Citrix releases emergency patch for CVE-2025-6543 actively utilized in Netscaler ADC

2 Min Read
2 Min Read

Citrix has released a security update to address critical flaws affecting Netscaler ADCs that are said to have been exploited by Wild.

Tracked vulnerabilities CVE-2025-6543carry a CVSS score of 9.2 out of a maximum of 10.0.

It is described as a case of memory overflow that can result in unintended flow of control and denial of service. However, for the exploit to be successful, the appliance must be configured as a gateway (VPN Virtual Server, ICA Proxy, CVPN, RDP Proxy) or AAA Virtual Server.

The drawbacks affect the following versions –

  • Netscaler ADC and NetScaler Gateway 14.1 14.1-47.46
  • Before Netscaler ADC and Netscaler Gateway 13.1 13.1-59.19
  • Netscaler ADC and Netscaler Gateway 12.1 and 13.0 (ends vulnerable)
  • Netscaler ADC 13.1-FIPS and NDCPP 13.1-37.236-FIPS and NDCPP

“Secured private access on-plame or secure private access hybrid deployments using Netscaler instances are also vulnerable,” Citrix said.

“Customers need to upgrade these Netscaler instances to the recommended Netscaler builds to address the vulnerability.”

The company did not reveal how the flaws are being exploited in real-world attacks, but said “We have observed misuse of CVE-2025-6543 on unexempt electronics.”

This disclosure comes shortly after Citrix patches another critical evaluation security flaw of Netscaler ADC (CVE-2025-5777, CVSS score: 9.3).

See also  Tiktok was accused of a GDPR fine of 530 million euros for sending EU data to China
Share This Article
Leave a comment