Citrix patches actively exploited critical flaw in NetScaler ADC

Citrix patches actively exploited critical flaw in NetScaler ADC

Citrix has released urgent security updates to fix a critical vulnerability in NetScaler ADC and NetScaler Gateway that is currently being exploited in the wild.

The flaw, tracked as CVE-2025-6543, is described as a memory overflow issue that could lead to unintended control flow or denial-of-service (DoS). Successful exploitation requires that the appliance be configured as a Gateway or AAA virtual server, such as for VPN, ICA Proxy, CVPN, or RDP Proxy.

The vulnerability affects NetScaler ADC and Gateway 14.1 before 14.1-47.46; NetScaler ADC and Gateway 13.1 before 13.1-59.19; NetScaler ADC and Gateway 13.0 and 12.1 (both end-of-life); NetScaler ADC 13.1-FIPS and NDcPP before 13.1-37.236.

Citrix has confirmed that exploitation has been observed on unpatched systems, though details of the attacks have not been disclosed. The company urged customers using impacted builds to immediately upgrade to the recommended versions.

The advisory follows a fix for another critical vulnerability, CVE-2025-5777, also targeting NetScaler ADC.

Meanwhile, the US Cybersecurity and Infrastructure Security Agency (CISA) added three more exploited vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog:

CVE-2024-54085 – An authentication bypass in AMI MegaRAC allowing full remote control.

CVE-2024-0769 – A path traversal flaw in the now end-of-life D-Link DIR-859 router.

CVE-2019-6693 – A hard-coded key vulnerability in Fortinet products linked to the Akira ransomware group.

Back to the list

Latest Posts

Google patches Chrome zero-day allowing sandbox escape

Google patches Chrome zero-day allowing sandbox escape

The flaw stems from insufficient validation of untrusted input in ANGLE and GPU.
16 July 2025
Ukrainian police dismantle major server network used for malware distribution

Ukrainian police dismantle major server network used for malware distribution

Authorities identified a 33-year-old French national as the organizer of the illegal operation.
16 July 2025
Russian NoName057(16) hacktivist group behind cyberattacks on European infrastructure dismantled

Russian NoName057(16) hacktivist group behind cyberattacks on European infrastructure dismantled

The operation resulted in seven international arrest warrants, including for two alleged ringleaders residing in Russia.
16 July 2025