CERTFR-2025-ALE-012

Vulnerability from certfr_alerte - Published: 2025-08-26 - Updated: 2025-09-26

Le 26 août 2025, Citrix a publié un bulletin de sécurité (cf. section Documentation) concernant, entre autres, la vulnérabilité CVE-2025-7775.

Celle-ci permet une exécution de code arbitraire à distance et affecte toutes les versions de Citrix NetScaler ADC et NetScaler Gateway, dans certaines configurations détaillées par l'éditeur.

Citrix indique que la vulnérabilité CVE-2025-7775 est activement exploitée.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Le CERT-FR recommande l'application des correctifs dans les plus brefs délais.

Citrix rappelle que les versions 12.1 and 13.0 de NetScaler ADC et NetScaler Gateway sont obsolètes et ne recevront plus de mises à jour de sécurité. L'éditeur recommande de migrer vers une version maintenue et à jour.

Impacted products
Vendor Product Description
Citrix NetScaler Gateway NetScaler Gateway versions antérieures à 13.1-59.22
Citrix NetScaler ADC NetScaler ADC versions antérieures à 14.1-47.48
Citrix NetScaler ADC NetScaler ADC versions antérieures à 13.1-59.22
Citrix NetScaler ADC NetScaler ADC 12.1-FIPS et 12.1-NDcPP versions antérieures à 12.1-55.330
Citrix NetScaler Gateway NetScaler Gateway versions antérieures à 14.1-47.48
Citrix NetScaler ADC NetScaler ADC 13.1-FIPS et 13.1-NDcPP versions antérieures à 13.1-37.241

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "NetScaler Gateway versions ant\u00e9rieures \u00e0 13.1-59.22",
      "product": {
        "name": "NetScaler Gateway",
        "vendor": {
          "name": "Citrix",
          "scada": false
        }
      }
    },
    {
      "description": "NetScaler ADC versions ant\u00e9rieures \u00e0 14.1-47.48",
      "product": {
        "name": "NetScaler ADC",
        "vendor": {
          "name": "Citrix",
          "scada": false
        }
      }
    },
    {
      "description": "NetScaler ADC versions ant\u00e9rieures \u00e0 13.1-59.22",
      "product": {
        "name": "NetScaler ADC",
        "vendor": {
          "name": "Citrix",
          "scada": false
        }
      }
    },
    {
      "description": "NetScaler ADC 12.1-FIPS et 12.1-NDcPP versions ant\u00e9rieures \u00e0 12.1-55.330",
      "product": {
        "name": "NetScaler ADC",
        "vendor": {
          "name": "Citrix",
          "scada": false
        }
      }
    },
    {
      "description": "NetScaler Gateway versions ant\u00e9rieures \u00e0 14.1-47.48",
      "product": {
        "name": "NetScaler Gateway",
        "vendor": {
          "name": "Citrix",
          "scada": false
        }
      }
    },
    {
      "description": "NetScaler ADC 13.1-FIPS et 13.1-NDcPP versions ant\u00e9rieures \u00e0 13.1-37.241",
      "product": {
        "name": "NetScaler ADC",
        "vendor": {
          "name": "Citrix",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "Citrix rappelle que les versions 12.1 and 13.0 de NetScaler ADC et NetScaler Gateway sont obsol\u00e8tes et ne recevront plus de mises \u00e0 jour de s\u00e9curit\u00e9. L\u0027\u00e9diteur recommande de migrer vers une version maintenue et \u00e0 jour.",
  "closed_at": "2025-09-26",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).\n\nLe CERT-FR recommande l\u0027application des correctifs dans les plus brefs d\u00e9lais.",
  "cves": [
    {
      "name": "CVE-2025-7775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-7775"
    }
  ],
  "initial_release_date": "2025-08-26T00:00:00",
  "last_revision_date": "2025-09-26T00:00:00",
  "links": [
    {
      "title": "Avis CERT-FR CERTFR-2025-AVI-0730 du 26 ao\u00fbt 2025 ",
      "url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0730/"
    },
    {
      "title": "Compromission d\u0027un \u00e9quipement de bordure r\u00e9seau - Endiguement",
      "url": "https://www.cert.ssi.gouv.fr/fiche/CERTFR-2025-RFX-002/"
    },
    {
      "title": "Recommendations de Citrix en cas de soup\u00e7ons de compromission",
      "url": "https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694799"
    },
    {
      "title": "Compromission d\u0027un \u00e9quipement de bordure r\u00e9seau - Qualification",
      "url": "https://www.cert.ssi.gouv.fr/fiche/CERTFR-2025-RFX-001/"
    }
  ],
  "reference": "CERTFR-2025-ALE-012",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-08-26T00:00:00.000000"
    },
    {
      "description": "     Cl\u00f4ture de l\u0027alerte. Cela ne signifie pas la fin d\u0027une menace. Seule l\u0027application de la mise \u00e0 jour permet de vous pr\u00e9munir contre l\u0027exploitation de la vuln\u00e9rabilit\u00e9 correspondante.",
      "revision_date": "2025-09-26T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    }
  ],
  "summary": "Le 26 ao\u00fbt 2025, Citrix a publi\u00e9 un bulletin de s\u00e9curit\u00e9 (cf. section Documentation) concernant, entre autres, la vuln\u00e9rabilit\u00e9 CVE-2025-7775.\n\nCelle-ci permet une ex\u00e9cution de code arbitraire \u00e0 distance et affecte toutes les versions de Citrix NetScaler ADC et NetScaler Gateway, dans certaines configurations d\u00e9taill\u00e9es par l\u0027\u00e9diteur.\n\nCitrix indique que la vuln\u00e9rabilit\u00e9 CVE-2025-7775 est activement exploit\u00e9e.\n\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans Citrix NetScaler ADC et NetScaler Gateway",
  "vendor_advisories": [
    {
      "published_at": "2025-08-26",
      "title": "Bulletin de s\u00e9curit\u00e9 Citrix CTX694938",
      "url": "https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694938"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…