CVE-2025-6543
Citrix ADC VPX Análise e mitigação de vulnerabilidades

Visão geral

CVE-2025-6543 is a critical memory overflow vulnerability affecting NetScaler ADC and NetScaler Gateway when configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server. The vulnerability was discovered and disclosed on June 25, 2025, with a CVSS score of 9.2 (Critical). The affected versions include NetScaler ADC and NetScaler Gateway 14.1 prior to 14.1-47.46, 13.1 prior to 13.1-59.19, and NetScaler ADC 13.1-FIPS and NDcPP prior to 13.1-37.236 (NVD, Hacker News).

Detalhes técnicos

The vulnerability is characterized as a memory overflow condition that leads to unintended control flow and denial-of-service. It requires no user interaction or privileges for exploitation, with high impact ratings for all three vulnerable system metrics: Confidentiality, Integrity, and Availability. The CVSS v4.0 vector string is CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L, indicating its critical severity (Rapid7, NVD).

Impacto

The vulnerability can result in unintended control flow and denial-of-service in affected systems. The high CVSS score and impact metrics suggest potential for remote code execution (RCE) capabilities. The vulnerability affects systems configured as either Gateway or AAA virtual server, which is a common configuration in production environments (Rapid7).

Mitigação e soluções alternativas

Cloud Software Group has released patches for affected versions: NetScaler ADC and NetScaler Gateway 14.1 should update to version 14.1-47.46 or above, version 13.1 should update to 13.1-59.19 or above. For FIPS and NDcPP versions, customers must contact NetScaler support directly for appropriate updates. Versions 12.1 and 13.0, being End of Life (EOL), will not receive patches and users are urged to upgrade to supported versions (Hacker News).

Reações da comunidade

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2025-6543 to their Known Exploited Vulnerabilities (KEV) catalog, requiring Federal Civilian Executive Branch agencies to apply fixes by July 21, 2025. Security researchers have emphasized the critical nature of this vulnerability, particularly due to its active exploitation status (Rapid7).

Recursos adicionais


OrigemEste relatório foi gerado usando IA

Relacionado Citrix ADC VPX Vulnerabilidades:

CVE ID

Gravidade

Pontuação

Tecnologias

Nome do componente

Exploração do CISA KEV

Tem correção

Data de publicação

CVE-2025-5777CRITICAL9.3
  • Citrix ADC VPXCitrix ADC VPX
  • cpe:2.3:a:citrix:netscaler_application_delivery_controller
SimSimJun 17, 2025
CVE-2025-7775CRITICAL9.2
  • Citrix ADC VPXCitrix ADC VPX
  • cpe:2.3:a:citrix:netscaler_application_delivery_controller
SimSimAug 26, 2025
CVE-2025-6543CRITICAL9.2
  • Citrix ADC VPXCitrix ADC VPX
  • cpe:2.3:a:citrix:netscaler_application_delivery_controller
SimSimJun 25, 2025
CVE-2025-7776HIGH8.8
  • Citrix ADC VPXCitrix ADC VPX
  • cpe:2.3:a:citrix:netscaler_application_delivery_controller
NãoSimAug 26, 2025
CVE-2025-8424HIGH8.7
  • Citrix ADC VPXCitrix ADC VPX
  • cpe:2.3:a:citrix:netscaler_application_delivery_controller
NãoSimAug 26, 2025

Avaliação de vulnerabilidade gratuita

Compare sua postura de segurança na nuvem

Avalie suas práticas de segurança na nuvem em 9 domínios de segurança para comparar seu nível de risco e identificar lacunas em suas defesas.

Solicitar avaliação

Marque uma demonstração personalizada

Pronto para ver a Wiz em ação?

"A melhor experiência do usuário que eu já vi, fornece visibilidade total para cargas de trabalho na nuvem."
David EstlickCISO
"A Wiz fornece um único painel de vidro para ver o que está acontecendo em nossos ambientes de nuvem."
Adão FletcherDiretor de Segurança
"Sabemos que se a Wiz identifica algo como crítico, na verdade é."
Greg PoniatowskiChefe de Gerenciamento de Ameaças e Vulnerabilidades