Citrix Fixes NetScaler Vulnerabilities, CVE-2025-7775 Actively Exploited

5g (1)

Citrix has rolled out critical security updates to fix three vulnerabilities affecting NetScaler ADC and NetScaler Gateway. Among them, one flaw is already being actively exploited in real-world attacks, according to the company.

Overview of the Vulnerabilities

  • CVE-2025-7775 (CVSS: 9.2) – Memory overflow issue that can lead to Remote Code Execution (RCE) or Denial-of-Service (DoS)
  • CVE-2025-7776 (CVSS: 8.8) – Memory overflow vulnerability that may trigger unpredictable behavior or DoS
  • CVE-2025-8424 (CVSS: 8.7) – Improper access control on the NetScaler Management Interface

Citrix confirmed that CVE-2025-7775 has been exploited on unpatched appliances but did not disclose further technical details.

Exploitation Requirements

Each flaw requires specific configurations for successful exploitation:

  • CVE-2025-7775 – Exploitable when NetScaler is set up as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server, and when load balancing (HTTP, SSL, HTTP_QUIC) uses IPv6 or DBS IPv6 servers, or when a CR virtual server with HDX type is configured.
  • CVE-2025-7776 – Exploitable if the Gateway is configured with a PCoIP Profile bound to it.
  • CVE-2025-8424 – Exploitable with access to NSIP, Cluster Management IP, local GSLB Site IP, or SNIP configured with management access.

Fixed Versions and Patch Availability

There are no temporary workarounds, but Citrix has resolved the flaws in the following versions:

  • NetScaler ADC and Gateway 14.1-47.48 and newer
  • NetScaler ADC and Gateway 13.1-59.22 and newer
  • NetScaler ADC 13.1-FIPS / 13.1-NDcPP – version 13.1-37.241 and newer
  • NetScaler ADC 12.1-FIPS / 12.1-NDcPP – version 12.1-55.330 and newer

The vulnerabilities were credited to Jimi Sebree (Horizon3.ai), Jonathan Hetzer (Schramm & Partnerfor), and François Hämmerli.

Growing Threat Landscape

CVE-2025-7775 adds to a series of high-profile Citrix flaws weaponized recently, following CVE-2025-5777 (Citrix Bleed 2) and CVE-2025-6543.

Just a day earlier, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added two Citrix Session Recording flaws (CVE-2024-8068 and CVE-2024-8069) to its Known Exploited Vulnerabilities (KEV) catalog.

CISA Adds CVE-2025-7775 to KEV

On August 26, 2025, CISA officially included CVE-2025-7775 in the KEV catalog. Federal Civilian Executive Branch (FCEB) agencies have been directed to apply the patch within 48 hours (by August 28).

According to CISA:

“Citrix NetScaler ADC and NetScaler Gateway contain a memory overflow vulnerability that could allow for remote code execution and/or Denial-of-Service.”