Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Representative Line: Brace Yourself

      September 18, 2025

      Beyond the Pilot: A Playbook for Enterprise-Scale Agentic AI

      September 18, 2025

      GitHub launches MCP Registry to provide central location for trusted servers

      September 18, 2025

      MongoDB brings Search and Vector Search to self-managed versions of database

      September 18, 2025

      Distribution Release: Security Onion 2.4.180

      September 18, 2025

      Distribution Release: Omarchy 3.0.1

      September 17, 2025

      Distribution Release: Mauna Linux 25

      September 16, 2025

      Distribution Release: SparkyLinux 2025.09

      September 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      AI Momentum and Perficient’s Inclusion in Analyst Reports – Highlights From 2025 So Far

      September 18, 2025
      Recent

      AI Momentum and Perficient’s Inclusion in Analyst Reports – Highlights From 2025 So Far

      September 18, 2025

      Shopping Portal using Python Django & MySQL

      September 17, 2025

      Perficient Earns Adobe’s Real-time CDP Specialization

      September 17, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Valve Survey Reveals Slight Retreat in Steam-on-Linux Share

      September 18, 2025
      Recent

      Valve Survey Reveals Slight Retreat in Steam-on-Linux Share

      September 18, 2025

      Review: Elecrow’s All-in-one Starter Kit for Pico 2

      September 18, 2025

      FOSS Weekly #25.38: GNOME 49 Release, KDE Drama, sudo vs sudo-rs, Local AI on Android and More Linux Stuff

      September 18, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Two High-Severity Flaws Found in NetScaler Products: CVE-2025-5349 and CVE-2025-5777

    Two High-Severity Flaws Found in NetScaler Products: CVE-2025-5349 and CVE-2025-5777

    June 19, 2025

    CVE-2025-5349

    Cloud Software Group has released a security bulletin warning customers of two newly identified vulnerabilities, CVE-2025-5349 and CVE-2025-5777, affecting both NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (formerly Citrix Gateway).  

    CVE-2025-5349 has been classified as an improper access control issue affecting the NetScaler Management Interface. This flaw allows unauthorized users to potentially gain elevated access if they can connect via NSIP, Cluster Management IP, or the local GSLB Site IP. It has been assessed under the Common Weakness Enumeration (CWE) as CWE-284 and has been assigned a CVSS v4.0 base score of 8.7, signaling a high-severity vulnerability. 

    The second vulnerability, CVE-2025-5777, results from insufficient input validation, leading to a memory overread condition. The flaw is exploitable only when NetScaler is configured as a Gateway, such as through VPN virtual servers, ICA Proxy, CVPN, RDP Proxy, or AAA virtual servers. This issue is classified under CWE-125: Out-of-bounds Read, with a CVSS v4.0 base score of 9.3, making it even more critical than the first. 

    Affected Versions 

    The following versions of NetScaler ADC and NetScaler Gateway are impacted: 

    • Versions 14.1 before 14.1-43.56 
    • Versions 13.1 before 13.1-58.32 
    • 13.1-FIPS and 13.1-NDcPP before build 13.1-37.235-FIPS and NDcPP 
    • 12.1-FIPS before build 12.1-55.328-FIPS 

    It is important to note that versions 12.1 and 13.0 are now designated as End of Life (EOL). As a result, these versions are no longer supported and are vulnerable to both CVE-2025-5349 and CVE-2025-5777. Customers still operating on these legacy builds are strongly encouraged to migrate to currently supported versions immediately. 

    Additionally, organizations using Secure Private Access in on-premises or hybrid deployment modes that rely on NetScaler instances are also affected. Cloud Software Group emphasizes that these setups must also be upgraded to the specified secure builds to ensure complete protection. 

    Remediation for CVE-2025-5349 and CVE-2025-5777 

    To address these critical vulnerabilities, Cloud Software Group advises customers to upgrade to the following versions: 

    • NetScaler ADC and NetScaler Gateway 14.1-43.56 or later 
    • NetScaler ADC and NetScaler Gateway 13.1-58.32 or later 
    • NetScaler ADC 13.1-FIPS and 13.1-NDcPP 13.1-37.235 or later 
    • NetScaler ADC 12.1-FIPS 12.1-55.328 or later 

    After upgrading, administrators are also advised to terminate all active ICA and PCoIP sessions using the following commands to ensure no lingering session-based vulnerabilities: 

    bash 

    CopyEdit 

    kill icaconnection -all
    kill pcoipConnection -all
     

    These commands should be run only after all appliances in an HA pair or cluster are fully updated to the secure builds. 

    These vulnerabilities specifically impact customer-managed instances of Citrix ADC (NetScaler ADC) and Citrix Gateway (NetScaler Gateway). Customers utilizing Citrix-managed cloud services or Citrix Adaptive Authentication do not need to take action, as Cloud Software Group handles all necessary updates for those environments. 

    Conclusion 

    Cloud Software Group extended its appreciation to Positive Technologies and ITA MOD CERT (CERTDIFESA) for their collaborative efforts in identifying and disclosing these vulnerabilities responsibly. Their cooperation played a vital role in enabling a timely and effective response to protect end-users. 

    Given the severity of CVE-2025-5349 and CVE-2025-5777, organizations using NetScaler ADC and NetScaler Gateway cannot afford to delay. With one vulnerability granting elevated access and the other enabling memory-based exploits, attackers could gain control over affected systems. Upgrading to the latest supported versions is not only recommended but essential for maintaining a secure enterprise infrastructure. 

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleRussian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign
    Next Article Meta Adds Passkey Login Support to Facebook for Android and iOS Users

    Related Posts

    Development

    AI Momentum and Perficient’s Inclusion in Analyst Reports – Highlights From 2025 So Far

    September 18, 2025
    Development

    Shopping Portal using Python Django & MySQL

    September 17, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Nightdive and id Software are a match made in gaming heaven — As I play Heretic + Hexen, I’m hopeful for more remasters across Activision and Bethesda

    News & Updates

    CVE-2025-48300 – Groundhogg Web Shell Upload Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2024-53496 – Apache My-site Unauthenticated Access Control Bypass

    Common Vulnerabilities and Exposures (CVEs)

    Lorem – generate placeholder text

    Linux

    Highlights

    News & Updates

    I made 21 tweaks in Windows 11 to increase gaming performance — and they worked

    July 2, 2025

    On Windows 11, you can configure a slew of settings and features to improve gaming…

    The Future of Web Design

    April 29, 2025

    CVE-2025-36846 – An issue was discovered in Eveo URVE Web Manager 2

    July 21, 2025

    GPT Proto – Unified Access to All AI Models via Fast & Secure APIs

    August 7, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.