Citrix NetScaler ADC and Gateway vulnerabilities patched and actively exploited in the wild
Summary
Hide β²
Show βΌ
Citrix has released patches for three vulnerabilities in NetScaler ADC and NetScaler Gateway. One of these vulnerabilities, CVE-2025-7775, is actively exploited in the wild. The flaws include memory overflow vulnerabilities and improper access control issues. The vulnerabilities affect specific configurations of NetScaler ADC and NetScaler Gateway, including unsupported, end-of-life versions. Citrix has confirmed active exploitation of CVE-2025-7775, which can lead to remote code execution or denial-of-service. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2025-7775 to its Known Exploited Vulnerabilities (KEV) catalog, requiring federal agencies to remediate within 48 hours. Nearly 20% of NetScaler assets identified are on unsupported, end-of-life versions, with a significant concentration in North America and the APAC region. CISA lists 10 NetScaler flaws in its KEV catalog, with six discovered in the last two years. Threat actors are using HexStrike AI, an AI-driven security platform, to exploit the Citrix vulnerabilities, significantly reducing the time between disclosure and mass exploitation. HexStrike-AI was created by cybersecurity researcher Muhammad Osama and has been open-source and available on GitHub for the last month, where it has already garnered 1,800 stars and over 400 forks.
Timeline
-
03.09.2025 15:20 π° 2 articles Β· β± 13d ago
Threat actors exploit Citrix vulnerabilities with HexStrike AI
HexStrike-AI was created by cybersecurity researcher Muhammad Osama and has been open-source and available on GitHub for the last month, where it has already garnered 1,800 stars and over 400 forks. HexStrike-AI integrates with over 150 cybersecurity tools for automated penetration testing and vulnerability discovery. It features a retry logic and recovery handling to mitigate failures. The tool has been discussed on hacking forums for deploying to exploit Citrix vulnerabilities within hours of their disclosure. Threat actors have used HexStrike-AI to achieve unauthenticated remote code execution through CVE-2025-7775 and drop webshells on compromised appliances. Some are offering compromised NetScaler instances for sale. CheckPoint believes attackers used HexStrike-AI to automate their exploitation chain, reducing the exploitation time from several days to a few minutes. Nearly 8,000 endpoints remain vulnerable to CVE-2025-7775 as of September 2, 2025, down from 28,000 the previous week.
Show sources
- Threat Actors Weaponize HexStrike AI to Exploit Citrix Flaws Within a Week of Disclosure β thehackernews.com β 03.09.2025 15:20
- Hackers use new HexStrike-AI tool to rapidly exploit n-day flaws β www.bleepingcomputer.com β 03.09.2025 21:03
-
26.08.2025 20:29 π° 3 articles Β· β± 21d ago
Citrix patches actively exploited vulnerability in NetScaler ADC and NetScaler Gateway
The vulnerabilities affect multiple versions of Citrix NetScaler ADC and NetScaler Gateway, including unsupported, end-of-life versions. CVE-2025-7775 affects NetScaler ADC and NetScaler Gateway versions 12.1, 13.1, and 14.1. The vulnerability can be exploited on devices configured for VPN, remote access, IPv6 web traffic, or specific content routing tasks. Nearly 20% of NetScaler assets identified are on unsupported, end-of-life versions, with a significant concentration in North America and the APAC region. CISA lists 10 NetScaler flaws in its KEV catalog, with six discovered in the last two years. Threat actors are using HexStrike AI, an AI-driven security platform, to exploit the Citrix vulnerabilities, significantly reducing the time between disclosure and mass exploitation.
Show sources
- Citrix Patches Three NetScaler Flaws, Confirms Active Exploitation of CVE-2025-7775 β thehackernews.com β 26.08.2025 20:29
- Citrix Gear Under Active Attack Again With Another Zero-Day β www.darkreading.com β 26.08.2025 23:04
- Threat Actors Weaponize HexStrike AI to Exploit Citrix Flaws Within a Week of Disclosure β thehackernews.com β 03.09.2025 15:20
Information Snippets
-
CVE-2025-7775 is a memory overflow vulnerability with a CVSS score of 9.2, leading to remote code execution and/or denial-of-service.
First reported: 26.08.2025 20:29π° 2 sources, 2 articlesShow sources
- Citrix Patches Three NetScaler Flaws, Confirms Active Exploitation of CVE-2025-7775 β thehackernews.com β 26.08.2025 20:29
- Citrix Gear Under Active Attack Again With Another Zero-Day β www.darkreading.com β 26.08.2025 23:04
-
CVE-2025-7776 is a memory overflow vulnerability with a CVSS score of 8.8, causing unpredictable behavior and denial-of-service.
First reported: 26.08.2025 20:29π° 2 sources, 2 articlesShow sources
- Citrix Patches Three NetScaler Flaws, Confirms Active Exploitation of CVE-2025-7775 β thehackernews.com β 26.08.2025 20:29
- Citrix Gear Under Active Attack Again With Another Zero-Day β www.darkreading.com β 26.08.2025 23:04
-
CVE-2025-8424 is an improper access control vulnerability with a CVSS score of 8.7, affecting the NetScaler Management Interface.
First reported: 26.08.2025 20:29π° 2 sources, 2 articlesShow sources
- Citrix Patches Three NetScaler Flaws, Confirms Active Exploitation of CVE-2025-7775 β thehackernews.com β 26.08.2025 20:29
- Citrix Gear Under Active Attack Again With Another Zero-Day β www.darkreading.com β 26.08.2025 23:04
-
CVE-2025-7775 affects specific configurations of NetScaler ADC and NetScaler Gateway, including Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server configurations.
First reported: 26.08.2025 20:29π° 2 sources, 3 articlesShow sources
- Citrix Patches Three NetScaler Flaws, Confirms Active Exploitation of CVE-2025-7775 β thehackernews.com β 26.08.2025 20:29
- Citrix Gear Under Active Attack Again With Another Zero-Day β www.darkreading.com β 26.08.2025 23:04
- Threat Actors Weaponize HexStrike AI to Exploit Citrix Flaws Within a Week of Disclosure β thehackernews.com β 03.09.2025 15:20
-
CVE-2025-7776 requires NetScaler to be configured as Gateway with PCoIP Profile bounded to it.
First reported: 26.08.2025 20:29π° 1 source, 1 articleShow sources
- Citrix Patches Three NetScaler Flaws, Confirms Active Exploitation of CVE-2025-7775 β thehackernews.com β 26.08.2025 20:29
-
CVE-2025-8424 requires access to NSIP, Cluster Management IP, local GSLB Site IP, or SNIP with Management Access.
First reported: 26.08.2025 20:29π° 1 source, 1 articleShow sources
- Citrix Patches Three NetScaler Flaws, Confirms Active Exploitation of CVE-2025-7775 β thehackernews.com β 26.08.2025 20:29
-
The vulnerabilities have been resolved in specific versions of NetScaler ADC and NetScaler Gateway, with no available workarounds.
First reported: 26.08.2025 20:29π° 1 source, 1 articleShow sources
- Citrix Patches Three NetScaler Flaws, Confirms Active Exploitation of CVE-2025-7775 β thehackernews.com β 26.08.2025 20:29
-
Citrix credited Jimi Sebree of Horizon3.ai, Jonathan Hetzer of Schramm & Partner, and FranΓ§ois HΓ€mmerli for discovering and reporting the vulnerabilities.
First reported: 26.08.2025 20:29π° 2 sources, 2 articlesShow sources
- Citrix Patches Three NetScaler Flaws, Confirms Active Exploitation of CVE-2025-7775 β thehackernews.com β 26.08.2025 20:29
- Citrix Gear Under Active Attack Again With Another Zero-Day β www.darkreading.com β 26.08.2025 23:04
-
CISA added CVE-2025-7775 to its KEV catalog, requiring federal agencies to remediate within 48 hours.
First reported: 26.08.2025 20:29π° 1 source, 1 articleShow sources
- Citrix Patches Three NetScaler Flaws, Confirms Active Exploitation of CVE-2025-7775 β thehackernews.com β 26.08.2025 20:29
-
CVE-2025-7775 affects NetScaler ADC and NetScaler Gateway versions 12.1, 13.1, and 14.1.
First reported: 26.08.2025 23:04π° 1 source, 1 articleShow sources
- Citrix Gear Under Active Attack Again With Another Zero-Day β www.darkreading.com β 26.08.2025 23:04
-
CVE-2025-7775 can be exploited on NetScaler devices configured for VPN, remote access, IPv6 web traffic, or specific content routing tasks.
First reported: 26.08.2025 23:04π° 2 sources, 2 articlesShow sources
- Citrix Gear Under Active Attack Again With Another Zero-Day β www.darkreading.com β 26.08.2025 23:04
- Threat Actors Weaponize HexStrike AI to Exploit Citrix Flaws Within a Week of Disclosure β thehackernews.com β 03.09.2025 15:20
-
Nearly 20% of NetScaler assets identified are on unsupported, end-of-life versions, with a significant concentration in North America and the APAC region.
First reported: 26.08.2025 23:04π° 1 source, 1 articleShow sources
- Citrix Gear Under Active Attack Again With Another Zero-Day β www.darkreading.com β 26.08.2025 23:04
-
CISA lists 10 NetScaler flaws in its KEV catalog, with six discovered in the last two years.
First reported: 26.08.2025 23:04π° 1 source, 1 articleShow sources
- Citrix Gear Under Active Attack Again With Another Zero-Day β www.darkreading.com β 26.08.2025 23:04
-
HexStrike AI, an AI-driven security platform, is being weaponized by threat actors to exploit Citrix vulnerabilities.
First reported: 03.09.2025 15:20π° 2 sources, 2 articlesShow sources
- Threat Actors Weaponize HexStrike AI to Exploit Citrix Flaws Within a Week of Disclosure β thehackernews.com β 03.09.2025 15:20
- Hackers use new HexStrike-AI tool to rapidly exploit n-day flaws β www.bleepingcomputer.com β 03.09.2025 21:03
-
HexStrike AI integrates with over 150 security tools for network reconnaissance, web application security testing, reverse engineering, and cloud security.
First reported: 03.09.2025 15:20π° 2 sources, 2 articlesShow sources
- Threat Actors Weaponize HexStrike AI to Exploit Citrix Flaws Within a Week of Disclosure β thehackernews.com β 03.09.2025 15:20
- Hackers use new HexStrike-AI tool to rapidly exploit n-day flaws β www.bleepingcomputer.com β 03.09.2025 21:03
-
Threat actors have successfully exploited the three Citrix vulnerabilities using HexStrike AI and are offering vulnerable NetScaler instances for sale on darknet forums.
First reported: 03.09.2025 15:20π° 2 sources, 2 articlesShow sources
- Threat Actors Weaponize HexStrike AI to Exploit Citrix Flaws Within a Week of Disclosure β thehackernews.com β 03.09.2025 15:20
- Hackers use new HexStrike-AI tool to rapidly exploit n-day flaws β www.bleepingcomputer.com β 03.09.2025 21:03
-
The use of HexStrike AI reduces the time between public disclosure and mass exploitation, automating and parallelizing exploitation efforts.
First reported: 03.09.2025 15:20π° 2 sources, 2 articlesShow sources
- Threat Actors Weaponize HexStrike AI to Exploit Citrix Flaws Within a Week of Disclosure β thehackernews.com β 03.09.2025 15:20
- Hackers use new HexStrike-AI tool to rapidly exploit n-day flaws β www.bleepingcomputer.com β 03.09.2025 21:03
-
AI-powered cybersecurity agents like HexStrike AI and PentestGPT carry heightened prompt injection risks, potentially turning security tools into attack vectors.
First reported: 03.09.2025 15:20π° 1 source, 1 articleShow sources
- Threat Actors Weaponize HexStrike AI to Exploit Citrix Flaws Within a Week of Disclosure β thehackernews.com β 03.09.2025 15:20
-
HexStrike-AI was created by cybersecurity researcher Muhammad Osama.
First reported: 03.09.2025 21:03π° 1 source, 1 articleShow sources
- Hackers use new HexStrike-AI tool to rapidly exploit n-day flaws β www.bleepingcomputer.com β 03.09.2025 21:03
-
HexStrike-AI integrates with over 150 cybersecurity tools for automated penetration testing and vulnerability discovery.
First reported: 03.09.2025 21:03π° 1 source, 1 articleShow sources
- Hackers use new HexStrike-AI tool to rapidly exploit n-day flaws β www.bleepingcomputer.com β 03.09.2025 21:03
-
HexStrike-AI features a retry logic and recovery handling to mitigate the effects of failures in any individual step on its complex operations.
First reported: 03.09.2025 21:03π° 1 source, 1 articleShow sources
- Hackers use new HexStrike-AI tool to rapidly exploit n-day flaws β www.bleepingcomputer.com β 03.09.2025 21:03
-
HexStrike-AI has been open-source and available on GitHub for the last month, where it has already garnered 1,800 stars and over 400 forks.
First reported: 03.09.2025 21:03π° 1 source, 1 articleShow sources
- Hackers use new HexStrike-AI tool to rapidly exploit n-day flaws β www.bleepingcomputer.com β 03.09.2025 21:03
-
HexStrike-AI has been discussed on hacking forums for deploying to exploit the mentioned Citrix NetScaler ADC and Gateway zero-day vulnerabilities within hours of their disclosure.
First reported: 03.09.2025 21:03π° 1 source, 1 articleShow sources
- Hackers use new HexStrike-AI tool to rapidly exploit n-day flaws β www.bleepingcomputer.com β 03.09.2025 21:03
-
Threat actors used HexStrike-AI to achieve unauthenticated remote code execution through CVE-2025-7775 and then drop webshells on compromised appliances.
First reported: 03.09.2025 21:03π° 1 source, 1 articleShow sources
- Hackers use new HexStrike-AI tool to rapidly exploit n-day flaws β www.bleepingcomputer.com β 03.09.2025 21:03
-
Some threat actors are offering compromised NetScaler instances for sale.
First reported: 03.09.2025 21:03π° 1 source, 1 articleShow sources
- Hackers use new HexStrike-AI tool to rapidly exploit n-day flaws β www.bleepingcomputer.com β 03.09.2025 21:03
-
CheckPoint believes attackers used HexStrike-AI to automate their exploitation chain, scanning for vulnerable instances, crafting exploits, delivering payloads, and maintaining persistence.
First reported: 03.09.2025 21:03π° 1 source, 1 articleShow sources
- Hackers use new HexStrike-AI tool to rapidly exploit n-day flaws β www.bleepingcomputer.com β 03.09.2025 21:03
-
The actual involvement of HexStrike-AI in these attacks hasn't been confirmed, but such a level of automation could reduce the n-day flaw exploitation times from several days down to a few minutes.
First reported: 03.09.2025 21:03π° 1 source, 1 articleShow sources
- Hackers use new HexStrike-AI tool to rapidly exploit n-day flaws β www.bleepingcomputer.com β 03.09.2025 21:03
-
HexStrike-AI operates with human-in-the-loop interaction through external LLMs via MCP, creating a continuous cycle of prompts, analysis, execution, and feedback.
First reported: 03.09.2025 21:03π° 1 source, 1 articleShow sources
- Hackers use new HexStrike-AI tool to rapidly exploit n-day flaws β www.bleepingcomputer.com β 03.09.2025 21:03
-
Nearly 8,000 endpoints remain vulnerable to CVE-2025-7775 as of September 2, 2025, down from 28,000 the previous week.
First reported: 03.09.2025 21:03π° 1 source, 1 articleShow sources
- Hackers use new HexStrike-AI tool to rapidly exploit n-day flaws β www.bleepingcomputer.com β 03.09.2025 21:03
Similar Happenings
Active exploitation of CVE-2025-5086 in DELMIA Apriso
CVE-2025-5086, a critical deserialization flaw in Dassault Systèmes DELMIA Apriso Manufacturing Operations Management (MOM) software, is being actively exploited. The vulnerability, with a CVSS score of 9.0, affects versions from Release 2020 through Release 2025. Exploitation attempts have been observed, targeting the /apriso/WebServices/FlexNetOperationsService.svc/Invoke endpoint with a Base64-encoded payload. The payload decodes to a GZIP-compressed Windows executable that deploys a malicious program designed to spy on user activities. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added the flaw to its Known Exploited Vulnerabilities (KEV) catalog, advising Federal Civilian Executive Branch (FCEB) agencies to apply updates by October 2, 2025. The malware, identified as Trojan.MSIL.Zapchast.gen, captures keyboard input, takes screenshots, and gathers information about active applications. This information is then sent to the attacker via various means, including email, FTP, and HTTP. The exploit involves sending a malicious SOAP request to vulnerable endpoints. The malicious requests were observed originating from the IP 156.244.33[.]162.
Akira Ransomware Group Exploits SonicWall SSL VPN Flaws
The Akira ransomware group has been actively exploiting SonicWall SSL VPN flaws and misconfigurations to gain initial access to networks. This campaign has seen increased activity since late July 2025, targeting SonicWall devices to facilitate ransomware operations. The group leverages a combination of security vulnerabilities, including a year-old flaw (CVE-2024-40766) and misconfigured LDAP settings, to bypass access controls and infiltrate networks. Organizations are advised to rotate passwords, remove unused accounts, enable multi-factor authentication, and restrict access to the Virtual Office Portal to mitigate risks. The Australian Cyber Security Centre (ACSC) has acknowledged Akira's targeting of SonicWall SSL VPNs and issued alerts about the increased exploitation of CVE-2024-40766.
Microsoft September 2025 Patch Tuesday fixes 81 vulnerabilities, including two zero-days
Microsoft released updates for 80 vulnerabilities on September 2025 Patch Tuesday. None of these vulnerabilities were zero-days. The updates address eight critical flaws, including five remote code execution vulnerabilities, one information disclosure, and two elevation of privilege vulnerabilities. The vulnerabilities span various categories: 38 elevation of privilege, 2 security feature bypass, 22 remote code execution, 14 information disclosure, 3 denial of service, and 1 spoofing. One zero-day vulnerability was fixed in Windows SMB Server. The updates also include hardening features for SMB Server to mitigate relay attacks, with recommendations for administrators to enable auditing. The patch includes 38 elevation of privilege vulnerabilities, the highest number among all categories. CVE-2025-54918 is an EoP vulnerability in Windows NT LAN Manager (NTLM) marked as critical. CVE-2025-54111 and CVE-2025-54913 are EoP flaws in Windows UI XAML, allowing privilege escalation via phished credentials or malicious Microsoft Store apps. CVE-2025-55232 is an RCE vulnerability in the Microsoft High Performance Compute (HPC) Pack with a CVSS score of 9.8. CVE-2025-54916 is an RCE vulnerability in Windows NTFS that can be triggered by authenticated users. Microsoft's patch update includes recommendations for preparing for the end-of-life of Windows 10 and mandatory multifactor authentication (MFA) for Azure in October 2025.
Critical SessionReaper flaw in Adobe Commerce and Magento Open Source patched
Adobe has patched a critical vulnerability (CVE-2025-54236) in its Commerce and Magento Open Source platforms, dubbed SessionReaper. The flaw could allow unauthenticated attackers to take control of customer accounts via the Commerce REST API. The vulnerability was disclosed to selected customers on September 4, 2025, with a patch released on September 9, 2025. Adobe Commerce on Cloud users were protected by a WAF rule until the patch was available. The flaw is considered one of the most severe in the history of the platform, potentially leading to session forging, privilege escalation, and code execution. No exploitation in the wild has been reported, but a hotfix was leaked, which could accelerate exploitation attempts. The vulnerability impacts various versions of Adobe Commerce, Adobe Commerce B2B, Magento Open Source, and the Custom Attributes Serializable module. Adobe has also patched a critical path traversal vulnerability in ColdFusion (CVE-2025-54261).
Critical SAP NetWeaver vulnerabilities patched, including remote code execution flaw
SAP has fixed 21 vulnerabilities, including three critical flaws in its NetWeaver software. The most severe, CVE-2025-42944, is an insecure deserialization flaw allowing unauthenticated remote code execution. The second critical flaw, CVE-2025-42922, enables arbitrary file uploads by authenticated users. The third, CVE-2025-42958, allows unauthorized access to sensitive data and administrative functions. The vulnerabilities affect various SAP products, including ERP, CRM, SRM, and SCM, which are widely used in large enterprise networks. The flaws could lead to full system compromise and unauthorized data manipulation. SAP products are frequently targeted by threat actors due to their handling of mission-critical data. A high-severity missing input validation bug in SAP S/4HANA (CVE-2025-42916) could allow an attacker with high privilege access to delete the content of arbitrary database tables. A critical security defect in SAP S/4HANA (CVE-2025-42957) has come under active exploitation in the wild.