Citrix issued an alert (06/17/2025) about a critical vulnerability (CVE-2025-5777) in all NetScaler (Citrix ADC) & Gateway systems. Another critical vulnerability was announced on 25th June 2025 (CVE-2025-6543).
Please note that simply updating the systems is not enough. You must terminate all active ICA and PCoIP sessions after all NetScaler appliances in the HA pair or cluster have been upgraded to the fixed builds (CVE-2025-5777).
Important ! There are no patches for NetScaler (Citrix ADC) version 12.1, 13.0 or older. These systems have reached their EOL and will therefore no longer be equipped with the necessary fix. In this case please update to the latest 13.1 or 14.1 version.
The vulnerabilities allows system compromise due to insufficient input validation, which can lead to a memory overread (CVE-2025-5777) or unintended control flow and DoS due to memory overflow (CVE-2025-6543).
Continue reading “Checklist for NetScaler (Citrix ADC) CVE-2025-5777 & CVE-2025-6543”