Unpatched vulnerabilities, known as zero-days, remain among the most dangerous threats to businesses. In recent months, researchers from Amazon Threat Intelligence discovered that an advanced group of attackers exploited critical flaws in Citrix and Cisco before either company released security patches.
The attacks leveraged two major vulnerabilities:
Both were used as zero-days — exploited before any public disclosure or fixes existed. This finding confirms that even the most protected enterprise environments are vulnerable without continuous monitoring and a comprehensive cybersecurity strategy.
Amazon’s threat intelligence team analyzed data from its MadPot honeypot network, designed to detect malicious activity. According to their report, attempts to exploit Citrix Bleed 2 began before the vulnerability was disclosed, indicating attackers had prior knowledge and were already using it secretly.
During the investigation, Amazon also noticed anomalous payload behavior affecting Cisco ISE. This led to the discovery of a second zero-day, CVE-2025-20337, which relied on unsafe deserialization to execute malicious code inside the system.
This bug enables out-of-bounds memory reads, potentially exposing sensitive information or internal credentials. It affects NetScaler ADC and Gateway, widely used for application delivery and secure remote access in large enterprises.
Citrix released patches in June 2025, but public exploits were already circulating, and the U.S. CISA confirmed active exploitation.
Even more severe, this flaw allows unauthenticated attackers to upload malicious files, execute arbitrary commands, and gain root-level privileges on affected devices.
Cisco published a security advisory on July 17, 2025, confirming ongoing exploitation. Just five days later, security researcher Bobby Gould published technical details on chaining the vulnerabilities for full system access.
You might also be interested in: Apple Fixes a Serious Vulnerability Exploited in Zero-Day Attacks.
Amazon’s analysis revealed that attackers combined both vulnerabilities to breach enterprise networks. After exploiting Citrix Bleed 2, they pivoted to Cisco ISE, deploying a custom web shell named IdentityAuditAction.
Disguised as a legitimate ISE component, the malicious file functioned as a persistent backdoor. Key features included:
These tactics demonstrate advanced technical knowledge of Java, Tomcat, and Cisco ISE — suggesting involvement from a well-funded Advanced Persistent Threat (APT) group.
Amazon could not attribute the attacks to any known threat actor, though the level of sophistication points to nation-state or state-sponsored resources. Oddly, the campaign did not seem targeted, which is rare for APTs who usually operate with surgical precision.
This may indicate attackers were testing the exploits or gathering reconnaissance before launching a broader campaign.
Read more: Top Zero-Day Vulnerabilities Exploited in 2025
This case offers several critical lessons:
At TecnetOne, we recommend a defense-in-depth strategy to counter zero-day threats. Key actions include:
This case proves even top vendors like Citrix and Cisco can be exploited before knowing their own flaws. Attackers now preemptively analyze enterprise software for unseen weak points.
In this environment, preventive cybersecurity is no longer optional — it's essential. Companies must anticipate attacks, reinforce internal controls, and monitor digital behavior 24/7.
At TecnetOne, we believe security should not be reactive but a continuous practice. Zero-day attacks are inevitable — but their impact can be drastically reduced with a strong strategy, full visibility, and a culture of cyber awareness.