Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical Vulnerability Patched in Citrix NetScaler

Posted on June 18, 2025June 18, 2025 By CWS

Citrix on Tuesday introduced patches for 4 vulnerabilities throughout three merchandise, together with a critical-severity challenge in NetScaler ADC and NetScaler Gateway.

The essential flaw, tracked as CVE-2025-5777 (CVSS rating of 9.3), is described as an out-of-bounds reminiscence learn brought on by inadequate enter validation.

Solely NetScaler deployments configured as Gateway (VPN digital server, ICA Proxy, CVPN, RDP Proxy) or as Authentication, Authorization, and Accounting (AAA) digital server are affected, Citrix explains in its advisory.

The flaw was addressed in NetScaler ADC variations 14.1-43.56, 13.1-58.32, 13.1-FIPS, 13.1-NDcPP 13.1-37.235, and 12.1-FIPS 12.1-55.328, and in NetScaler Gateway variations 14.1-43.56 and 13.1-58.32.

The updates additionally handle CVE-2025-5349, a high-severity improper entry management challenge within the NetScaler Administration Interface.

Citrix warns that NetScaler ADC and Gateway variations 12.1 and 13.0, which have been discontinued, are affected by these vulnerabilities too, urging prospects to improve to a supported iteration as quickly as attainable.

On Tuesday, the corporate additionally launched fixes for a high-severity improper privilege administration flaw in Safe Entry Consumer for Home windows that could possibly be exploited to acquire System privileges. Tracked as CVE-2025-0320, the safety defect was addressed in Safe Entry Consumer for Home windows model 25.5.1.15.

One other high-severity improper privilege administration vulnerability, tracked as CVE-2025-4879, was addressed with the discharge of Citrix Workspace app for Home windows model 2409, and in Workspace app for Home windows 2402 LTSR CU2 Hotfix 1 and 2402 LTSR CU3 Hotfix 1.Commercial. Scroll to proceed studying.

Citrix makes no point out of any of those vulnerabilities being exploited within the wild, however customers are suggested to replace their installations as quickly as attainable. Extra info will be discovered on the corporate’s safety bulletins web page.

Associated: Citrix Warns of Password Spraying Assaults Focusing on NetScaler Home equipment

Associated: Code Execution Vulnerabilities Patched in Veeam, BeyondTrust Merchandise

Associated: Chrome 137 Replace Patches Excessive-Severity Vulnerabilities

Security Week News Tags:Citrix, Critical, NetScaler, Patched, Vulnerability

Post navigation

Previous Post: System Admins Beware! Weaponized Putty Ads in Bing Installs Remote Access Tools
Next Post: RapperBot Botnet Attack Peaks 50,000+ Attacks Targeting Network Edge Devices

Related Posts

LevelBlue to Acquire Trustwave to Create Major MSSP Security Week News
Managing the Trust-Risk Equation in AI: Predicting Hallucinations Before They Strike Security Week News
Security Industry Skeptical of Scattered Spider-ShinyHunters Retirement Claims Security Week News
React Native Aria Packages Backdoored in Supply Chain Attack Security Week News
Microsoft 365 Direct Send Abused for Phishing Security Week News
Ransomware Gang Leaks Alleged Kettering Health Data Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • LastPass Warns of Fake Repositories Infecting macOS with Atomic Infostealer
  • Researchers Uncover GPT-4-Powered MalTerminal Malware Creating Ransomware, Reverse Shell
  • ShadowLeak Zero-Click Flaw Leaks Gmail Data via OpenAI ChatGPT Deep Research Agent
  • Threat Actors Selling New Undetectable RAT As ’ScreenConnect FUD Alternative’
  • Breachlock Named Sample Vendor for PTaaS and AEV in Two 2025 Gartner Reports

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • LastPass Warns of Fake Repositories Infecting macOS with Atomic Infostealer
  • Researchers Uncover GPT-4-Powered MalTerminal Malware Creating Ransomware, Reverse Shell
  • ShadowLeak Zero-Click Flaw Leaks Gmail Data via OpenAI ChatGPT Deep Research Agent
  • Threat Actors Selling New Undetectable RAT As ’ScreenConnect FUD Alternative’
  • Breachlock Named Sample Vendor for PTaaS and AEV in Two 2025 Gartner Reports

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News