← Back to BrewedIntel
vulnerabilitycriticalVulnerability ExploitationZero-Day ExploitationCVE-2025-5349CVE-2025-5777CVE-2025-6543

Jul 06, 2025 • Wiz Security Research

Critical vulnerabilities in NetScaler ADC exploited in-the-wild: everything you need to know

Critical vulnerabilities affecting Citrix NetScaler ADC and Gateway appliances are actively being exploited in the wild, posing a significant risk to...

Source
Wiz Security Research
Category
vulnerability
Severity
critical

Executive Summary

Critical vulnerabilities affecting Citrix NetScaler ADC and Gateway appliances are actively being exploited in the wild, posing a significant risk to organizational security perimeters. The advisory highlights three specific Common Vulnerabilities and Exposures (CVEs): CVE-2025-5349, CVE-2025-5777, and CVE-2025-6543. These flaws allow attackers to potentially compromise network traffic management systems without authentication. Immediate action is required to prevent unauthorized access and potential data exfiltration. Organizations are urged to prioritize patching these vulnerabilities urgently to mitigate the threat. Failure to apply updates may result in severe compromise of network infrastructure. Security teams should monitor for suspicious activity related to NetScaler devices and ensure all systems are updated to the latest secure versions provided by the vendor. This situation underscores the importance of rapid vulnerability management for public-facing applications.

Summary

Detect and mitigate CVE-2025-5349, CVE-2025-5777, and CVE-2025-6543, Citrix Netscaler ADC and Gateway vulnerabilities being exploited in the wild. Organizations should patch urgently.

Published Analysis

Critical vulnerabilities affecting Citrix NetScaler ADC and Gateway appliances are actively being exploited in the wild, posing a significant risk to organizational security perimeters. The advisory highlights three specific Common Vulnerabilities and Exposures (CVEs): CVE-2025-5349, CVE-2025-5777, and CVE-2025-6543. These flaws allow attackers to potentially compromise network traffic management systems without authentication. Immediate action is required to prevent unauthorized access and potential data exfiltration. Organizations are urged to prioritize patching these vulnerabilities urgently to mitigate the threat. Failure to apply updates may result in severe compromise of network infrastructure. Security teams should monitor for suspicious activity related to NetScaler devices and ensure all systems are updated to the latest secure versions provided by the vendor. This situation underscores the importance of rapid vulnerability management for public-facing applications. Detect and mitigate CVE-2025-5349, CVE-2025-5777, and CVE-2025-6543, Citrix Netscaler ADC and Gateway vulnerabilities being exploited in the wild. Organizations should patch urgently. Detect and mitigate CVE-2025-5349, CVE-2025-5777, and CVE-2025-6543, Citrix Netscaler ADC and Gateway vulnerabilities being exploited in the wild. Organizations should patch urgently.

Linked Entities

  • CVE-2025-5349
  • CVE-2025-5777
  • CVE-2025-6543