Triskele Labs Blog

Citrix CVE-2025-5349 and CVE-2025-5777

Written by Adam Skupien, Vulnerability Security Analyst | Jun 23, 2025 4:59:32 AM

Published: Mon 23 June 2025

Prepared by: Adam Skupien, Vulnerability Security Analyst

Purpose

This bulletin addresses two recently disclosed vulnerabilities, the High Severity CVE-2025-5349 and the Critical Severity CVE-2025-5777 present in Citrix NetScaler ADC and NetScaler Gateway appliances, which when exploited could result in the exposure of sensitive data.

On 20 June 2025, the Australian Cyber Security Centre (ACSC) issued an advisory on CVE-2025-5349 and CVE-2025-5777 urging organisations to mitigate the risk by following Citrix recommendations as outlined below. 

Vulnerability details

On 17 June 2025, Citrix published a vulnerability disclosure related to the following vulnerabilities:

  • CVE-2025-5349 Improper access control on the NetScaler Management Interface CVSS v4.0 Base Score 8.7
  • CVE-2025-5777 Insufficient input validation leading to memory overread CVSS v4.0 Base Score: 9.3

The vulnerabilities affect several versions of NetScaler ADC and NetScaler Gateway, as listed below:

  • NetScaler ADC and NetScaler Gateway 14.1 before 14.1-43.56
  • NetScaler ADC and NetScaler Gateway 13.1 before 13.1-58.32
  • NetScaler ADC 13.1-FIPS and NDcPP  before 13.1-37.235-FIPS and NDcPP
  • NetScaler ADC 12.1-FIPS before 12.1-55.328-FIPS

Impact

Exploitation of the vulnerabilities could result in exposure of sensitive data including credentials.

Mitigation actions

Customers with affected versions of NetScaler ADC and NetScaler Gateway are strongly urged to install the relevant updated versions as soon as possible. 

  • NetScaler ADC and NetScaler Gateway 14.1-43.56 and later releases
  • NetScaler ADC and NetScaler Gateway 13.1-58.32 and later releases of 13.1
  • NetScaler ADC 13.1-FIPS and 13.1-NDcPP 13.1-37.235 and later releases of 13.1-FIPS and 13.1-NDcPP
  • NetScaler ADC 12.1-FIPS 12.1-55.328 and later releases of 12.1-FIPS

Additionally, it is recommended to run the following commands to terminate all active ICA and PCoIP sessions after all NetScaler appliances in the HA pair or cluster have been upgraded to the fixed builds:

kill icaconnection -all

kill pcoipConnection -all

Detection capabilities

Customers who believe they may be affected are advised to verify their current version of NetScaler ADC or NetScaler Gateway and apply any necessary updates.

Triskele Labs customers leveraging our Vulnerability Scanning and Monitor (24×7 SIEM) services are being proactively assessed and monitored for indicators of compromise (IOCs) and signs of lateral movement.

References

https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/critical-vulnerabilities-citrix-netscaler-adc-and-netscaler-gateway-products

https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX693420&artic%5B%E2%80%A6%5Dteway_Security_Bulletin_for_CVE_2025_5349_and_CVE_2025_5777=