Citrix NetScaler ADC and NetScaler Gateway Vulnerabilities
What is the Vulnerability?Citrix has published security advisories addressing three critical vulnerabilities, CVE-2025-6543, CVE-2025-5349, and CVE-2025-5777, affecting the NetScaler ADC and NetScaler Gateway under specific pre-conditions.CVE-2025-6543: A memory overflow vulnerability leading to unintended control flow and Denial of Service in NetScaler ADC and NetScaler Gateway when configured as Gateway (VPN virtual server, ICA Proxy, CVPN,…
What is the Vulnerability?Citrix has published security advisories addressing three critical vulnerabilities, CVE-2025-6543, CVE-2025-5349, and CVE-2025-5777, affecting the NetScaler ADC and NetScaler Gateway under specific pre-conditions.CVE-2025-6543: A memory overflow vulnerability leading to unintended control flow and Denial of Service in NetScaler ADC and NetScaler Gateway when configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server. Citrix reports that exploitation of CVE-2025-6543 against unmitigated appliances has been observed.CVE-2025-5349: An improper access control on the NetScaler Management Interface. CVE-2025-5777: A flaw due to insufficient input validation, potentially causing memory overreads.As of now, there have been no reports of CVE-2025-5777 and CVE-2025-5349 exploitation.What is the recommended Mitigation?The organizations using Citrix NetScaler ADC and NetScaler Gateway appliances are strongly recommended to:Review the official Citrix security bulletins linked below.Apply all relevant patches and updates immediatelyMonitor for any suspicious activityWhat FortiGuard Coverage is available?FortiGuard recommends users to apply the fix provided by the vendor and follow instructions as mentioned on the vendor’s advisory.FortiGuard IPS protection coverage is currently under evaluation and will be updated as signatures become available.The FortiGuard Incident Response team can be engaged to help with any suspected compromise.