CVE-2025-7775

critical

Description

Memory overflow vulnerability leading to Remote Code Execution and/or Denial of Service in NetScaler ADC and NetScaler Gateway when NetScaler is configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server (OR) NetScaler ADC and NetScaler Gateway 13.1, 14.1, 13.1-FIPS and NDcPP: LB virtual servers of type (HTTP, SSL or HTTP_QUIC) bound with IPv6 services or servicegroups bound with IPv6 servers (OR) NetScaler ADC and NetScaler Gateway 13.1, 14.1, 13.1-FIPS and NDcPP: LB virtual servers of type (HTTP, SSL or HTTP_QUIC) bound with DBS IPv6 services or servicegroups bound with IPv6 DBS servers (OR) CR virtual server with type HDX

From the Tenable Blog

CVE-2025-7775 Citrix RCE Zero-day
CVE-2025-7775 Citrix RCE Zero-day

Published: 2025-08-26

CVE-2025-7775 Citrix RCE Zero-day Exploited

References

https://www.bleepingcomputer.com/news/security/hackers-use-new-hexstrike-ai-tool-to-rapidly-exploit-n-day-flaws/

https://www.theregister.com/2025/08/28/thousands_of_citrix_netscaler_boxes/

https://www.securityweek.com/citrix-patches-exploited-netscaler-zero-day/

https://www.infosecurity-magazine.com/news/citrix-patch-netscaler-zero-days/

https://www.bleepingcomputer.com/news/security/over-28-200-citrix-instances-vulnerable-to-actively-exploited-rce-bug/

https://securityaffairs.com/181615/security/u-s-cisa-adds-citrix-netscaler-flaw-to-its-known-exploited-vulnerabilities-catalog-2.html

https://securityaffairs.com/181614/hacking/over-28000-citrix-instances-remain-exposed-to-critical-rce-flaw-cve-2025-7775.html

https://www.theregister.com/2025/08/26/citrix_patches_trio_of_netscaler/

https://www.helpnetsecurity.com/2025/08/26/netscaler-adc-gateway-zero-day-exploited-by-attackers-cve-2025-7775/

https://www.databreachtoday.com/citrix-netscaler-devices-yet-again-under-attack-a-29301

https://www.darkreading.com/vulnerabilities-threats/citrix-zero-day-under-active-attack

https://www.cisa.gov/news-events/alerts/2025/08/26/cisa-adds-one-known-exploited-vulnerability-catalog

https://www.bleepingcomputer.com/news/security/citrix-fixes-critical-netscaler-rce-flaw-exploited-in-zero-day-attacks/

https://thehackernews.com/2025/08/citrix-patches-three-netscaler-flaws.html

https://securityaffairs.com/181567/hacking/citrix-fixed-three-netscaler-flaws-one-of-them-actively-exploited-in-the-wild.html

https://cyberscoop.com/citrix-netscaler-zero-day-exploited-august-2025/

Details

Source: Mitre, NVD

Published: 2025-08-26

Updated: 2025-08-27

Named Vulnerability: CitrixDeelbNamed Vulnerability: CitrixBleed 3Known Exploited Vulnerability (KEV)

Risk Information

CVSS v2

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Severity: Critical

CVSS v3

Base Score: 9.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical

CVSS v4

Base Score: 9.2

Vector: CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L

Severity: Critical

EPSS

EPSS: 0.07667

Vulnerability Watch

Tenable Research has classified this CVE under the following Vulnerability Watch classification, which includes active and historical (inactive) classifications. You can learn more about these classifications on our blog.

Vulnerability of Interest