Skip to the content.

DIVD-2025-00037 - Critical vulnerabilities in Citrix ADC and Gateway systems

Our reference DIVD-2025-00037
Case lead Victor Pasman
Author Davy Aarts
Researcher(s)
CVE(s)
Products
  • Citrix ADC (NetScaler ADC)
  • Citrix Gateway (NetScaler Gateway)
Versions
  • NetScaler ADC and NetScaler Gateway 14.1 BEFORE 14.1-47.48
  • NetScaler ADC and NetScaler Gateway 13.1 BEFORE 13.1-59.22
  • NetScaler ADC 13.1-FIPS and NDcPP BEFORE 13.1-37.241-FIPS and NDcPP
  • NetScaler ADC 12.1-FIPS and NDcPP BEFORE 12.1-55.330-FIPS and NDcPP
Recommendation Update your system to the latest patched version
Patch status Fully patched
Status Open
Last modified 27 Aug 2025 09:45 CEST

Summary

On 26 August 2025, Citrix released security updates for vulnerabilities in Citrix ADC (formerly NetScaler ADC) and Citrix Gateway (formerly NetScaler Gateway) appliances. These vulnerabilities include memory overflows and improper access control, which may lead to remote code execution, denial of service, or unauthorized access.

The most critical issue, CVE-2025-7775, is a memory overflow vulnerability affecting appliances configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy), AAA virtual servers, or certain LB virtual servers bound to IPv6 services. Exploitation of unpatched appliances has been observed in the wild.

Additional vulnerabilities include:

These issues affect multiple versions, including 13.1, 14.1, 13.1-FIPS, 13.1-NDcPP, and older supported releases. Note: NetScaler ADC and NetScaler Gateway versions 12.1 and 13.0 are now End Of Life (EOL) and no longer supported. Users of those version are strongly advised to upgrade to a supported release that addresses these vulnerabilities.

Cloud-managed instances have already been patched by Citrix.

What you can do

To remediate CVE-2025-7775, CVE-2025-7776, and CVE-2025-8424, apply the latest patches as soon as possible for impacted products.

Recommended fixed versions:

Important: NetScaler ADC and Gateway versions 12.1 and 13.0 are End Of Life (EOL) and no longer supported. Users using these versions must upgrade to a supported release to address the vulnerabilities.

What we are doing

DIVD is currently scanning for vulnerable Citrix ADC and Gateway appliances and notifying affected parties.

Timeline

Date Description
26 Aug 2025 Citrix releases a security bulletin for CVE-2025-7775, CVE-2025-7776 and CVE-2025-8424
26 Aug 2025 DIVD started scanning for vulnerable servers
27 Aug 2025 First version of this case file
gantt title DIVD-2025-00037 - Critical vulnerabilities in Citrix ADC and Gateway systems dateFormat YYYY-MM-DD axisFormat %e %b %Y section Case DIVD-2025-00037 - Critical vulnerabilities in Citrix ADC and Gateway systems (still open) :2025-08-26, 2025-09-03 section Events Citrix releases a security bulletin for CVE-2025-7775, CVE-2025-7776 and CVE-2025-8424 : milestone, 2025-08-26, 0d DIVD started scanning for vulnerable servers : milestone, 2025-08-26, 0d First version of this case file : milestone, 2025-08-27, 0d

More information