On June 17, 2025, Citrix published a critical security bulletin about two vulnerabilities, CVE-2025-5349 and CVE-2025-5777, affecting NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (formerly Citrix Gateway). These vulnerabilities, if exploited, could potentially allow attackers to bypass access controls or cause memory overreads, thereby exposing sensitive data and posing significant risks to network security. Customers utilizing affected versions of NetScaler ADC and Gateway products are strongly urged to upgrade to patched versions.
1. CVE-2025-5349 – Improper Access Control on the NetScaler Management Interface
2. CVE-2025-5777 – Insufficient Input Validation Leading to Memory Overread
The following NetScaler ADC and NetScaler Gateway versions are vulnerable to the mentioned CVEs:
End of Life (EOL) versions 12.1 and 13.0 are vulnerable and no longer supported.
1. Customers are urged to upgrade to the patched versions. These bugs are fixed in:
2. After upgrading, Citrix recommends running the following commands to terminate all active ICA and PCoIP sessions across all upgraded NetScaler appliances:
This will ensure that no sessions remain active after the update, reducing the window for potential exploitation.
3. Users with EOL versions (12.1, 13.0) are advised to upgrade to supported versions to maintain security and functionality.
Enjoyed reading this Threat Intelligence Advisory? Stay updated with our latest exclusive content by following us on Twitter and LinkedIn
No related posts found.
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.
Keeping this cookie enabled helps us to improve our website.
Please enable Strictly Necessary Cookies first so that we can save your preferences!
This website uses the following additional cookies:
(List the cookies that you are using on the website here.)
More information about our Cookie Policy