- Netscaler Adc and Netscaler Gateway 14.1-47.48 and later released
- Netscaler Adc and Netscaler Gateway 13.1-59.22 and later 13.1 release
- Netscaler Adc 13.1-FIPS and 13.1-NDCPP 13.1-37.241 and later 13.1-FIPS and 13.1-NDCPP
- Netscaler Adc 12.1-Fips and 12.1-NDCPPPP 12.1-55.330 and later 12.1-FIPS and 12.1-NDCPP
Citrichus bleeding
As the Netscaler customers will already be painful aware, these are not the first serious weaknesses to affect the company’s Netscaler ADC and Netscaler Gateway devices during 2025.
In June, the company patted the CVE-2025-5349 and CVE-2025-5777, later to give sufficiently a surname for a defect researcher Beomon in Netsclary ADC and Gateway devices, “Citrix Bleed 2”. US Cyber Security and Infrastructure Security Agency (CISA) later added it Its database Of faults known under active exploitation. (Original ‘Citrix bleed’ defect, Cve ‘2023‑4966Netscaler ADC and Netscaler Gateway affected in 2023.)
Meanwhile, it was revealed that after that another defect, CVE-2025–6543, could also be subject to active exploitation. it Was confirmed In August, the Dutch National Cyber Security Center (NCSC-NL) reported that CVE-2025-6543 was used to target organizations in the country from at least May.