
Cloud Vulnerability DB
A community-led vulnerabilities database
A memory overflow vulnerability (CVE-2025-7776) was discovered in NetScaler ADC and NetScaler Gateway that could lead to unpredictable or erroneous behavior and Denial of Service when NetScaler is configured as a Gateway with PCoIP Profile bounded to it. The vulnerability was disclosed on August 26, 2025, affecting multiple versions of NetScaler ADC and NetScaler Gateway (NVD, Hacker News).
The vulnerability has been assigned a CVSS v4.0 base score of 8.8 (High) with the vector string CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:L. The vulnerability is classified under CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer). For exploitation, NetScaler must be configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) with PCoIP Profile bounded to it (NVD).
When successfully exploited, the vulnerability can result in unpredictable system behavior and Denial of Service conditions in the affected NetScaler appliances. This could potentially disrupt critical network services and impact business operations (Hacker News).
Citrix has released patches to address this vulnerability. The fixed versions include: NetScaler ADC and NetScaler Gateway 14.1-47.48 and later releases, NetScaler ADC and NetScaler Gateway 13.1-59.22 and later releases of 13.1, NetScaler ADC 13.1-FIPS and 13.1-NDcPP 13.1-37.241 and later releases, and NetScaler ADC 12.1-FIPS and 12.1-NDcPP 12.1-55.330 and later releases (Hacker News).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."