CVE-2025-7775

CRITICAL
2025-08-26 [email protected]
9.2
CVSS 4.0
Share

CVSS Vector

CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
X

Lifecycle Timeline

3
Analysis Generated
Mar 28, 2026 - 19:08 vuln.today
Added to CISA KEV
Oct 24, 2025 - 13:42 cisa
CISA KEV
CVE Published
Aug 26, 2025 - 13:15 nvd
CRITICAL 9.2

Description

Memory overflow vulnerability leading to Remote Code Execution and/or Denial of Service in NetScaler ADC and NetScaler Gateway when NetScaler is configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server (OR) NetScaler ADC and NetScaler Gateway 13.1, 14.1, 13.1-FIPS and NDcPP: LB virtual servers of type (HTTP, SSL or HTTP_QUIC) bound with IPv6 services or servicegroups bound with IPv6 servers (OR) NetScaler ADC and NetScaler Gateway 13.1, 14.1, 13.1-FIPS and NDcPP: LB virtual servers of type (HTTP, SSL or HTTP_QUIC) bound with DBS IPv6 services or servicegroups bound with IPv6 DBS servers (OR) CR virtual server with type HDX

Analysis

Citrix NetScaler ADC and Gateway contain a memory overflow vulnerability enabling remote code execution and denial of service when configured as VPN, AAA, or load balancing virtual servers.

Technical Context

The CWE-119 memory overflow in NetScaler's request processing affects devices configured as Gateway (VPN, ICA Proxy, CVPN, RDP Proxy), AAA virtual server, or load balancer, covering virtually all deployment scenarios.

Affected Products

['NetScaler ADC and Gateway 13.1, 14.1, 13.1-FIPS, NDcPP']

Remediation

Apply Citrix patches immediately. Monitor for exploitation indicators. Consider the ongoing pattern of NetScaler vulnerabilities when evaluating platform risk.

Priority Score

103
Low Medium High Critical
KEV: +50
EPSS: +6.6
CVSS: +46
POC: 0

Share

CVE-2025-7775 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy