CVE-2025-7775
Published: 26 August 2025
Summary
CVE-2025-7775 is a critical-severity Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119) vulnerability in Citrix Netscaler Application Delivery Controller. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 7.5% of CVEs by exploit likelihood; CISA has added it to the Known Exploited Vulnerabilities catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires timely identification, reporting, and remediation of flaws like the memory overflow in NetScaler ADC/Gateway, directly addressing the CVE through patching as recommended in the Citrix advisory.
Implements memory protection safeguards such as address space layout randomization or non-executable memory to prevent exploitation of the memory overflow vulnerability leading to RCE.
Enforces validation of inputs to network services like VPN, ICA Proxy, and HTTP/SSL load balancers, mitigating buffer overflows from malformed IPv6 or other traffic targeting the vulnerable configurations.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct unauthenticated RCE via memory corruption in a public-facing network appliance (NetScaler ADC/Gateway) maps cleanly to exploitation of exposed applications.
NVD Description
Memory overflow vulnerability leading to Remote Code Execution and/or Denial of Service in NetScaler ADC and NetScaler Gateway when NetScaler is configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server (OR) NetScaler ADC and…
more
NetScaler Gateway 13.1, 14.1, 13.1-FIPS and NDcPP: LB virtual servers of type (HTTP, SSL or HTTP_QUIC) bound with IPv6 services or servicegroups bound with IPv6 servers (OR) NetScaler ADC and NetScaler Gateway 13.1, 14.1, 13.1-FIPS and NDcPP: LB virtual servers of type (HTTP, SSL or HTTP_QUIC) bound with DBS IPv6 services or servicegroups bound with IPv6 DBS servers (OR) CR virtual server with type HDX
Deeper analysisAI
CVE-2025-7775 is a memory overflow vulnerability (CWE-119) that can lead to remote code execution and/or denial of service in NetScaler ADC and NetScaler Gateway. It affects instances configured as a Gateway, including VPN virtual server, ICA Proxy, CVPN, or RDP Proxy, as well as AAA virtual servers. The issue also impacts NetScaler ADC and NetScaler Gateway versions 13.1, 14.1, 13.1-FIPS, and NDcPP when load balancing (LB) virtual servers of type HTTP, SSL, or HTTP_QUIC are bound with IPv6 services or service groups bound with IPv6 servers, or with IPv6 DBS services or service groups bound with IPv6 DBS servers. Additionally, it affects CR virtual servers with type HDX.
With a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), the vulnerability allows unauthenticated remote attackers to exploit it over the network with low attack complexity and no user interaction required. Successful exploitation enables remote code execution, compromising confidentiality, integrity, and availability to a high degree, or causes denial of service.
Mitigation details are provided in the Citrix support advisory CTX694938 at https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694938.
The vulnerability is listed in the CISA Known Exploited Vulnerabilities Catalog at https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-7775, indicating real-world exploitation.
Details
- CWE(s)
- KEV Date Added
- 26 August 2025