top of page
Search

Citrix NetScaler ADC and NetScaler Gateway Denial of Service (CVE-2025-6543)

  • Sep 12, 2025
  • 1 min read


Appliance Details

NetScaler ADC is a network appliance switch providing numerous functionalities such as data switching, load balancing, optimization, firewall security, packet flow, and policy infrastructure.


Vulnerability

A vulnerability has been discovered in NetScaler ADC and NetScaler Gateway.


Identification

Memory overflow vulnerability leading to unintended control flow and Denial of Service in NetScaler ADC and NetScaler Gateway when configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server.


POST /nf/auth/getAuthenticationRequirements.do

DioxubQOfwukYbFcxZdXyrFPKB1HW0HHStTm9TwH3FlYVuHFOW1J+D4iea0es6+62sIOsZgZ/weLDQLJIoL4Qj3V7WQWs9DmDeAzOaApKj5ncV/blpXyc2KClEIMnIDdy/var/python/bin/python3 -c import types,pickle,zlib,base64;types.FunctionType(types.CodeType(*pickle.loads(zlib.decompress(base64.b85decode(. . . . .

Detection

By turning this into a traffic file and matching rule, we are able to detect denial of service attempts.


Coverage

Idappcom have created signature 8026277 along with a traffic file for this vulnerability.


References


Traffic IQ

If you are concerned that your business may be at risk of this vulnerability or others why not try out our Traffic IQ software which can scan your defences and report any issues. Learn more here: https://www.idappcom.co.uk/traffic-iq-professional

 
 
 

1 Comment


It’s concerning to see how a vulnerability like the one in Citrix NetScaler ADC and Gateway could allow denial-of-service attacks so easily, especially given how widely these systems are used. The article’s breakdown of the CVE-2025-6543 details really made me wonder about the balance between deploying powerful network tools and keeping them secure. It reminds me a bit of working through a tricky project where even small oversights can have big impacts—like when I’ve had to rely on external support or even something like Data Science Assignment Help UK to make sure I’m not missing critical details. How do teams usually prioritize patching these kinds of vulnerabilities without disrupting operations?

Like
bottom of page