Skip to main content

Active Exploitation of Zero-Day Vulnerability CVE-2025-6543 in NetScaler ADC and NetScaler Gateway

Citrix has released a security advisory to address exploited vulnerability CVE-2025-6543 that could lead to unintended control flow or a denial-of-service condition.

Report a cyber attack: call 0300 303 5222 or email [email protected]

Summary

Citrix has released a security advisory to address exploited vulnerability CVE-2025-6543 that could lead to unintended control flow or a denial-of-service condition.


Threat details

End-of-life (EoL) products still vulnerable

NetScaler ADC and NetScaler Gateway versions 12.1 and 13.0 are now End Of Life (EOL) and are vulnerable. Organisations using EoL versions must upgrade to the latest release of supported versions as soon as possible. 

Additionally, Secure Private Access on-premises or Secure Private Access Hybrid deployments using NetScaler instances are also affected by the vulnerabilities. Organisations must upgrade NetScaler to the latest release of supported versions as soon as possible. 

Exploitation of CVE-2025-6543

Citrix has reported exploitation of CVE-2025-6543 in the wild. The NHS England National CSOC assesses further exploitation as highly likely.

Additionally, security researchers have suggested that CVE-2025-6543 may allow for unauthenticated remote code execution (RCE).


Introduction

Citrix has released a critical security bulletin addressing a vulnerability affecting NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (formerly Citrix Gateway). Citrix NetScaler is an all-in-one load balancer, web application firewall (WAF), virtual private network (VPN) gateway and SSL offloading tool for web applications.


Vulnerability Details

  • CVE-2025-6543 is a 'memory overflow' vulnerability with a CVSSv4 base score of 9.2. Successful exploitation could allow a remote unauthenticated attacker to gain unintended control flow and perform denial-of-service (DoS) in NetScaler ADC and NetScaler Gateway. NetScaler is only vulnerable to CVE-2025-6543 when configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server.

Security researchers have suggested that CVE-2025-6543 could allow for remote code execution.

NHS Organisations Must Complete CC-4670 and CC-4674 in RTaNCA

To mark both high severity Cyber Alerts CC-4670 and CC-4674 as "complete" in the Respond to an NHS Cyber Alert (RTaNCA) portal, organisations must update NetScaler to the latest version, and run the commands detailed in CC-4670 (and repeated below) to terminate active ICA and PCoIP sessions. 


Remediation advice

Affected organisations must review Citrix Security Bulletin CTX694788 and update to the latest version of NetScaler ADC or NetScaler Gateway (detailed below).

Note: NetScaler ADC and NetScaler Gateway versions 12.1 and 13.0 are now End Of Life (EOL) and no longer supported. Organisations using EoL versions must upgrade to the latest release of supported versions as soon as possible. 

Applying the "Remediation Steps" detailed below will remediate both CVE-2025-5777 (from CC-4670) and CVE-2025-6543 (this alert). You must update NetScaler appliances to one of the versions detailed below or later. 


Remediation steps

Type Step
Patch

  Organisations must update NetScaler to the latest version available. Fixed releases include:

  • NetScaler ADC and NetScaler Gateway 14.1-47.46 and later releases
  • NetScaler ADC and NetScaler Gateway 13.1-59.19 and later releases of 13.1
  • NetScaler ADC 13.1-FIPS and 13.1-NDcPP 13.1-37.236 and later releases of 13.1-FIPS and 13.1-NDcPP. Customers should contact support - https://support.citrix.com/support-home/home to obtain the 13.1-FIPS and 13.1-NDcPP builds that address this issue.

https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694788&articleURL=NetScaler_ADC_and_NetScaler_Gateway_Security_Bulletin_for_CVE_2025_6543
Action

To also complete CC-4670, organisations must run the following commands to terminate all active ICA and PCoIP sessions after all NetScaler appliances in the high availability (HA) pair or cluster have been upgraded to the fixed builds:

kill icaconnection -all

kill pcoipConnection -all

Please ensure that the formatting remains intact as you copy and paste these commands.


https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX693420&articleURL=NetScaler_ADC_and_NetScaler_Gateway_Security_Bulletin_for_CVE_2025_5349_and_CVE_2025_5777


Last edited: 26 June 2025 4:06 pm