Multiple vulnerabilities in NetScaler ADC and NetScaler Gateway



| Updated: 2025-06-23
Risk High
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2025-5777
CVE-2025-5349
CWE-ID CWE-125
CWE-284
Exploitation vector Network
Public exploit N/A
Vulnerable software
Citrix Netscaler ADC
Client/Desktop applications / Software for system administration

Citrix NetScaler Gateway
Server applications / Application servers

Vendor Citrix

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Out-of-bounds read

EUVDB-ID: #VU111237

Risk: High

CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2025-5777

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition. A remote attacker can send specially crafted data to the server, trigger an out-of-bounds read error and read contents of memory on the system.

Successful exploitation of the vulnerability requires that NetScaler is configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Citrix Netscaler ADC: 12.0 - 14.1-43.50

Citrix NetScaler Gateway: 13.0-36.27 - 14.1-43.50

CPE2.3 External links

https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX693420


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Improper access control

EUVDB-ID: #VU111236

Risk: High

CVSSv4.0: 6.3 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2025-5349

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions in NetScaler Management Interface. A remote non-authenticated attacker with access to NSIP, Cluster Management IP or local GSLB Site IP can bypass implemented security restrictions and gain unauthorized access to the application.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Citrix Netscaler ADC: 12.0 - 14.1-43.50

Citrix NetScaler Gateway: 13.0-36.27 - 14.1-43.50

CPE2.3 External links

https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX693420


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###