Particle.news

Download on the App Store

Citrix Releases Patch for Critical NetScaler Flaw as New DoS Vulnerability Emerges

Security teams must terminate active ICA and PCoIP sessions after installing the patch to prevent attackers from reusing stolen session tokens.

Image
Image

Overview

  • Citrix has issued a 9.3-severity patch for CVE-2025-5777, an out-of-bounds memory-read flaw in NetScaler ADC and Gateway appliances.
  • The flaw can leak session tokens, enabling unauthenticated attackers to hijack user sessions and bypass multi-factor authentication.
  • Operators are advised to upgrade to supported NetScaler builds and run kill icaconnection -all and kill pcoipconnection -all to reset active ICA and PCoIP sessions.
  • A separate vulnerability, CVE-2025-6543, is already being exploited to trigger denial-of-service conditions on exposed NetScaler interfaces.
  • Security scans show over 56,500 publicly reachable NetScaler endpoints, although the proportion vulnerable to these flaws remains unknown.