First published: 20 Jun 2025
Last updated: 04 Jul 2025

Content written for

Small & medium business
Large organisations & infrastructure
Government

Citrix have identified critical vulnerabilities in Citrix Netscaler ADC and NetScaler Gateway Products (CVE-2025-5349 and CVE-2025-5777).

ASD’s ACSC recommends organisations update affected products to the latest versions and follow the advice detailed in the Citrix Security Advisory

This alert has been written primarily for; but is not limited to, business and government.

This alert is intended for a technical audience. 

Update 4 July 2025

Citrix has identified exploitation of a separate vulnerability (CVE-2025-6543) in the NetScaler ADC and NetScaler Gateway products leading to a memory overflow vulnerability, resulting in unintended control flow and Denial of Service due to insufficient input validation.

Further to the previous patches and advice, organisations with the following NetScaler ADC and NetScaler Gateway products are advised to follow the advice contained in NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2025-6543 | Citrix:

  1. NetScaler ADC and NetScaler Gateway 14.1 BEFORE 14.1-47.46
  2. NetScaler ADC and NetScaler Gateway 13.1 BEFORE 13.1-59.19
  3. NetScaler ADC 13.1-FIPS and NDcPP BEFORE 13.1-37.236-FIPS and NDcPP

Organisations should report any indications of compromise ASD’s ACSC via 1300 CYBER1 (1300 292 371) or Report | Cyber.gov.au

Background / What has happened?

Citrix has identified the following vulnerabilities  affecting Netscaler ADC and NetScaler Gateway products.

  • CVE-2025-5777: Insufficient input validation leading to memory overread, potentially leading to the exposure of sensitive data.

    This vulnerability affects NetScaler products configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server.

  • CVE-2025-5349: Improper access control on the NetScaler Management Interface.

    The following supported versions of NetScaler ADC and NetScaler Gateway are affected by the vulnerabilities: 

    • NetScaler ADC and NetScaler Gateway 14.1 BEFORE 14.1-43.56
    • NetScaler ADC and NetScaler Gateway 13.1 BEFORE 13.1-58.32
    • NetScaler ADC 13.1-FIPS and NDcPP  BEFORE 13.1-37.235-FIPS and NDcPP
    • NetScaler ADC 12.1-FIPS BEFORE 12.1-55.328-FIPS

NOTE: Citrix advises that NetScaler ADC and NetScaler Gateway versions 12.1 and 13.0 are now End Of Life (EOL) and not receiving patches.

Mitigation / How do I stay secure?

Australian organisations should review their networks for use of vulnerable instances of the NetScaler ADC and NetScaler Gateway products, and consult Citrix's customer advisory Citrix Security Advisory for mitigation advice.

Assistance / Where can I go for help?

Organisations that have been impacted, suspect impact or require advice and assistance can contact us via 1300 CYBER1 (1300 292 371) or asd.assist@defence.gov.au.

Was this helpful?
Yes this was helpful
No this was not helpful

Thanks for your feedback!

We welcome additional feedback below.

Was this information easy to understand?
Will you take action after reading this?
Did you find the information you were looking for?
Did the design and layout of this page meet your expectations?