Uncategorized

Critical 0-Day RCE Vulnerability in Citrix NetScaler ADC & Gateway Under Active Exploitation

A critical security bulletin warning that attackers are actively exploiting a zero-day remote code execution vulnerability in NetScaler ADC and Gateway products.

The vulnerability, tracked as CVE-2025-7775, has achieved a critical CVSS v4.0 base score of 9.2 and enables attackers to execute arbitrary code remotely on vulnerable systems.

The security bulletin, published on August 26, 2025, reveals that exploits targeting CVE-2025-7775 on unmitigated appliances have already been observed in the wild, prompting urgent patching recommendations from the vendor.

This marks another significant security incident for the NetScaler platform, which has faced multiple critical vulnerabilities in recent years.

The security bulletin addresses three distinct vulnerabilities affecting NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (formerly Citrix Gateway) deployments.

CVE-2025-7775 represents the most severe threat, classified as a memory overflow vulnerability that can lead to both remote code execution and denial of service conditions.

The vulnerability specifically impacts NetScaler instances configured as Gateway services, including VPN virtual servers, ICA Proxy, CVPN, and RDP Proxy configurations.

Additionally, load balancing virtual servers of HTTP, SSL, or HTTP_QUIC types that are bound with IPv6 services or service groups are also susceptible to exploitation.

CVE-2025-7776, assigned a CVSS score of 8.8, represents another memory overflow vulnerability affecting NetScaler Gateway configurations with PCoIP Profile bindings.

This vulnerability can result in unpredictable system behavior and denial of service attacks. The third vulnerability, CVE-2025-8424 (CVSS 8.7), involves improper access control on the NetScaler Management Interface, potentially allowing unauthorized access to critical system functions.

CVE IDCVSS ScoreVulnerability TypeAttack Vector
CVE-2025-77759.2Memory Overflow/RCENetwork
CVE-2025-77768.8Memory Overflow/DoSNetwork
CVE-2025-84248.7Access ControlAdjacent Network

Critical 0-Day RCE Vulnerability

The vulnerabilities affect multiple supported NetScaler versions, with NetScaler ADC and Gateway 14.1 versions prior to 14.1-47.48 and 13.1 versions before 13.1-59.22 requiring immediate updates.

FIPS and NDcPP variants are also impacted, with specific patch requirements for 13.1-FIPS builds before 13.1-37.241 and 12.1-FIPS versions prior to 12.1-55.330.

Cloud Software Group has emphasized that Secure Private Access on-premises and hybrid deployments using NetScaler instances are equally vulnerable and require upgrading to recommended builds.

The vendor notes that customer-managed NetScaler deployments require manual patching, while Citrix-managed cloud services and Adaptive Authentication will receive automatic updates.

Organizations can identify vulnerable configurations by inspecting their NetScaler configurations for specific strings, including authentication virtual servers (add authentication vserver), VPN virtual servers (add vpn vserver), and load balancing configurations with IPv6 bindings.

The bulletin provides detailed configuration checks to help administrators determine their exposure to these vulnerabilities.

Threat Intelligence Community Response

The vulnerabilities were discovered through coordinated security research efforts, with Cloud Software Group acknowledging Jimi Sebree of Horizon3.ai, Jonathan Hetzer of Schramm & Partner, and François Hämmerli for their responsible disclosure practices.

This collaborative approach between security researchers and vendors demonstrates the importance of coordinated vulnerability disclosure in protecting enterprise infrastructure.

The active exploitation of CVE-2025-7775 underscores the critical nature of this security update, as threat actors have already begun targeting vulnerable NetScaler deployments.

Organizations operating these systems should prioritize immediate patching and consider implementing additional network-level protections while updates are deployed.

Given the critical nature of these vulnerabilities and confirmed active exploitation, administrators should treat this as an emergency patching cycle and establish comprehensive monitoring for any signs of compromise on their NetScaler infrastructure.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.

Ethan Brooks

Ethan Brooks is a Senior cybersecurity journalist passionate about threat intelligence and data privacy. His work highlights cyber attacks, hacking, security culture, and cybercrime with The Cyber News.

Recent Posts

Burp Suite Supercharges Its Scanning Capabilities With React2Shell Vulnerability Detection

PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…

4 months ago

Malicious MCP Servers Enable New Prompt Injection Attack To Drain Resources

Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…

4 months ago

Law Enforcement Detains Hackers Equipped With Specialized Flipper Hacking Tools

Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…

4 months ago

Google Unveils 10 New Gemini-Powered AI Features For Chrome

Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…

4 months ago

CISA Alerts On Actively Exploited Buffer Overflow Flaw In D-Link Routers

Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…

4 months ago

Over 500 Apache Tika Toolkit Instances Exposed To Critical XXE Vulnerability

Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…

4 months ago