Loading HuntDB...

CVE-2025-7775

Published Unknown
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2025-7775. We'll provide specific mitigation strategies based on your environment and risk profile.

CVSS Score

V3.1
0.0
/10
Not Available
Base Score Metrics
Exploitability: N/A Impact: N/A

Attack Vector Metrics

Attack Vector
Not Available
Attack Complexity
Not Available
Privileges Required
Not Available
User Interaction
Not Available
Scope
Not Available

Impact Metrics

Confidentiality
Not Available
Integrity
Not Available
Availability
Not Available

Description

Memory overflow vulnerability leading to Remote Code Execution and/or Denial of Service in NetScaler ADC and NetScaler Gateway when NetScaler is configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server

(OR)

NetScaler ADC and NetScaler Gateway 13.1, 14.1, 13.1-FIPS and NDcPP: LB virtual servers of type (HTTP, SSL or HTTP_QUIC) bound with IPv6 services or servicegroups bound with IPv6 servers

(OR)

NetScaler ADC and NetScaler Gateway 13.1, 14.1, 13.1-FIPS and NDcPP: LB virtual servers of type (HTTP, SSL or HTTP_QUIC) bound with DBS IPv6 services or servicegroups bound with IPv6 DBS servers

(OR)

CR virtual server with type HDX

Available Exploits

No exploits available for this CVE.

Related News

No news articles found for this CVE.

Affected Products

Unknown Vendor

Unknown Product

Unknown Vendor

Unknown Product

Known Exploited Vulnerability

This vulnerability is actively being exploited in the wild

View KEV Details

Remediation Status

Overdue

Due Date

August 28, 2025

Added to KEV

August 26, 2025

Required Action

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Affected Product

Vendor/Project: Citrix
Product: NetScaler

Ransomware Risk

Known Ransomware Use
KEV Catalog Version: 2025.09.04 Released: September 4, 2025

EU Vulnerability Database

Monitored by ENISA for EU cybersecurity

EU Coordination

EU Coordinated

Exploitation Status

No Known Exploitation

ENISA Analysis

Malicious code in bioql (PyPI)

Affected Products (ENISA)

netscaler
gateway

ENISA Scoring

CVSS Score (4.0)

9.2
/10
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L

EPSS Score

6.550
probability

Data provided by ENISA EU Vulnerability Database. Last updated: October 3, 2025

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

⚠ Unreviewed CRITICAL

GHSA-2m4h-vp37-6746

Advisory Details

Memory overflow vulnerability leading to Remote Code Execution and/or Denial of Service in NetScaler ADC and NetScaler Gateway when NetScaler is configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server (OR) NetScaler ADC and NetScaler Gateway 13.1, 14.1, 13.1-FIPS and NDcPP: LB virtual servers of type (HTTP, SSL or HTTP_QUIC) bound with IPv6 services or servicegroups bound with IPv6 servers (OR) NetScaler ADC and NetScaler Gateway 13.1, 14.1, 13.1-FIPS and NDcPP: LB virtual servers of type (HTTP, SSL or HTTP_QUIC) bound with DBS IPv6 services or servicegroups bound with IPv6 DBS servers (OR) CR virtual server with type HDX

CVSS Scoring

CVSS Score

9.0

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Advisory provided by GitHub Security Advisory Database. Published: August 26, 2025, Modified: August 27, 2025

Social Media Intelligence

Real-time discussions and threat intelligence from social platforms

4 posts
Reddit 2 weeks, 4 days ago
crstux
Exploit Payload

🔥 Top 10 Trending CVEs (20/09/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2025-55241](https://nvd.nist.gov/vuln/detail/CVE-2025-55241)** - 📝 Azure Entra Elevation of Privilege Vulnerability - 📅 **Published:** 04/09/2025 - 📈 **CVSS:** 10 - 🧭 **Vector:** CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C - 📣 **Mentions:** 19 - ⚠️ **Priority:** 2 - 📝 …

1
1.0
View Original High Risk
Reddit 2 weeks, 5 days ago
crstux
Exploit

🔥 Top 10 Trending CVEs (19/09/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2024-34102](https://nvd.nist.gov/vuln/detail/CVE-2024-34102)** - 📝 Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Restriction of XML External Entity Reference (XXE) vulnerability that could result in arbitrary code …

2
2.0
View Original High Risk
Reddit 2 weeks, 6 days ago
falconupkid
Exploit

CVE-2025-10585 Vulnerability: A New Zero-Day Exploit in Chrome’s V8 JavaScript and WebAssembly Engine Weaponized in Real-World Attacks Following the discovery of CVE-2025-7775, a critical RCE vulnerability in Citrix NetScaler already under active exploitation, another zero-day flaw has now emerged in the cyber threat arena, which is actively leveraged in real-world... …

1
1.0
View Original High Risk
Reddit 4 weeks ago
MauriceTorres
Exploit PoC

𝗧𝗼𝗱𝗮𝘆'𝘀 𝗣𝗮𝘁𝗰𝗵 𝗧𝘂𝗲𝘀𝗱𝗮𝘆 𝗼𝘃𝗲𝗿𝘃𝗶𝗲𝘄! ▪️ Microsoft has addressed 81 vulnerabilities, two zero-days with PoC (CVE-2025-55234 and CVE-2025-21907), 8 critical ▪️ Third-party: actively exploited vulnerabilities in Google Chrome, Android, Apple, WhatsApp, FreePBX, Citrix, and Fortinet, plus major third-party issues affecting Docker Desktop, Cisco Secure Firewall, Intel, Passwordstate, and popular password manager …

7
7.0
View Original High Risk
Published: Unknown
Last Modified: Unknown
Copied to clipboard!