CVE-2025-7775

9.8 CRITICAL CISA KEV

📋 TL;DR

A memory overflow vulnerability in NetScaler ADC and NetScaler Gateway allows remote attackers to execute arbitrary code or cause denial of service. Affected systems include those configured as VPN gateways, AAA servers, or load balancers with specific IPv6 configurations. This vulnerability affects multiple versions including 13.1 and 14.1.

💻 Affected Systems

Products:
  • NetScaler ADC
  • NetScaler Gateway
Versions: 13.1, 14.1, 13.1-FIPS, NDcPP
Operating Systems: NetScaler OS
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when configured as: Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy), AAA virtual server, LB virtual servers (HTTP, SSL, HTTP_QUIC) bound with IPv6 services, or CR virtual server with type HDX.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data exfiltration, and lateral movement within the network.

🟠

Likely Case

Denial of service causing service disruption for VPN users and load-balanced applications.

🟢

If Mitigated

Limited impact with proper network segmentation and intrusion prevention systems in place.

🌐 Internet-Facing: HIGH - Directly exploitable from the internet on exposed VPN and load balancing services.
🏢 Internal Only: MEDIUM - Still exploitable from internal networks but with reduced attack surface.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CISA has added this to their Known Exploited Vulnerabilities catalog, indicating active exploitation is likely.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Citrix advisory CTX694938 for specific fixed versions

Vendor Advisory: https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694938

Restart Required: Yes

Instructions:

1. Review Citrix advisory CTX694938. 2. Download appropriate firmware updates. 3. Apply patches during maintenance window. 4. Reboot affected appliances.

🔧 Temporary Workarounds

Disable IPv6 on vulnerable configurations

all

Remove IPv6 bindings from affected LB virtual servers and service groups

nscli -U <nsroot> -P <password> -s <NSIP> -c "unbind lb vserver <vserver_name> -serviceName <service_name> -ipv6"

Network segmentation

all

Restrict access to vulnerable services using firewall rules

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure to vulnerable services
  • Deploy intrusion prevention systems with signatures for this CVE

🔍 How to Verify

Check if Vulnerable:

Check NetScaler configuration for vulnerable setups: Gateway virtual servers, AAA virtual servers, or LB virtual servers with IPv6 bindings

Check Version:

nscli -U <nsroot> -P <password> -s <NSIP> -c "show ns version"

Verify Fix Applied:

Verify firmware version is updated to patched version and vulnerable configurations are removed

📡 Detection & Monitoring

Log Indicators:

  • Unusual memory allocation patterns
  • Crash logs from NetScaler processes
  • Failed service restarts

Network Indicators:

  • Unexpected connections to vulnerable ports
  • Malformed IPv6 packets to NetScaler services

SIEM Query:

source="netscaler*" AND (event_type="CRASH" OR memory_usage>threshold) OR dest_port IN (80, 443, 2598) AND ip_version=6

🔗 References

📤 Share & Export