Cybersecurity Forecast 2026: What to Expect – New Report

CVE-2025-6543

Memory Overflow in Citrix NetScaler Enabling DoS and Remote Exploitation

Vulnerability Overview

CVE ID: CVE-2025-6543

CVE Title: Citrix NetScaler ADC and Gateway Memory Overflow

Severity: Critical

Exploit Status: Actively exploited as a zero-day before disclosure

Business Risk: Remote code execution and service disruption on perimeter devices, enabling attackers to infiltrate networks, plant malware, and erase evidence of compromise. This can cause severe operational outages, exposure of sensitive systems, and long recovery times.

Summary

CVE-2025-6543 is a critical memory overflow in Citrix NetScaler ADC and Gateway when configured as VPN, ICA Proxy, CVPN, RDP, or AAA servers. Exploitation can cause denial of service or remote code execution without authentication. Actively exploited since May 2025, allowing attackers to execute code, maintain persistence, and erase logs. Patched builds include ADC 14.1-47.46, 13.1-59.19, and 13.1-37.236 (FIPS/NDcPP); older versions like 12.1 and 13.0 require upgrading. Immediate patching and session termination are strongly recommended.

Urgent Actions Required

Which Systems Are Vulnerable to CVE-2025-6543?

Technical Overview

How Does the CVE-2025-6543 Exploit Work?

The attack typically follows these steps:

CVE‑2025‑6543 Exploitation Path

What Causes CVE-2025-6543?

Vulnerability Root Cause:

CVE-2025-6543 is a memory overflow in NetScaler ADC and Gateway when used as VPN, ICA Proxy, CVPN, RDP Proxy, or AAA servers. Crafted traffic can overflow memory, crash the device, or run malicious code without authentication.

How Can You Mitigate CVE‑2025‑6543?

If immediate patching is delayed or not possible:

  • Isolate vulnerable NetScaler ADC and Gateway devices to reduce exposure.
  • Check firewall and device logs for unusual activity or suspicious files.
  • End all active sessions to block reuse of stolen session data.
  • Limit external access until patches are applied.
  • Run scans or forensic checks regularly to detect exploitation.

Which Assets and Systems Are at Risk?

Asset Types Affected:

Business-Critical Systems at Risk:

Exposure Level:

Will Patching CVE‑2025‑6543 Cause Downtime?

Patch application impact: Low. Update NetScaler ADC/Gateway to 14.147.46, 13.159.19, or 13.137.236 (FIPS/NDcPP); a reboot may be needed but downtime is minimal. Unsupported 12.1/13.0 require migration.

Mitigation (if immediate patching is not possible): Isolate devices, monitor for suspicious activity, and terminate active sessions; systems remain at risk until updated.

How Can You Detect CVE‑2025‑6543 Exploitation?

Exploitation Signatures:

Look for unexpected crashes, reboots, or service disruptions on NetScaler ADC or Gateway appliances configured as VPN virtual server, ICA Proxy, CVPN, RDP Proxy, or AAA virtual server. Sudden device restarts or abnormal memory activity may indicate exploitation attempts.

Indicators of Compromise (IOCs/IOAs):

Behavioral Indicators:

Alerting Strategy:

Remediation & Response

Patch/Upgrade Instructions:

Mitigation Steps if No Patch:

Rollback Plan:

Incident Response Considerations:

Compliance & Governance Notes

Standards Impacted:

Audit Trail Requirement:

Policy Alignment:

CVSS Breakdown Table

MetricValue Description
Base Score9.8Critical severity, indicating high impact and exploitability
Attack VectorNetworkCan be exploited remotely over the internet targeting NetScaler ADC or Gateway configured as VPN, ICA Proxy, CVPN, RDP Proxy, or AAA virtual server
Attack ComplexityLowExploit is straightforward; no special conditions required
Privileges RequiredNoneNo authentication or elevated privileges needed
User Interaction NoneNo user action is required for exploitation
Scope UnChanged Exploitation affects only the vulnerable NetScaler component
Confidentiality Impact HighSuccessful exploit may allow attackers to execute code and access sensitive systems
Integrity ImpactHighExploit can allow attackers to modify device behavior or control execution flow
Availability ImpactHighExploit can cause denial of service or device crashes, impacting network availability

Related Readings

One Platform for All Adversaries

See Fidelis in action. Learn how our fast and scalable platforms provide full visibility, deep insights, and rapid response to help security teams across the World protect, detect, respond, and neutralize advanced cyber adversaries.