CVE-2025-7776

Citrix NetScaler Memory Corruption Vulnerability

Citrix NetScaler contains a memory corruption vulnerability that can cause the device and downstream applications to crash via the /broker/xml endpoint.

Horizon3.ai’s Attack Team discovered this vulnerability, and while real-world exploitation could allow an unauthenticated attacker to cause a denial of service to the NetScaler appliance and any downstream applications, NodeZero Rapid Response tests are safe for production. Our tests affirm exposure to this risk without crashing the service, delivering proof of impact without disruption.

Mitigations

  • Update to the relevant Citrix NetScaler version as per the vendor advisory.

References

🔗 Citrix Security Bulletin (CTX694938) 

🔗 NVD: CVE-2025-7776 

Rapid Response Test

Netscaler Attack Path
NodeZero Rapid Response Timeline UI
NodeZero Rapid Response UI

Read about other CVEs

CVE-2024-23108

Fortinet FortiSIEM 2nd Order Command Injection

Read More

CVE-2023-43208

NextGen Mirth Connect Pre-Auth RCE

Read More

CVE-2023-34992

Fortinet FortiSIEM Command Injection

Read More

NodeZero® Platform

Implement a continuous find, fix, and verify loop with NodeZero

The NodeZero® platform empowers your organization to reduce your security risks by autonomously finding exploitable weaknesses in your network, giving you detailed guidance around how to priortize and fix them, and having you immediately verify that your fixes are effective.
Explore NodeZero

Recognized By