On June 17, 2025, Citrix published a security advisory for CVE-2025-5777, followed by CVE-2025-6543 on June 25, 2025. Both are classified as critical and are actively being exploited in the wild.
Threat Overview
- CVE-2025-5777: Critical vulnerability due to improper input validation → leads to memory overread
- CVE-2025-6543: Enables memory overflow, potentially resulting in DoS or arbitrary code execution → Exploits available !
Continue reading “Checklist for NetScaler (Citrix ADC) CVE-2025-5777 & CVE-2025-6543”⚠️ Important: Simply applying the firmware update is not enough. You must manually terminate all active ICA and PCoIP sessions after patching to ensure the vulnerability is fully mitigated.