Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      React.js for SaaS Platforms: How Top Development Teams Help Startups Launch Faster

      August 3, 2025

      Upwork Freelancers vs Dedicated React.js Teams: What’s Better for Your Project in 2025?

      August 1, 2025

      Is Agile dead in the age of AI?

      August 1, 2025

      Top 15 Enterprise Use Cases That Justify Hiring Node.js Developers in 2025

      July 31, 2025

      Unplugging these 7 common household devices helped reduce my electricity bills

      August 3, 2025

      DistroWatch Weekly, Issue 1133

      August 3, 2025

      Anthropic beats OpenAI as the top LLM provider for business – and it’s not even close

      August 2, 2025

      I bought Samsung’s Galaxy Watch Ultra 2025 – here’s why I have buyer’s remorse

      August 2, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The details of TC39’s last meeting

      August 3, 2025
      Recent

      The details of TC39’s last meeting

      August 3, 2025

      Enhancing Laravel Queries with Reusable Scope Patterns

      August 1, 2025

      Everything We Know About Livewire 4

      August 1, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      DistroWatch Weekly, Issue 1133

      August 3, 2025
      Recent

      DistroWatch Weekly, Issue 1133

      August 3, 2025

      Newelle, a ‘Virtual Assistant’ for GNOME, Hits Version 1.0

      August 3, 2025

      Bustle – visualize D-Bus activity

      August 3, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Two High-Severity Flaws Found in NetScaler Products: CVE-2025-5349 and CVE-2025-5777

    Two High-Severity Flaws Found in NetScaler Products: CVE-2025-5349 and CVE-2025-5777

    June 19, 2025

    CVE-2025-5349

    Cloud Software Group has released a security bulletin warning customers of two newly identified vulnerabilities, CVE-2025-5349 and CVE-2025-5777, affecting both NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (formerly Citrix Gateway).  

    CVE-2025-5349 has been classified as an improper access control issue affecting the NetScaler Management Interface. This flaw allows unauthorized users to potentially gain elevated access if they can connect via NSIP, Cluster Management IP, or the local GSLB Site IP. It has been assessed under the Common Weakness Enumeration (CWE) as CWE-284 and has been assigned a CVSS v4.0 base score of 8.7, signaling a high-severity vulnerability. 

    The second vulnerability, CVE-2025-5777, results from insufficient input validation, leading to a memory overread condition. The flaw is exploitable only when NetScaler is configured as a Gateway, such as through VPN virtual servers, ICA Proxy, CVPN, RDP Proxy, or AAA virtual servers. This issue is classified under CWE-125: Out-of-bounds Read, with a CVSS v4.0 base score of 9.3, making it even more critical than the first. 

    Affected Versions 

    The following versions of NetScaler ADC and NetScaler Gateway are impacted: 

    • Versions 14.1 before 14.1-43.56 
    • Versions 13.1 before 13.1-58.32 
    • 13.1-FIPS and 13.1-NDcPP before build 13.1-37.235-FIPS and NDcPP 
    • 12.1-FIPS before build 12.1-55.328-FIPS 

    It is important to note that versions 12.1 and 13.0 are now designated as End of Life (EOL). As a result, these versions are no longer supported and are vulnerable to both CVE-2025-5349 and CVE-2025-5777. Customers still operating on these legacy builds are strongly encouraged to migrate to currently supported versions immediately. 

    Additionally, organizations using Secure Private Access in on-premises or hybrid deployment modes that rely on NetScaler instances are also affected. Cloud Software Group emphasizes that these setups must also be upgraded to the specified secure builds to ensure complete protection. 

    Remediation for CVE-2025-5349 and CVE-2025-5777 

    To address these critical vulnerabilities, Cloud Software Group advises customers to upgrade to the following versions: 

    • NetScaler ADC and NetScaler Gateway 14.1-43.56 or later 
    • NetScaler ADC and NetScaler Gateway 13.1-58.32 or later 
    • NetScaler ADC 13.1-FIPS and 13.1-NDcPP 13.1-37.235 or later 
    • NetScaler ADC 12.1-FIPS 12.1-55.328 or later 

    After upgrading, administrators are also advised to terminate all active ICA and PCoIP sessions using the following commands to ensure no lingering session-based vulnerabilities: 

    bash 

    CopyEdit 

    kill icaconnection -all
    kill pcoipConnection -all
     

    These commands should be run only after all appliances in an HA pair or cluster are fully updated to the secure builds. 

    These vulnerabilities specifically impact customer-managed instances of Citrix ADC (NetScaler ADC) and Citrix Gateway (NetScaler Gateway). Customers utilizing Citrix-managed cloud services or Citrix Adaptive Authentication do not need to take action, as Cloud Software Group handles all necessary updates for those environments. 

    Conclusion 

    Cloud Software Group extended its appreciation to Positive Technologies and ITA MOD CERT (CERTDIFESA) for their collaborative efforts in identifying and disclosing these vulnerabilities responsibly. Their cooperation played a vital role in enabling a timely and effective response to protect end-users. 

    Given the severity of CVE-2025-5349 and CVE-2025-5777, organizations using NetScaler ADC and NetScaler Gateway cannot afford to delay. With one vulnerability granting elevated access and the other enabling memory-based exploits, attackers could gain control over affected systems. Upgrading to the latest supported versions is not only recommended but essential for maintaining a secure enterprise infrastructure. 

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleRussian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign
    Next Article Meta Adds Passkey Login Support to Facebook for Android and iOS Users

    Related Posts

    Artificial Intelligence

    Scaling Up Reinforcement Learning for Traffic Smoothing: A 100-AV Highway Deployment

    August 3, 2025
    Repurposing Protein Folding Models for Generation with Latent Diffusion
    Artificial Intelligence

    Repurposing Protein Folding Models for Generation with Latent Diffusion

    August 3, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Elektroid – sample and MIDI device manager

    Linux

    Leonardo AI

    Web Development

    CVE-2025-4668 – Apache HTTP Server Deserialization Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    List of confirmed games heading to Xbox Game Pass in May 2025

    Operating Systems

    Highlights

    CVE-2025-47245 – BlueWave Checkmate Role Tampering Vulnerability

    May 3, 2025

    CVE ID : CVE-2025-47245

    Published : May 4, 2025, 12:15 a.m. | 1 hour, 16 minutes ago

    Description : In BlueWave Checkmate through 2.0.2 before d4a6072, an invite request can be modified to specify a privileged role.

    Severity: 8.1 | HIGH

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Blink Tag HTML: A Hidden Gem of the Early Web

    June 8, 2025

    PHP 8.5.0 Alpha 4 available for testing

    July 31, 2025

    CVE-2025-32441 – Rack Session Pool Session Hijacking Vulnerability

    May 7, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.