CVE-2025-5777 is a buffer overread vulnerability discovered in Citrix NetScaler ADC and NetScaler Gateway. This critical vulnerability is due to insufficient input validation, allowing an unauthenticated attacker to reflect memory contents from the server to the client. This can enable the attacker to read sensitive information directly from the server’s memory.
The vulnerability affects NetScaler ADC and NetScaler Gateway versions 14.1 BEFORE 14.1-43.56, 13.1 BEFORE 13.1-58.32, 13.1-FIPS and NDcPP BEFORE 13.1-37.235-FIPS and NDcPP, and 12.1-FIPS BEFORE 12.1-55.328-FIPS. Additionally, NetScaler ADC and NetScaler Gateway versions 12.1 and 13.0, which are End Of Life (EOL), are also vulnerable. Secure Private Access on-prem or Hybrid deployments using NetScaler instances are also impacted. Exploitation requires NetScaler to be configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or an AAA virtual server. This vulnerability is classified as CWE-125: Out-of-bounds Read and has a CVSSv4 Base Score of 9.3.
Successful exploitation of this vulnerability can lead to:
After upgrading all NetScaler appliances in an HA pair or cluster, it is also recommended to terminate all active ICA and PCoIP sessions by running the commands kill icaconnection -all
and kill pcoipConnection -all
.
The NodeZero® platform empowers your organization to reduce your security risks by autonomously finding exploitable weaknesses in your network, giving you detailed guidance around how to priortize and fix them, and having you immediately verify that your fixes are effective.