NetScaler ADC/Gateway <13.3 RCE via IPv6 Memory Overflow
CVE-2025-7775 Published on August 26, 2025
Memory overflow vulnerability leading to Remote Code Execution and/or Denial of Service
Memory overflow vulnerability leading to Remote Code Execution and/or Denial of Service in NetScaler ADC and NetScaler Gateway when NetScaler is configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server
(OR)
NetScaler ADC and NetScaler Gateway 13.1, 14.1, 13.1-FIPS and NDcPP: LB virtual servers of type (HTTP, SSL or HTTP_QUIC) bound with IPv6 services or servicegroups bound with IPv6 servers
(OR)
NetScaler ADC and NetScaler Gateway 13.1, 14.1, 13.1-FIPS and NDcPP: LB virtual servers of type (HTTP, SSL or HTTP_QUIC) bound with DBS IPv6 services or servicegroups bound with IPv6 DBS servers
(OR)
CR virtual server with type HDX
Known Exploited Vulnerability
This Citrix NetScaler Memory Overflow Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Citrix NetScaler ADC and NetScaler Gateway contain a memory overflow vulnerability that could allow for remote code execution and/or denial of service.
The following remediation steps are recommended / required by August 28, 2025: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Weakness Type
What is a Buffer Overflow Vulnerability?
The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
CVE-2025-7775 has been classified to as a Buffer Overflow vulnerability or weakness.
Affected Versions
NetScaler ADC:- Version 14.1 and below 47.48 is affected.
- Version 13.1 and below 59.22 is affected.
- Version 13.1 FIPS and NDcPP and below 37.241 is affected.
- Version 12.1 FIPS and NDcPP and below 55.330 is affected.
- Version 14.1 and below 47.48 is affected.
- Version 13.1 and below 59.22 is affected.
- Version 13.1 FIPS and NDcPP and below 37.241 is affected.
- Version 12.1 FIPS and NDcPP and below 55.330 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.