28,000+ Citrix Servers Still Unpatched: CVE‑2025‑7775 Exploit Active Since Aug 26

Shadowserver finds 28,200+ Citrix NetScaler still vulnerable to CVE‑2025‑7775. Exploits active since Aug 26; CISA KEV due today.

 

A futuristic cyber perimeter map showing glowing target markers over the USA and Germany, with a badge indicating "28,200 Unpatched


Breaking News Summary

  • Shadowserver scans show over 28,200 internet‑exposed Citrix NetScaler ADC/Gateway instances still vulnerable to CVE‑2025‑7775, with exploitation active since Aug 26. Geographic hotspots include the U.S. and Germany, indicating widespread lag in emergency patching.heise+1

  • CISA added CVE‑2025‑7775 to the KEV catalog and set a remediation deadline of today, Aug 28, for U.S. federal agencies, underscoring the urgent risk profile of this edge‑device RCE.securityaffairs

Global Exposure Snapshot

  • Shadowserver‑reported vulnerable instances: 28,200+ as of Aug 26.bleepingcomputer+1

  • Noted concentrations: United States (>10,000) and Germany (>4,300); additional exposure in UK, Netherlands, Switzerland per media summaries of Shadowserver’s feeds.securityaffairs+1

Technical Details

  • CVE‑2025‑7775: Memory overflow enabling unauthenticated RCE/DoS on NetScaler ADC/Gateway; exploitation observed in the wild.nvd.nist+1

  • Exploitable configurations: NetScaler configured as Gateway/AAA; or LB vServers (HTTP/SSL/HTTP_QUIC) bound to IPv6 services/DBS IPv6; or CR vServer type HDX.thehackernews

  • Affected versions prior to fixed builds: 14.1 < 14.1‑47.48; 13.1 < 13.1‑59.22; 13.1‑FIPS/NDcPP < 13.1‑37.241; 12.1‑FIPS/NDcPP ≤ 12.1‑55.330.tenable+1

Immediate Actions

  • Patch now: Upgrade to 14.1‑47.48+, 13.1‑59.22+, or corresponding FIPS/NDcPP builds; no official workarounds are provided.thehackernews+1

  • Reduce exposure: If patching is delayed, remove/limit IPv6 LB bindings, geofence Gateway/AAA, and strictly block management plane from the internet.securityaffairs+1

SIEM Detection Rules (starter ideas)

  • Surge detection: Alert on off‑hours spikes in requests to Gateway/AAA and IPv6‑bound LB vServers; create separate baselines for IPv6 sources.heise+1

  • Error/crash correlation: Flag sudden NetScaler service restarts/core dumps alongside anomalous HTTP/QUIC request patterns from new ASNs.bleepingcomputer+1

  • Egress anomalies: Detect unusual outbound connections or data volume from NetScaler subnets to rare external IPs immediately after spikes in inbound probes.securityaffairs+1

Patch Verification Steps

  • Check build: After upgrade, verify build equals or exceeds 14.1‑47.48 or 13.1‑59.22 (or noted FIPS/NDcPP builds) in system information.tenable+1

  • Vendor console: Use NetScaler/Cloud Software Group console advisory module (CVE Detection > Impacted Instances) to confirm remediation state post‑scan.netscaler

  • Smoke tests: Validate Gateway/AAA auth, LB vServer health (IPv4/IPv6), and WAF policies; confirm no external exposure of NSIP/Cluster/GSLB/SNIP with management access.thehackernews

Emergency Mitigation (if not yet patched)

  • Restrict: Geofence AAA/Gateway to trusted IPs; rate‑limit auth endpoints; temporarily disable nonessential IPv6 LB vServers or unbind IPv6 services.heise+1

  • Shield: Apply upstream WAF anomaly rules for oversized headers/params and malformed QUIC/HTTP/2 frames while patching proceeds.thehackernews

  • Monitor: 24x7 watch for inbound scanning bursts and immediate egress; prepare incident response for rapid isolation if anomalies are detected.bleepingcomputer+1

FAQ

  • Is CVE‑2025‑7775 exploited now? Yes, active since Aug 26 per vendor and researchers.bleepingcomputer+1

  • What’s the federal deadline? CISA KEV due date is Aug 28, 2025, for U.S. agencies; private orgs should meet the same urgency.securityaffairs

  • Can mitigations replace patching? No official workarounds; patching is mandatory. Use mitigations only as temporary risk reduction.securityaffairs+1

  • How to confirm closure? Verify build numbers, run NetScaler console’s CVE scan, and re‑scan externally with Shadowserver‑style checks.netscaler+1

  • Rollback and continuity? Stage a tested rollback image, maintain HA pairs during upgrade, and schedule rolling maintenance with health probes to avoid downtime.thehackernews

more blog visit alfaiznova.com

Alfaiz Ansari is a digital strategist and researcher specializing in Cybersecurity, Artificial Intelligence, and Digital Marketing. As the mind behind Alfaiznova.com, he combines technical expertise …