Memory overflow vulnerability leading to Remote Code Execution and/or Denial of Service in NetScaler ADC and NetScaler Gateway when NetScaler is configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server (OR) NetScaler ADC and NetScaler Gateway 13.1, 14.1, 13.1-FIPS and NDcPP: LB virtual servers of type (HTTP, SSL or HTTP_QUIC) bound with IPv6 services or servicegroups bound with IPv6 servers (OR) NetScaler ADC and NetScaler Gateway 13.1, 14.1, 13.1-FIPS and NDcPP: LB virtual servers of type (HTTP, SSL or HTTP_QUIC) bound with DBS IPv6 services or servicegroups bound with IPv6 DBS servers (OR) CR virtual server with type HDX
https://www.theregister.com/2025/08/28/thousands_of_citrix_netscaler_boxes/
https://www.securityweek.com/citrix-patches-exploited-netscaler-zero-day/
https://www.infosecurity-magazine.com/news/citrix-patch-netscaler-zero-days/
https://www.theregister.com/2025/08/26/citrix_patches_trio_of_netscaler/
https://www.databreachtoday.com/citrix-netscaler-devices-yet-again-under-attack-a-29301
https://www.darkreading.com/vulnerabilities-threats/citrix-zero-day-under-active-attack
https://thehackernews.com/2025/08/citrix-patches-three-netscaler-flaws.html
https://cyberscoop.com/citrix-netscaler-zero-day-exploited-august-2025/
Published: 2025-08-26
Updated: 2025-08-27
Named Vulnerability: CitrixDeelbNamed Vulnerability: CitrixBleed 3Known Exploited Vulnerability (KEV)
Base Score: 10
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Severity: Critical
Base Score: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: Critical
Base Score: 9.2
Vector: CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L
Severity: Critical
EPSS: 0.07667
Tenable Research has classified this CVE under the following Vulnerability Watch classification, which includes active and historical (inactive) classifications. You can learn more about these classifications on our blog.
Vulnerability of Interest