DIVD-2025-00031 - Critical vulnerabilities in Citrix ADC and Gateway systems
Our reference | DIVD-2025-00031 |
Case lead | Davy Aarts |
Author | Victor Pasman |
Researcher(s) | |
CVE(s) | |
Products |
|
Versions |
|
Recommendation | Update your system to the latest patched version |
Patch status | Fully patched |
Status | Open |
Last modified | 11 Jul 2025 11:34 CEST |
Summary
On 18 June 2025 and 25 June 2025, Citrix released patches for vulnerabilities in Citrix ADC (formerly NetScaler ADC) and Citrix Gateway (formerly NetScaler Gateway) appliances. These vulnerabilities affect systems configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server and may lead to memory overreads (CVE-2025-5777) or memory overflow with unintended control flow and Denial of Service (CVE-2025-6543).
Exploitation of unpatched appliances has been observed.
What you can do
To remediate CVE-2025-5777 and CVE-2025-6543, apply the patch as soon as possible for impacted products. Latest patch builds are available via Citrix Support.
For impacted 13.1-FIPS and 13.1-NDcPP builds, customers should contact Citrix support to obtain the necessary versions.
What we are doing
DIVD is currently scanning for vulnerable Citrix ADC and Gateway appliances and notifying affected parties.
Timeline
Date | Description |
---|---|
18 Jun 2025 | Citrix releases a security bulletin for CVE-2025-5777 and CVE-2025-5349 |
24 Jun 2025 | DIVD started scanning for vulnerable servers |
25 Jun 2025 | Citrix releases a security bulletin for CVE-2025-6543 |
26 Jun 2025 | First version of this case file |
26 Jun 2025 | DIVD sent out a first batch of notifications. |
10 Jul 2025 | DIVD started scanning for second time for vulnerable servers |
11 Jul 2025 | DIVD sent out a second batch of notifications. |
More information
- CVE-2025-5777
- CVE-2025-6543
- NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2025-5777
- NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2025-6543
- New’s article the hacker news