. SAP GUI is flawed in the risk of sensitive data exposure

userBy userJune 25, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

June 25th, 2025Ravi LakshmananData Privacy/Vulnerability

Cybersecurity researchers have detailed two currently patched security flaws in the SAP graphical user interface (GUI) for Windows and Java.

The vulnerabilities tracked as CVE-2025-0055 and CVE-2025-0056 (CVSS score: 6.0) were patched by SAP as part of the January 2025 monthly update.

“The study found that SAP GUI input history was unstable in both Java and Windows versions,” Pathlock researcher Jonathan Stross said in a report shared with Hacker News.

SAP GUI user history allows users to access values ​​previously entered in input fields with the aim of saving time and reducing errors. This historical information is stored locally on the device. This includes your username, national ID, Social Security Number (SSN), bank account number, and internal SAP table name.

Cybersecurity

The vulnerability identified by PathLock is rooted in this input history feature, allowing access to data in predefined directories based on SAP GUI variants so that it can access user directories of attackers or victims on the operating system with administrative privileges.

sap gui for Windows -%appdata%\locallow\sapgui\cache\history\saphistory.db sap gui for java -appdata%\locallow\sapgui

The problem is that for Windows SAP GUI, input is stored in a database file using a weak XOR-based encryption scheme. This makes decoding easier with minimal effort. In contrast, the Java SAP GUI stores these historical entries as Java serialized objects in an unencrypted way.

As a result, in response to user input previously provided, the information disclosed could include anything between non-critical data for highly sensitive data, which will affect the confidentiality of your application.

“Anyone who has access to a computer may have access to history files and all the sensitive information they store,” Stross said. “Because data is stored locally and encrypted (or not at all), it is a real threat to peel it off via HID injection attacks (such as USB rubber duckies) or phishing.”

To mitigate the potential risks associated with disclosure, we recommend that you disable the input history feature and delete existing databases or serialized object files from the above directories.

CITRIX Patch CVE-2025-5777

This disclosure occurs because Citrix patched security flaws in the critical rating of Netscaler (CVE-2025-5777, CVSS score: 9.3).

The drawback is due to insufficient input validation, which can allow a rogue attacker to grab a valid session token from memory via a rogue request, effectively bypassing authentication protection. However, this only works if Netscaler is configured as a gateway or an AAA virtual server.

The vulnerability has been called Citrix Bleed 2 by security researcher Kevin Beaumont due to its similarity to CVE-2023-4966 (CVSS score: 9.4).

It is being handled in the following versions –

Releases the release of 13.1-FIPS and 13.1-NDCPP 13.1-37.235 and 13.1-FIPS for Netscaler ADC and Netscaler Gateway 14.1-43.56 and later, 13.1-NDCPP 13.1-FIPS for Netscaler ADC and Netscaler Gateway 13.1-58.32 and later releases for 13.1-NDCPP 13.1-37.235. 12.1-FIPS Release of 12.1-FIPS after 12.1-55.328

Cybersecurity

Secure private access on-plame or secure private access hybrid deployments using NetScaler instances are also vulnerable. Citrix recommends that the user run the following command to terminate all active ICA and PCOIP sessions after all Netscaler appliances have been upgraded –

icaconnection-kill all pcoipconnection-kill all

The company is also urging customers of Netscaler ADC and Netscaler Gateway versions 12.1 and 13.0 to move to the supported version as it is the current end (EOL) and is no longer supported.

There is no evidence that the flaws have been weaponized, but Watchtowr CEO Benjamin Harris described the attacker’s interest as “checking every box,” saying exploitation could be round the corner.

“CVE-2025-5777 is the vulnerability that wreaked havoc for end users of the Citrix Netscaler appliance in 2023, and the vulnerability as the first violation vector for many significant incidents,” Benjamin Harris, CEO of Hacktor, spoke.

“Details surrounding CVE-2025-5777 have quietly changed since its initial disclosure, with some rather important prerequisites or restrictions removed from the NVD CVE description. Specifically, the comment that this vulnerability lies in the lesser management interface has now been removed.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleRing cameras and doorbells now use AI to provide specific descriptions of motion activities
Next Article Bumble to solve 30% of employees
user
  • Website

Related Posts

Noauth’s vulnerability still affects 9% of Microsoft Entra SaaS apps two years after discovery

June 25, 2025

Citrix releases emergency patch for CVE-2025-6543 actively utilized in Netscaler ADC

June 25, 2025

Pro-Iranian hacktivist group leaks personal records from the 2024 Saudi Arabian game

June 25, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Noauth’s vulnerability still affects 9% of Microsoft Entra SaaS apps two years after discovery

Citrix releases emergency patch for CVE-2025-6543 actively utilized in Netscaler ADC

Bumble to solve 30% of employees

A defect in Citrix Bleed 2 allows token theft. SAP GUI is flawed in the risk of sensitive data exposure

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The Digital Twin Revolution: Reshaping Industry 4.0

1-inch rollout expanded bug bounty features rewards up to $500,000

PhysicsX raises $135 million to bring AI-first engineering to aerospace, automobiles and energy

Deadline approach to speaker proposals for OpenSSL Conference 2025 held in Prague

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.