312/68 Thursday, August 28, 2025

Citrix has released security patches to address three vulnerabilities affecting NetScaler ADC and NetScaler Gateway: CVE-2025-7775, CVE-2025-7776, and CVE-2025-8424. Notably, CVE-2025-7775 has already been confirmed as actively exploited on unpatched devices.
Vulnerability Details:
- CVE-2025-7775 (CVSS 9.2)
A memory overflow vulnerability that could lead to Remote Code Execution (RCE) or Denial of Service (DoS). This occurs when NetScaler is configured as a Gateway or AAA Virtual Server and connected to IPv6 Services. - CVE-2025-7776 (CVSS 8.8)
Another memory overflow vulnerability that may cause system crashes or DoS, particularly when NetScaler is configured as a Gateway with a PCoIP Profile bound. - CVE-2025-8424 (CVSS 8.7)
An Improper Access Control vulnerability affecting the NetScaler Management Interface, which could allow unauthorized access to NSIP, Cluster Management IP, Local GSLB Site IP, or SNIP, if management access is enabled.
Recommended Action
The Cloud Software Group strongly advises all users to update to the secure versions as follows:
- 14.1-47.48+
- 13.1-59.22+
- 13.1-FIPS/NDcPP 13.1-37.241+
- 12.1-FIPS/NDcPP 12.1-55.330+
There are no available workarounds, making prompt patching essential.
These vulnerabilities were reported by researchers from Horizon3.ai, Schramm & Partnerfor, and François Hämmerli.