Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Critical Vulnerability Patched in Citrix NetScaler

Citrix has released patches for critical- and high-severity vulnerabilities in NetScaler and Secure Access Client and Workspace for Windows.

Citrix vulnerabilities exploited

Citrix on Tuesday announced patches for four vulnerabilities across three products, including a critical-severity issue in NetScaler ADC and NetScaler Gateway.

The critical flaw, tracked as CVE-2025-5777 (CVSS score of 9.3), is described as an out-of-bounds memory read caused by insufficient input validation.

Only NetScaler deployments configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or as Authentication, Authorization, and Accounting (AAA) virtual server are affected, Citrix explains in its advisory.

The flaw was addressed in NetScaler ADC versions 14.1-43.56, 13.1-58.32, 13.1-FIPS, 13.1-NDcPP 13.1-37.235, and 12.1-FIPS 12.1-55.328, and in NetScaler Gateway versions 14.1-43.56 and 13.1-58.32.

The updates also address CVE-2025-5349, a high-severity improper access control issue in the NetScaler Management Interface.

Citrix warns that NetScaler ADC and Gateway versions 12.1 and 13.0, which have been discontinued, are affected by these vulnerabilities too, urging customers to upgrade to a supported iteration as soon as possible.

On Tuesday, the company also released fixes for a high-severity improper privilege management flaw in Secure Access Client for Windows that could be exploited to obtain System privileges. Tracked as CVE-2025-0320, the security defect was addressed in Secure Access Client for Windows version 25.5.1.15.

Another high-severity improper privilege management vulnerability, tracked as CVE-2025-4879, was addressed with the release of Citrix Workspace app for Windows version 2409, and in Workspace app for Windows 2402 LTSR CU2 Hotfix 1 and 2402 LTSR CU3 Hotfix 1.

Advertisement. Scroll to continue reading.

Citrix makes no mention of any of these vulnerabilities being exploited in the wild, but users are advised to update their installations as soon as possible. Additional information can be found on the company’s security bulletins page.

Related: Citrix Warns of Password Spraying Attacks Targeting NetScaler Appliances

Related: Code Execution Vulnerabilities Patched in Veeam, BeyondTrust Products

Related: Chrome 137 Update Patches High-Severity Vulnerabilities

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn how the LOtL threat landscape has evolved, why traditional endpoint hardening methods fall short, and how adaptive, user-aware approaches can reduce risk.

Watch Now

Join the summit to explore critical threats to public cloud infrastructure, APIs, and identity systems through discussions, case studies, and insights into emerging technologies like AI and LLMs.

Register

People on the Move

Coro, a provider of cybersecurity solutions for SMBs, has appointed Joe Sykora as CEO.

SonicWall has hired Rajnish Mishra as Senior Vice President and Chief Development Officer.

Kenna Security co-founder Ed Bellis has joined Empirical Security as Chief Executive Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.