Citrix NetScaler has had a difficult summer, with the vulnerability “CitrixBleed 2” being disclosed in July 2025 (a critical vulnerability causing memory exposure leaking sensitive information). However, this is not the end, as another critical vulnerability (CVE-2025-7775) was disclosed yesterday on the 26th of August. Because Citrix devices are normally public facing, the likelihood of exploitation in the wild increases significantly. In fact, both vulnerabilities have been actively exploited, according to Citrix.
Furthermore, this advisory will focus on CVE-2025-7775, additional information regarding the CitrixBleed 2 can be found in our earlier blog post here. https://insights.integrity360.com/threat-advisories/threat-advisory-cve-2025-5777-critical-vulnerability-in-citrix-netscaler-adc-and-gateway
If you're running Citrix NetScaler ADC or NetScaler Gateway, here's a vulnerability you can’t afford to ignore. Disclosed in late August 2025, exploits were seen in the wild. According to Citrix and corroborated by multiple threat intel sources, the vulnerability lies in how NetScaler handles certain requests on appliances configured with specific virtual server roles — notably:
If your appliance is set up for one or more of these, you are at risk.
If you're running an unpatched system, it could already be compromised — especially if it's internet-facing.
You’re at risk if you're using any of the following NetScaler builds:
Version |
Vulnerable? |
Fixed In |
14.1 < 14.147.48 |
✅ |
14.147.48 |
13.1 < 13.159.22 |
✅ |
13.159.22 |
13.1FIPS / NDcPP < 13.137.241FIPS/NDcPP |
✅ |
13.137.241FIPS/NDcPP |
12.1FIPS / NDcPP < 12.155.330FIPS/NDcPP |
✅ |
12.155.330FIPS/NDcPP |
12.1 / 13.0 (non-FIPS) |
❌ |
❌ End-of-Life |
If you’re running EOL versions like 12.1 or 13.0, there is no patch, and you need to upgrade ASAP or apply other mitigations..
Then rotate any associated credentials.
1. Monitor for IOCs (Indicators of Compromise)
So far, reports show a mix of exploitation attempts — from denial-of-service attacks to implanting remote shells or credentials harvesting through compromised authentication flows.
Given NetScaler's role in front-ending sensitive apps (like VPNs and authentication gateways), an exploit here could become a pivot point into your internal environment.
Check Your Infra-as-Code
If you’re using automated deployment for NetScaler appliances (Terraform, Ansible, etc.), now’s a good time to:
If you are worried about any of the threats outlined in this bulletin or need help in determining what steps you should take to protect yourself from the most material threats facing your organisation, please contact your account manager, or alternatively, Get in touch to find out how you can protect your organisation.