Citrix NetScaler ADC and NetScaler Gateway Vulnerabilities

What is the Vulnerability?

Citrix has published security advisories addressing three critical vulnerabilities, CVE-2025-6543, CVE-2025-5349, and CVE-2025-5777, affecting the NetScaler ADC and NetScaler Gateway under specific preconditions.

CVE-2025-6543: A memory overflow vulnerability leading to unintended control flow and Denial of Service in NetScaler ADC and NetScaler Gateway when configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server. Citrix reports that exploitation of CVE-2025-6543 against unmitigated appliances has been observed.

CVE-2025-5349: An improper access control on the NetScaler Management Interface.

CVE-2025-5777: A flaw due to insufficient input validation, potentially causing memory overreads. On July 10, 2025, the vulnerability was added to CISA's Known Exploited Catalog, based on exploitation in the wild.

What is the recommended Mitigation?

The organizations using Citrix NetScaler ADC and NetScaler Gateway appliances are strongly recommended to:

  • Review the official Citrix security bulletins linked below.

  • Apply all relevant patches and updates as soon as possible.

  • Monitor for any suspicious activity.

What FortiGuard Coverage is available?

  • FortiGuard recommends that users apply the vendor's provided fix and follow the instructions outlined in the vendor’s advisory.

  • FortiGuard IPS protection has been released to detect and block attacks related to CVE-2025-5777. Intrusion Prevention | FortiGuard Labs
    The rest of the IPS coverage is currently under evaluation and will be updated as signatures become available.

  • The FortiGuard Incident Response team can be engaged to help with any suspected compromise.

description-logoOutbreak Alert

FortiGuard Labs has observed a sharp increase in exploitation attempts targeting the 'Citrix Bleed 2' vulnerability since July 28, 2025. Telemetry indicates activity has surged to over 6,000 detections across IPS sensors globally. The majority of observed attacks are concentrated in the United States, Australia, Germany, and the United Kingdom, with adversaries primarily focusing on high-value sectors such as technology, banking, healthcare, and education.

View the full Outbreak Alert Report