Critical vulnerabilities in Citrix NetScaler ADC and Gateway - Active exploitation observed
On August 26, 2025, Citrix released security updates for critical vulnerabilities in NetScaler ADC and NetScaler Gateway. According to Citrix, the vulnerability CVE-2025-7775 is currently being actively exploited on unpatched systems.

T-Update
This live blog contains information about the critical vulnerabilities in Citrix NetScaler ADC and Gateway (CVE-2025-7775, CVE-2025-7776, and CVE-2025-8424). Citrix has released security updates to address these vulnerabilities. Threat actors can exploit the vulnerabilities for Denial of Service and potentially for executing arbitrary code on vulnerable systems. Last update on August 27, 2025.
Background
On August 26, 2025, Citrix released security updates for critical vulnerabilities in NetScaler ADC and NetScaler Gateway. According to the NCSC, the vulnerabilities (CVE-2025-7775, CVE-2025-7776, and CVE-2025-8424) involve memory overflow and an improper access control configuration. These flaws allow an attacker, without authentication, to perform Denial of Service attacks and execute arbitrary code on affected systems.
Risk
Citrix reports that active exploitation of CVE-2025-7775 has been observed on unpatched systems. It is therefore important to patch systems as quickly as possible and check for compromise.
The vulnerabilities have a critical impact and are expected to receive CVSS scores in the high category (9.0+). The vulnerabilities apply to the following versions:
- NetScaler ADC en Gateway 14.1 (before build 14.1-17.50)
- NetScaler ADC en Gateway 13.1 (before build 13.1-51.15)
- NetScaler ADC en Gateway 13.0 (before build 13.0-92.20)
Successful exploitation can lead to:
- Complete takeover of the device;
- Execution of arbitrary code;
- Access to internal networks and data.
Advice
Citrix strongly advises customers to install the following versions, which address the vulnerabilities:
- NetScaler ADC and NetScaler Gateway 14.1-47.48 and later releases
- NetScaler ADC and NetScaler Gateway 13.1-59.22 and later releases from 13.1
- NetScaler ADC 13.1-FIPS en 13.1-NDcPP 13.1-37.241 and later releases from 13.1-FIPS en 13.1-NDcPP
- NetScaler ADC 12.1-FIPS en 12.1-NDcPP 12.1-55.330 and later releases from 12.1-FIPS en 12.1-NDcPP
Note: NetScaler ADC and NetScaler Gateway versions 12.1 and 13.0 are End Of Life (EOL) and are no longer supported. Citrix recommends that customers upgrade their appliances to one of the supported versions that address these vulnerabilities
Additional measures:
- Check systems for signs of compromise using the Webshell Detection Script for Citrix NetScaler appliances created by the NCSC
- Restrict access to the management interface of NetScaler ADC and Gateway to trusted IP addresses.
- Actively monitor for suspicious login attempts, unexpected network connections, and configuration changes.
Sign up to receive T-Updates
Receive the latest vulnerabilities in your email every Wednesday
More than 1,000 organisations have already joined us.