CERTFR-2025-ALE-012
Vulnerability from certfr_alerte

Le 26 août 2025, Citrix a publié un bulletin de sécurité (cf. section Documentation) concernant, entre autres, la vulnérabilité CVE-2025-7775.

Celle-ci permet une exécution de code arbitraire à distance et affecte toutes les versions de Citrix NetScaler ADC et NetScaler Gateway, dans certaines configurations détaillées par l'éditeur.

Citrix indique que la vulnérabilité CVE-2025-7775 est activement exploitée.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Le CERT-FR recommande l'application des correctifs dans les plus brefs délais.

Citrix rappelle que les versions 12.1 and 13.0 de NetScaler ADC et NetScaler Gateway sont obsolètes et ne recevront plus de mises à jour de sécurité. L'éditeur recommande de migrer vers une version maintenue et à jour.

Impacted products
Vendor Product Description
Citrix NetScaler Gateway NetScaler Gateway versions antérieures à 13.1-59.22
Citrix NetScaler ADC NetScaler ADC versions antérieures à 14.1-47.48
Citrix NetScaler ADC NetScaler ADC versions antérieures à 13.1-59.22
Citrix NetScaler ADC NetScaler ADC 12.1-FIPS et 12.1-NDcPP versions antérieures à 12.1-55.330
Citrix NetScaler Gateway NetScaler Gateway versions antérieures à 14.1-47.48
Citrix NetScaler ADC NetScaler ADC 13.1-FIPS et 13.1-NDcPP versions antérieures à 13.1-37.241

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "NetScaler Gateway versions ant\u00e9rieures \u00e0 13.1-59.22",
      "product": {
        "name": "NetScaler Gateway",
        "vendor": {
          "name": "Citrix",
          "scada": false
        }
      }
    },
    {
      "description": "NetScaler ADC versions ant\u00e9rieures \u00e0 14.1-47.48",
      "product": {
        "name": "NetScaler ADC",
        "vendor": {
          "name": "Citrix",
          "scada": false
        }
      }
    },
    {
      "description": "NetScaler ADC versions ant\u00e9rieures \u00e0 13.1-59.22",
      "product": {
        "name": "NetScaler ADC",
        "vendor": {
          "name": "Citrix",
          "scada": false
        }
      }
    },
    {
      "description": "NetScaler ADC 12.1-FIPS et 12.1-NDcPP versions ant\u00e9rieures \u00e0 12.1-55.330",
      "product": {
        "name": "NetScaler ADC",
        "vendor": {
          "name": "Citrix",
          "scada": false
        }
      }
    },
    {
      "description": "NetScaler Gateway versions ant\u00e9rieures \u00e0 14.1-47.48",
      "product": {
        "name": "NetScaler Gateway",
        "vendor": {
          "name": "Citrix",
          "scada": false
        }
      }
    },
    {
      "description": "NetScaler ADC 13.1-FIPS et 13.1-NDcPP versions ant\u00e9rieures \u00e0 13.1-37.241",
      "product": {
        "name": "NetScaler ADC",
        "vendor": {
          "name": "Citrix",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "Citrix rappelle que les versions 12.1 and 13.0 de NetScaler ADC et NetScaler Gateway sont obsol\u00e8tes et ne recevront plus de mises \u00e0 jour de s\u00e9curit\u00e9. L\u0027\u00e9diteur recommande de migrer vers une version maintenue et \u00e0 jour.",
  "closed_at": "2025-09-26",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).\n\nLe CERT-FR recommande l\u0027application des correctifs dans les plus brefs d\u00e9lais.",
  "cves": [
    {
      "name": "CVE-2025-7775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-7775"
    }
  ],
  "initial_release_date": "2025-08-26T00:00:00",
  "last_revision_date": "2025-09-26T00:00:00",
  "links": [
    {
      "title": "Avis CERT-FR CERTFR-2025-AVI-0730 du 26 ao\u00fbt 2025 ",
      "url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0730/"
    },
    {
      "title": "Compromission d\u0027un \u00e9quipement de bordure r\u00e9seau - Endiguement",
      "url": "https://www.cert.ssi.gouv.fr/fiche/CERTFR-2025-RFX-002/"
    },
    {
      "title": "Recommendations de Citrix en cas de soup\u00e7ons de compromission",
      "url": "https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694799"
    },
    {
      "title": "Compromission d\u0027un \u00e9quipement de bordure r\u00e9seau - Qualification",
      "url": "https://www.cert.ssi.gouv.fr/fiche/CERTFR-2025-RFX-001/"
    }
  ],
  "reference": "CERTFR-2025-ALE-012",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-08-26T00:00:00.000000"
    },
    {
      "description": "     Cl\u00f4ture de l\u0027alerte. Cela ne signifie pas la fin d\u0027une menace. Seule l\u0027application de la mise \u00e0 jour permet de vous pr\u00e9munir contre l\u0027exploitation de la vuln\u00e9rabilit\u00e9 correspondante.",
      "revision_date": "2025-09-26T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    }
  ],
  "summary": "Le 26 ao\u00fbt 2025, Citrix a publi\u00e9 un bulletin de s\u00e9curit\u00e9 (cf. section Documentation) concernant, entre autres, la vuln\u00e9rabilit\u00e9 CVE-2025-7775.\n\nCelle-ci permet une ex\u00e9cution de code arbitraire \u00e0 distance et affecte toutes les versions de Citrix NetScaler ADC et NetScaler Gateway, dans certaines configurations d\u00e9taill\u00e9es par l\u0027\u00e9diteur.\n\nCitrix indique que la vuln\u00e9rabilit\u00e9 CVE-2025-7775 est activement exploit\u00e9e.\n\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans Citrix NetScaler ADC et NetScaler Gateway",
  "vendor_advisories": [
    {
      "published_at": "2025-08-26",
      "title": "Bulletin de s\u00e9curit\u00e9 Citrix CTX694938",
      "url": "https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694938"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…