NetScaler: Memory overflow leading to unintended control flow and Denial of Service in Citrix NetScaler ADC and Gateway (CVE-2025-6543) #shorts
Summary
In today’s episode we cover CVE-2025-6543, a critical memory overflow vulnerability in Citrix NetScaler ADC and NetScaler Gateway. This flaw is actively exploited in the wild and can cause a denial of service or unintended code paths. Citrix has released emergency patches—if you run NetScaler in any capacity, you need to act now.
Product details
The products affected are Citrix NetScaler ADC and NetScaler Gateway in the following versions: • ADC 14.1 versions less than 47.46 • ADC 13.1 versions less than 59.19 • ADC 13.1 FIPS and NDcPP versions less than 37.236 • Gateway 14.1 versions less than 47.46 • Gateway 13.1 versions less than 59.19 • Gateway 13.1 FIPS and NDcPP versions less than 37.236 These appliances commonly serve as VPN virtual servers, ICA proxies, CVPN, RDP proxies or AAA servers.
Vulnerability type summary
This issue is classified under CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer. In plain terms, a specially crafted request can overflow internal memory buffers, leading to unintended control flow or a crash of the service.
Details of the vulnerability
When NetScaler ADC or Gateway is configured as a VPN virtual server, ICA Proxy, CVPN, RDP Proxy or AAA server, an attacker can send maliciously crafted packets that exceed expected buffer boundaries. The overflow corrupts internal data structures, which can: 1. Divert execution flow—potentially leading to remote code execution in future variants. 2. Trigger a denial of service by crashing the Citrix service. Security teams have observed active exploitation targeting enterprise remote access infrastructure. Citrix responded by issuing out-of-cycle patches on June 25, 2025. If you are running any affected version, you should immediately apply the updates.
Conclusion
CVE-2025-6543 is a high-risk buffer overflow in a widely deployed remote access product. Because it’s under active attack, patching cannot wait. Review your NetScaler ADC and Gateway versions, schedule downtime if necessary, and install the Citrix security fixes without delay. Stay safe and stay tuned for more security updates.
Watch the full video on YouTube: CVE-2025-6543
Remediation and exploitation details
This chain involves the following actors
- Malicious actor: Attacker exploiting a buffer overflow
- System administrator: Defender responsible for patching and configuration
This following systems are involved
- Citrix NetScaler ADC (Distribute and accelerate application traffic): Handles client connections, load balancing and security enforcement
- Citrix NetScaler Gateway (Provide secure remote access): Acts as a gateway for virtual private network connections and proxy services
Attack entry point
- VPN virtual server: Endpoint accepting remote access connections over virtual private network
- ICA Proxy service: Endpoint tunneling application sessions through the gateway
- AAA authentication service: Endpoint handling user login and authorization requests
Remediation actions
Exploitation actions
Service enumeration
- Scan network for open gateway ports
- Probe HTTP headers to identify software version
Reverse engineering
- Extract firmware or binary from updates
- Locate buffer size checks in authentication routines
Buffer overflow crafting
- Create input that exceeds the expected buffer length
- Embed specific pattern to overwrite adjacent memory
Network injection
- Send UDP or TCP packets carrying the crafted payload
- Space transmissions to evade simple rate limits
Buffer overflow execution
- Overflow input buffer causing adjacent memory overwrite
- Corrupt function return pointer or control data
Control flow manipulation
- Overwrite return address to redirect execution to attacker code
- Cause unexpected termination to achieve Denial of Service
Related Content
NOTE: The following related content has not been vetted and may be unsafe.
- https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694788
- [2025-06-26] Citrix releases emergency patches for actively exploited CVE-2025-6543 vulnerability in NetScaler ADC and Gateway.
- [2025-06-25] Citrix releases emergency patches for actively exploited CVE-2025-6543 in NetScaler ADC.
- [2025-06-30] Citrix NetScaler ADC and Gateway have a buffer overflow vulnerability that can lead to denial of service.