{"id":378911,"date":"2025-08-27T23:59:20","date_gmt":"2025-08-27T23:59:20","guid":{"rendered":"https:\/\/www.europesays.com\/uk\/378911\/"},"modified":"2025-08-27T23:59:20","modified_gmt":"2025-08-27T23:59:20","slug":"over-28000-citrix-devices-vulnerable-to-new-exploited-rce-flaw","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/uk\/378911\/","title":{"rendered":"Over 28,000 Citrix devices vulnerable to new exploited RCE flaw"},"content":{"rendered":"<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" alt=\"Citrix\" height=\"900\" src=\"https:\/\/www.europesays.com\/uk\/wp-content\/uploads\/2025\/08\/citrix-stars.jpg\" width=\"1600\"\/><\/p>\n<p>More than 28,200 Citrix instances are vulnerable to a critical remote code execution vulnerability tracked as CVE-2025-7775 that is already being exploited in the wild.<\/p>\n<p>The vulnerability affects\u00a0NetScaler ADC and NetScaler Gateway and the <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/citrix-fixes-critical-netscaler-rce-flaw-exploited-in-zero-day-attacks\/\" target=\"_blank\" rel=\"nofollow noopener\">vendor addressed it<\/a> in updates released yesterday.<\/p>\n<p>According to the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and Citrix, the security issue has been exploited as a zero-day vulnerability.<\/p>\n<p>The versions affected by CVE-2025-7775 are 14.1 before 14.1-47.48, 13.1 before13.1-59.22, 13.1-FIPS\/NDcPP before 13.1-37.241-FIPS\/NDcPP, and 12.1-FIPS\/NDcPP up to\u00a012.1-55.330-FIPS\/NDcPP.<\/p>\n<p>Citrix does not provide any mitigations or workarounds and urges\u00a0admins to upgrade the firmware immediately.<\/p>\n<p>Internet scans conducted by the threat monitoring platform The Shadowserver Foundation\u00a0soon after the flaw was disclosed\u00a0show that there were\u00a0<a href=\"http:\/\/dashboard.shadowserver.org\/statistics\/combined\/time-series\/?date_range=7&amp;source=http_vulnerable&amp;source=http_vulnerable6&amp;tag=cve-2025-7775%2B&amp;dataset=unique_ips&amp;limit=100&amp;group_by=geo&amp;stacking=stacked&amp;auto_update=on\" target=\"_blank\" rel=\"nofollow noopener\">more than 28,000 Citrix instances<\/a>\u00a0vulnerable to CVE-2025-7775.<\/p>\n<p>Most of the vulnerable instances are <a href=\"https:\/\/dashboard.shadowserver.org\/statistics\/combined\/tree\/?date_range=1&amp;source=exchange&amp;source=exchange6&amp;source=http_vulnerable&amp;source=http_vulnerable6&amp;tag=cve-2025-7775%2B&amp;data_set=count&amp;scale=log&amp;auto_update=on\" target=\"_blank\" rel=\"nofollow noopener\">located<\/a><a href=\"http:\/\/dashboard.shadowserver.org\/statistics\/combined\/tree\/?date_range=1&amp;source=exchange&amp;source=exchange6&amp;source=http_vulnerable&amp;source=http_vulnerable6&amp;tag=cve-2025-7775%2B&amp;data_set=count&amp;scale=log&amp;auto_update=on\" target=\"_blank\" rel=\"nofollow noopener\"> in the United States<\/a> (10,100), followed by Germany (4,300), the United Kingdom (1,400), the Netherlands (1,300), Switzerland (1,300), Australia (880), Canada (820), and France (600).<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"Citrix exposure map\" height=\"600\" src=\"https:\/\/www.europesays.com\/uk\/wp-content\/uploads\/2025\/08\/location.jpeg\" width=\"1065\"\/><strong>Citrix instance exposure to CVE-2025-7775 heatmap<\/strong><br \/>Source: The Shadowserver Foundation<\/p>\n<p>Citrix did not share indicators of compromise associated with the exploitation activity.<\/p>\n<p>However, the vendor specifies\u00a0that CVE-2025-7775 affects NetScaler when configured as a Gateway\/AAA virtual server (VPN, ICA Proxy, CVPN, RDP Proxy), as LB virtual servers (HTTP\/SSL\/HTTP_QUIC) bound to IPv6 or DBS IPv6 services, or as a CR virtual server with type HDX.<\/p>\n<p>In any case, admins are recommended to upgrade to one of the following releases, which address the issue:<\/p>\n<ul>\n<li>14.1-47.48 and later<\/li>\n<p>&#13;<\/p>\n<li>13.1-59.22 and later<\/li>\n<p>&#13;<\/p>\n<li>13.1-FIPS \/ 13.1-NDcPP 13.1-37.241 and later<\/li>\n<p>&#13;<\/p>\n<li>12.1-FIPS \/ 12.1-NDcPP 12.1-55.330 and later<\/li>\n<p>&#13;\n<\/ul>\n<p>Citrix also disclosed two other, high-severity\u00a0flaws in its security bulletin: CVE-2025-7776 (memory overflow denial-of-service) and CVE-2025-8424 (improper access control on the management interface).<\/p>\n<p>It is noted that versions 12.1 and 13.0 (non-FIPS\/NDcPP) are also vulnerable; however, they have reached End of Life status, so customers still using these versions must upgrade to a supported release.<\/p>\n<p>CISA has already added the critical\u00a0CVE-2025-7775 vulnerability to its Known Exploited Vulnerabilities (KEV) catalog. The agency is giving federal agencies until August 28 to apply the patches from the vendor or quit using the affected products, underlining the severity of the issue and the risk associated with exploitation.<\/p>\n<p>        <a href=\"https:\/\/hubs.li\/Q03B5Kw_0\" target=\"_blank\" rel=\"noopener sponsored\"><br \/>\n            <img decoding=\"async\" src=\"https:\/\/www.europesays.com\/uk\/wp-content\/uploads\/2025\/08\/blue-report-2025.jpg\" alt=\"Picus Blue Report 2025\"\/><br \/>\n        <\/a><\/p>\n<p>46% of environments had passwords cracked, nearly doubling from 25% last year.<\/p>\n<p>Get the Picus Blue Report 2025 now for a comprehensive look at more findings on prevention, detection, and data exfiltration trends.<\/p>\n<p>        <a href=\"https:\/\/hubs.li\/Q03B5Kw_0\" target=\"_blank\" rel=\"noopener sponsored\">Get the Blue Report 2025<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"More than 28,200 Citrix instances are vulnerable to a critical remote code execution vulnerability tracked as CVE-2025-7775 that&hellip;\n","protected":false},"author":2,"featured_media":378912,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[51,16,15],"class_list":{"0":"post-378911","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"tag-business","9":"tag-uk","10":"tag-united-kingdom"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@uk\/115103450080932783","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts\/378911","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/comments?post=378911"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts\/378911\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/media\/378912"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/media?parent=378911"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/categories?post=378911"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/tags?post=378911"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}