NetScaler ADC/Gateway: Citrix NetScaler memory overflow vulnerability leading to remote code execution or denial of service (CVE-2025-7775) #shorts

Summary

Hello and welcome to Cyber Alert Weekly. In today’s episode we’re diving into CVE-2025-7775, a critical memory overflow vulnerability in Citrix NetScaler ADC and Gateway appliances. Actively exploited in the wild and now cataloged by CISA, this zero-day flaw can lead to remote code execution or denial of service. We’ll break down what’s affected, how it works, and what you need to do right now.

Product details

This issue impacts Citrix NetScaler ADC and NetScaler Gateway versions 14.1, 13.1 (including FIPS and NDcPP builds), and 12.1 FIPS/NDcPP when running builds older than 47.48 on 14.1, 59.22 on 13.1, 37.241 on 13.1 FIPS/NDcPP, and 55.330 on 12.1 FIPS/NDcPP. A variety of virtual server types are affected, including VPN, ICA Proxy, CVPN, RDP Proxy, AAA, HTTP, SSL, HTTP_QUIC, IPv6-bound servicegroups, and HDX CR virtual servers.

Vulnerability type summary

CVE-2025-7775 is categorized under CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer. In plain terms, certain input lengths aren’t properly validated, allowing an attacker to overflow a buffer, corrupt memory, and seize control of the device or crash critical services.

Details of the vulnerability

When NetScaler is configured as a Gateway (such as VPN virtual servers or AAA servers) or hosts IPv6-bound load balancing services—HTTP, SSL, HTTP_QUIC or DBS servers—an attacker can send a specially crafted packet that overruns an internal buffer. Successful exploitation grants remote code execution or can trigger a denial of service. Reports indicate this flaw has been weaponized in targeted campaigns against U.S. corporations, prompting CISA to add it to its Known Exploited Vulnerabilities catalog. Citrix has released out-of-band patches to address this zero-day, alongside fixes for two additional NetScaler bugs.

Conclusion

If you run Citrix NetScaler ADC or Gateway, assume you’re vulnerable until you’ve applied the official patches. Upgrade immediately to the fixed builds—47.48 or later on 14.1, 59.22 or later on 13.1, and the corresponding FIPS/NDcPP updates. Review your VPN, ICA, RDP and IPv6 load balancing configurations, monitor logs for suspicious traffic, and consider isolating appliance management interfaces. That wraps up today’s alert—stay safe, and keep your infrastructure patched.

Watch the full video on YouTube: CVE-2025-7775

Remediation and exploitation details

This chain involves the following actors

  • Malicious threat actor: Exploiter
  • System administrator: Remediator

This following systems are involved

  • Citrix NetScaler ADC (Application delivery controller): Primary target
  • Citrix NetScaler Gateway (Secure remote access gateway): Primary target

Attack entry point

  • VPN virtual server: Gateway mode with ICA Proxy or RDP Proxy enabled
  • AAA virtual server: Authentication, authorization, and auditing endpoint
  • HTTP/SSL load-balancing virtual server: Bound with IPv6 back-end services or service groups
  • HDX virtual server: Citrix XenApp HDX traffic endpoint

Remediation actions

System administrator
Apply official Citrix patch
NetScaler ADC/Gateway
System administrator
Upgrade firmware to fixed version
NetScaler ADC/Gateway
System administrator
Restrict management interface access
NetScaler ADC/Gateway
System administrator
Monitor logs for repeated oversized requests
NetScaler ADC/Gateway

Exploitation actions

Banner grab and fingerprinting

Malicious threat actor
Version reconnaissance
NetScaler ADC/Gateway
Examples:
  • Send an HTTPS GET / request to the appliance and read version info from the response header.
  • Use automated script to scan IP range for Citrix logos and version strings.

Custom exploit code assembly

Malicious threat actor
Exploit packaging
Local attacker machine
Examples:
  • Compile proof-of-concept code that allocates a large memory buffer.
  • Embed overflow payload that overwrites function return pointer.

Oversized request to bound IPv6 service

Malicious threat actor
Triggering memory overflow
Configured VPN or HTTP vserver
Examples:
  • Send a crafted HTTP header field over 65,536 bytes to an IPv6-bound SSL virtual server.
  • Submit a malformed AAA login request with excessive attribute length.

Return-oriented programming in overflowed stack

Malicious threat actor
Code injection and execution
NetScaler ADC/Gateway
Examples:
  • Overwrite saved instruction pointer to jump to shell-binding payload.
  • Spawn a remote shell on TCP port 4444 for arbitrary command execution.

Heap corruption and service crash

Malicious threat actor
Denial of service
NetScaler ADC/Gateway
Examples:
  • Send repeated overflow attempts to exhaust memory and crash the management service.
  • Flood the vserver with malformed HDX packets to force appliance reboot.

Related Content

NOTE: The following related content has not been vetted and may be unsafe.

CVE database technical details

CVE ID
CVE-2025-7775
Description
Memory overflow vulnerability leading to Remote Code Execution and/or Denial of Service in NetScaler ADC and NetScaler Gateway when NetScaler is configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server (OR) NetScaler ADC and NetScaler Gateway 13.1, 14.1, 13.1-FIPS and NDcPP: LB virtual servers of type (HTTP, SSL or HTTP_QUIC) bound with IPv6 services or servicegroups bound with IPv6 servers (OR) NetScaler ADC and NetScaler Gateway 13.1, 14.1, 13.1-FIPS and NDcPP: LB virtual servers of type (HTTP, SSL or HTTP_QUIC) bound with DBS IPv6 services or servicegroups bound with IPv6 DBS servers (OR) CR virtual server with type HDX
Provider
Citrix
CWE / problem types
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Affected Software Versions
NetScaler:ADC:[{'lessThan': '47.48', 'status': 'affected', 'version': '14.1', 'versionType': 'patch'}, {'lessThan': '59.22', 'status': 'affected', 'version': '13.1', 'versionType': 'patch'}, {'lessThan': '37.241', 'status': 'affected', 'version': '13.1 FIPS and NDcPP', 'versionType': 'patch'}, {'lessThan': '55.330', 'status': 'affected', 'version': '12.1 FIPS and NDcPP', 'versionType': 'patch'}],NetScaler:Gateway:[{'lessThan': '47.48', 'status': 'affected', 'version': '14.1', 'versionType': 'patch'}, {'lessThan': '59.22', 'status': 'affected', 'version': '13.1', 'versionType': 'patch'}, {'lessThan': '37.241', 'status': 'affected', 'version': '13.1 FIPS and NDcPP', 'versionType': 'patch'}, {'lessThan': '55.330', 'status': 'affected', 'version': '12.1 FIPS and NDcPP', 'versionType': 'patch'}]
Date Published
2025-08-26T12:56:53.794Z
Last Updated
2025-08-26T22:20:23.714Z