
Cloud Vulnerability DB
コミュニティ主導の脆弱性データベース
A memory overflow vulnerability (CVE-2025-7776) was discovered in NetScaler ADC and NetScaler Gateway that could lead to unpredictable or erroneous behavior and Denial of Service when NetScaler is configured as a Gateway with PCoIP Profile bounded to it. The vulnerability was disclosed on August 26, 2025, affecting multiple versions of NetScaler ADC and NetScaler Gateway (NVD, Hacker News).
The vulnerability has been assigned a CVSS v4.0 base score of 8.8 (High) with the vector string CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:L. The vulnerability is classified under CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer). For exploitation, NetScaler must be configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) with PCoIP Profile bounded to it (NVD).
When successfully exploited, the vulnerability can result in unpredictable system behavior and Denial of Service conditions in the affected NetScaler appliances. This could potentially disrupt critical network services and impact business operations (Hacker News).
Citrix has released patches to address this vulnerability. The fixed versions include: NetScaler ADC and NetScaler Gateway 14.1-47.48 and later releases, NetScaler ADC and NetScaler Gateway 13.1-59.22 and later releases of 13.1, NetScaler ADC 13.1-FIPS and 13.1-NDcPP 13.1-37.241 and later releases, and NetScaler ADC 12.1-FIPS and 12.1-NDcPP 12.1-55.330 and later releases (Hacker News).
ソース: このレポートは AI を使用して生成されました
無料の脆弱性評価
9つのセキュリティドメインにわたるクラウドセキュリティプラクティスを評価して、リスクレベルをベンチマークし、防御のギャップを特定します。
パーソナライズされたデモを見る
"私が今まで見た中で最高のユーザーエクスペリエンスは、クラウドワークロードを完全に可視化します。"
"Wiz を使えば、クラウド環境で何が起こっているかを 1 つの画面で確認することができます"
"Wizが何かを重要視した場合、それは実際に重要であることを私たちは知っています。"