EUVD-2025-18494

| CVE-2025-5349 HIGH
2025-06-17 [email protected]
8.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 14, 2026 - 22:15 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 22:15 euvd
EUVD-2025-18494
PoC Detected
Aug 06, 2025 - 17:50 vuln.today
Public exploit code
CVE Published
Jun 17, 2025 - 13:15 nvd
HIGH 8.8

Description

Improper access control on the NetScaler Management Interface in NetScaler ADC and NetScaler Gateway

Analysis

Improper access control vulnerability in NetScaler ADC and NetScaler Gateway management interfaces that allows unauthenticated attackers on the adjacent network to gain high-impact unauthorized access (confidentiality, integrity, and availability compromise) without requiring user interaction. This is a critical flaw affecting widely-deployed Citrix infrastructure used by enterprises for application delivery and remote access, with high CVSS 8.8 score reflecting the severity of direct control plane compromise.

Technical Context

This vulnerability stems from CWE-1284 (Improper Validation of Specified Quantity in Input), which manifests as broken access control on the NetScaler Management Interface—the administrative console used to configure and manage ADC (Application Delivery Controller) and Gateway (remote access/VPN) appliances. The management interface likely fails to properly validate authentication tokens, session identifiers, or access control lists when processing administrative API requests or web console interactions. NetScaler products run on dedicated hardware appliances (CPE: cpe:2.3:a:citrix:netscaler_adc and cpe:2.3:a:citrix:netscaler_gateway) and manage north-south traffic for applications, making the management interface a critical security boundary. The adjacent network attack vector (AV:A) indicates the attacker must be on the same network segment or have network-layer proximity, suggesting this could be exploited via ARP spoofing, VLAN hopping, or from a compromised internal host—not from the internet directly.

Affected Products

Citrix NetScaler ADC (all versions unless patched; CPE: cpe:2.3:a:citrix:netscaler_adc:*) and Citrix NetScaler Gateway (all versions unless patched; CPE: cpe:2.3:a:citrix:netscaler_gateway:*). The vulnerability affects the management interface component across supported versions. Specific version ranges should be cross-referenced with Citrix security advisory CVSS-2025-5349 (vendor advisory expected to specify affected versions e.g., ADC/Gateway 13.0, 13.1, 14.0, 14.1 series and newer, with patched versions typically available in maintenance releases). Physical hardware appliances and virtualized instances (NetScaler VPX) are both affected.

Remediation

1. Immediate: Apply vendor patches from Citrix security advisory—expect patches for current supported branches (typically latest minor versions in 13.1-lts, 14.1, 15.0+ tracks). 2. Verify patched version installation via CLI or web console and reboot appliances if required. 3. Interim mitigation while patches are tested: Restrict network access to the management interface via firewall ACLs—limit management plane (port 443 HTTPS, port 80 HTTP, SSH port 22) to trusted administrative subnets only; implement network segmentation ensuring management interfaces are not reachable from untrusted network segments or user LANs. 4. Monitor for exploitation: Enable and review audit logs on the management interface for unauthorized access attempts, configuration changes, or API calls from unexpected sources. 5. Change administrative credentials post-patch to invalidate any potentially leaked session tokens. Detailed patch versions and advisory links should be obtained from Citrix Security Bulletin (reference to Citrix CVSS-2025-5349 or NetScaler security advisory).

Priority Score

64
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +44
POC: +20

Share

EUVD-2025-18494 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy