• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
NetScaler Blog

NetScaler Blog

Application delivery and security blog

Application delivery and security blog
  • Application delivery
  • Application and API security
  • Application modernization
  • Observability
  • News

Critical security updates for NetScaler, NetScaler Gateway, and NetScaler Console

June 17, 2025 by Anil Shetty

Cloud Software Group released builds on June 17, 2025, to address three security vulnerabilities. NetScaler Gateway is affected by CVE 2025-5777, which has a CVSS score of 9.3. CVE 2025-5349 impacts all NetScaler form-factors (CVSS 8.7), CVE 2025-4365 impacts on-premises NetScaler Console (CVSS 6.9).

CVE 2025-5777 is a critical severity vulnerability impacting NetScaler Gateway, i.e. if NetScaler has been configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server.

The vulnerability arises due to insufficient input validation leading to memory overread. Cloud Software Group (CSG) strongly recommends upgrading the impacted NetScalers to the builds containing the fix.

The following builds are impacted:

  • NetScaler ADC and NetScaler Gateway 14.1 before 14.1-43.56
  • NetScaler ADC and NetScaler Gateway 13.1 before 13.1-58.32
  • NetScaler ADC 13.1-FIPS and NDcPP  before 13.1-37.234
  • NetScaler ADC 12.1-FIPS and 12.1-NDcPP before 12.1-55.327

Cloud Software Group strongly recommends affected customers of NetScaler ADC and NetScaler Gateway to install the relevant updated versions as soon as possible. 

  • NetScaler ADC  and NetScaler Gateway 14.1-43.56 and later releases
  • NetScaler ADC and NetScaler Gateway   13.1-58.32 and later releases 
  • NetScaler ADC 13.1-FIPS and 13.1-NDcPP 13.1-37.234 and later releases 
  • NetScaler ADC 12.1-FIPS and 12.1-NDcPP 12.1-55.327 and later releases 

Additionally, CSG strongly recommends executing the following commands after the builds containing the fix have been deployed across HA pairs and all cluster nodes:

     kill icaconnection -all
     kill pcoipConnection -all

Executing these commands will ensure killing all active ICA and PCoIP sessions. Rebooting appliances instead of firing these commands isn’t recommended. Also, in case of cluster deployments CSG recommends executing the kill sessions commands on each of the nodes. In case of HA, executing the commands on the Primary active node is sufficient.

CVE 2025-5349 is a high severity vulnerability which arises due to improper access control on the NetScaler Management Interface.

This impacts all NetScaler form factors, but to take advantage of this vulnerability access to NetScaler IP (NSIP), Cluster Management IP or Local GSLB site IP is necessary. This also requires the management interface to be enabled on the appliance. Impacted builds and the builds containing the fix are common across both CVE 2025-5349 & CVE 2025-5777. 

Note: Please note that NetScaler SPA on-prem instances are also affected by the vulnerabilities, and customers need to upgrade the instances to the recommended NetScaler builds to address the vulnerabilities. The action to upgrade the impacted instances is only applicable for Customer-managed NetScaler, NetScaler Gateway & NetScaler SPA instances. Cloud Software Group takes initiative of updating the Citrix-managed cloud services and Citrix-managed Adaptive Authentication instances with the necessary software updates; cloud customers do not need to take any additional action.

CVE 2025-4365 is a medium severity vulnerability in NetScaler Console that allows attackers to read arbitrary files.

This could result in unauthorized access as sensitive configuration files and private keys become accessible, potentially compromising other systems and accounts. Exploitation of this vulnerability requires authenticated access to NetScaler Console, and in most deployments access to NetScaler console is guarded by means of IDAM solutions. This means the risk of having an unauthorized attacker gaining access is contained. If access to NetScaler console isn’t gated by IDAM solutions or if local authentication is still being used, CSG strongly recommends customers to consider using IDAM solutions and disabling local authentication. Additionally, please refer to the secure deployment and access practices for NetScaler Console.

The following supported versions of NetScaler Console are affected:

  • NetScaler Console 14.1 BEFORE  14.1-43.56
  • NetScaler Console 13.1 BEFORE  13.1-58.32

Cloud Software Group strongly urges customers of NetScaler Console and NetScaler Agent to install the relevant updated versions as soon as possible: 

  • NetScaler Console 14.1-43.56. and later releases 
  • NetScaler Console 13.1-58.32 and later releases of 13.1

Please note that this vulnerability only applies to customer managed NetScaler Console. Customers using NetScaler Console service don’t need to take any action as updates to the service are managed by Cloud Software Group.

Update installation

Download permanent fixes for NetScaler Console

Download permanent fixes for NetScaler 

NetScaler and Citrix are both part of Cloud Software Group, and share the same ticketing system. If you encounter issues when you are updating your affected builds, please contact Citrix Customer Support, irrespective of whether your product includes NetScaler branding or Citrix branding. 

Learn more and stay up to date

  • Read the security bulletin for NetScaler and NetScaler Gateway
  • Read the security bulletin for NetScaler Console
  • Sign up for security bulletin notifications
  • See the NetScaler Secure Deployment Guide

Categories: News Tagged With: NetScaler security updates

Primary Sidebar

Popular posts

NetScaler Next-Gen API

Introducing NetScaler Next-Gen API: The declarative API for application developers 

June 17, 2024

Terraform provider for NetScaler SDX

Introducing the Terraform provider for NetScaler SDX

May 30, 2024

NetScaler now accepting GitHub community contributions

May 2, 2024

Introducing NetScaler CPX Express: A DevOps-friendly, free Kubernetes ingress proxy 

March 28, 2024

NetScaler: The power of one

NetScaler: The power of one

March 5, 2024

NetScaler Web App Firewall (WAF) protects organizations against actively exploited Apache Tomcat and NGINX Kubernetes ingress vulnerabilities

NetScaler WAF: Protection against critical Apache and NGINX CVEs

April 11, 2025

New utility converts NetScaler configurations into IaC for greater automation

New utility converts NetScaler configurations into IaC for greater automation

April 3, 2025

NetScaler 13.1-FIPS achieves NDcPP certification from NIAP and the CCCS

NetScaler 13.1-FIPS achieves NDcPP certification

February 27, 2025

Footer

Product resources

  • NetScaler editions
  • Integrations
  • Documentation
  • GitHub
  • Downloads

Support

  • Ask the community
  • Contact support

Company

  • NetScaler.com
  • About NetScaler
  • Contact us
  • Newsroom
  • Careers

  • Legal
  • Do not sell my personal information
  • Cookie preferences
© 2023 Cloud Software Group, Inc. All rights reserved.