Critical Vulnerabilities on the Rise: Citrix Bleed 2, SharePoint Exploits, and the Race to Patch Faster

Marcus Ellison - Author avatar
Marcus Ellison
23 Oct 2025
5 min read
Digital illustration of a glowing padlock and clock surrounded by binary code, symbolizing critical cybersecurity vulnerabilities, system breaches, and the race against time to patch exploits.

AI-fueled cyberattacks are turning newly discovered vulnerabilities into active exploits within hours, leaving businesses racing to patch or risk compromise.”

The last few months have been a wake-up call for IT and business leaders alike. Citrix, Microsoft, Cisco, CrushFTP, even WinRAR — all dropped critical security alerts, and many of these flaws were already being exploited before the patches went live. The uncomfortable truth is that hackers, armed with AI, can now turn a newly discovered weakness into a working exploit in a matter of hours.

Take Citrix Bleed 2 (CVE-2025-5777). It allows attackers to hijack active sessions on NetScaler ADC and Gateway devices, bypassing even multi-factor authentication. In other words, your “strong” security controls don’t matter if the attacker is already inside your session. Another big one came from Microsoft: a SharePoint flaw (CVE-2025-53770) that let attackers forge machine keys and execute code remotely. That vulnerability has already been tied to a breach of Canada’s House of Commons.

Hacker in a hoodie working on multiple monitors with code and world map, representing cybercrime, data breaches, and cybersecurity threats.
Cybercriminal using multiple screens to launch a hacking attack in a dark control room.

Cisco’s firewall had a CVSS 10.0 flaw in its RADIUS subsystem, CrushFTP had a zero-day that gave attackers admin access, and WinRAR — yes, the decades-old file compression tool — was used to sneak in malware disguised as job application files. These aren’t niche products; they’re everywhere in business environments.

What’s different now is the AI factor. Researchers have shown that large language models can generate proof-of-concept exploit code in minutes. Attack groups like GTG-2002 are already automating reconnaissance, privilege escalation, and even ransom negotiations. The days of having “a few weeks to patch” are gone.

For business leaders, this changes patching from a maintenance task to a survival strategy. You can’t afford to treat updates as something IT handles once a quarter. The playbook must shift toward automation, risk-based prioritization, and aiming for a 72-hour patch turnaround on critical vulnerabilities.

Bottom Line: attackers are moving at machine speed. Your defenses have to keep up.

👉 Stay ahead of the threat—explore Calder & Lane’s Cybersecurity & Resilience solutions today.

secure my business
Marcus Ellison - Author avatar
Marcus Ellison
23 Oct 2025
5 min read