PT-2025-34761 · Citrix · Netscaler Gateway +1
Published
2025-08-26
·
Updated
2025-10-14
·
CVE-2025-7775
CVSS v3.1
9.8
9.8
Critical
Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Citrix NetScaler ADC and NetScaler Gateway versions prior to 14.1-47.48, 13.1-59.22, and 13.1-37.241-FIPS, and 12.1-55.330-FIPS
Description
Citrix NetScaler ADC and NetScaler Gateway contain a memory overflow vulnerability that allows for remote code execution (RCE) and/or denial of service (DoS). Exploitation of this vulnerability is actively observed in the wild. The vulnerability is present when NetScaler is configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server, or when LB virtual servers of type HTTP, SSL, or HTTP QUIC are bound with IPv6 services or service groups bound with IPv6 servers. It also affects CR virtual servers of type HDX. Over 28,000 instances are reportedly vulnerable and actively exploited. Attackers are leveraging tools like HexStrike-AI to rapidly exploit this flaw. The vulnerability allows for unauthenticated remote code execution.
Recommendations
Update to NetScaler ADC and NetScaler Gateway version 14.1-47.48 or later.
Update to NetScaler ADC and NetScaler Gateway version 13.1-59.22 or later.
Update to NetScaler ADC and NetScaler Gateway version 13.1-37.241-FIPS or later.
Update to NetScaler ADC and NetScaler Gateway version 12.1-55.330-FIPS or later.
Restrict admin pages from internet access using VPN/IP allowlists.
Check logs for hidden backdoors (“webshells”).
Fix
DoS
RCE
Buffer Overflow
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2025-10349
CVE-2025-7775
Affected Products
Netscaler Adc
Netscaler Gateway
References · 226
- https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694938 · Security Note, Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-7775 · Security Note
- https://bdu.fstec.ru/vul/2025-10349 · Security Note
- https://twitter.com/tadmaddad/status/1961584385687523536 · Twitter Post
- https://twitter.com/moton/status/1960475383750647898 · Twitter Post
- https://twitter.com/Shadowserver/status/1963182005073432654 · Twitter Post
- https://twitter.com/shah_sheikh/status/1960397200824942696 · Twitter Post
- https://twitter.com/f1tym1/status/1961361832418890149 · Twitter Post
- https://twitter.com/proficioinc/status/1961504127776919572 · Twitter Post
- https://twitter.com/ciberconsejo/status/1960634638805680468 · Twitter Post
- https://twitter.com/catnap707/status/1960453355018575930 · Twitter Post
- https://reddit.com/r/SecOpsDaily/comments/1n2d1vu/cve20257775_vulnerability_a_new_critical · Reddit Post
- https://twitter.com/securityaffairs/status/1960983594064584849 · Twitter Post
- https://t.me/ZerodayAlert/544 · Telegram Post
- https://reddit.com/r/cybersecurity/comments/1n1o9yh/cant_keep_up_with_cves_and_news_this_industry_is · Reddit Post