Dutch NCSC Warns of Active Exploitation of Citrix NetScaler Vulnerability in Key Industries

Published:

spot_img

Aug 12, 2025Ravie Lakshmanan
Vulnerability / Threat Intelligence

Critical Security Vulnerability in Citrix NetScaler ADC Unveiled

The Dutch National Cyber Security Centre (NCSC-NL) has raised alarms about potential cyber attacks leveraging a newly discovered security vulnerability in Citrix NetScaler ADC products. This critical flaw poses significant risks to various organizations operating within the Netherlands. As the situation unfolds, investigations are ongoing to gauge the full extent of the issue.

Understanding CVE-2025-6543

The vulnerability, designated as CVE-2025-6543, has garnered a high CVSS score of 9.2, indicating its severity. It affects NetScaler ADC devices when configured as a Gateway (including VPN virtual servers, ICA Proxy, CVPN, RDP Proxy) or as an AAA virtual server. The flaw can lead to unintended control flow and potential denial-of-service (DoS) issues, raising immediate concerns for enterprises relying on these systems.

Patching and Security Updates

First identified in late June 2025, this vulnerability has already prompted Citrix to issue patches for various versions of its software. Organizations using the following versions should ensure they update promptly:

  • NetScaler ADC and NetScaler Gateway 14.1 prior to 14.1-47.46
  • NetScaler ADC and NetScaler Gateway 13.1 prior to 13.1-59.19
  • NetScaler ADC 13.1-FIPS and NDcPP prior to 13.1-37.236-FIPS and NDcPP

As of June 30, 2025, CVE-2025-6543 has been added to the U.S. Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities (KEV) catalog, highlighting its urgent status. Another related vulnerability, CVE-2025-5777, also received attention recently, with a CVSS score of 9.3.

Indicators of Compromise

The NCSC-NL has indicated that the exploitation of CVE-2025-6543 appears to be the work of a skilled threat actor. Disturbingly, this vulnerability has reportedly been exploited as a zero-day since early May 2025—almost two months before its public disclosure. Attackers have taken significant steps to erase their tracks, complicating investigations into any compromises.

During ongoing investigations, NCSC-NL uncovered malicious web shells on affected Citrix devices. A web shell is a type of rogue code that allows an attacker to gain unauthorized remote access to the system, often by exploiting vulnerabilities like the one in question.

Mitigation Strategies for Organizations

To mitigate the risks associated with CVE-2025-6543, the NCSC-NL recommends that organizations implement the latest updates and immediately terminate any permanent or active connections by executing the following commands:

  • kill icaconnection -all
  • kill pcoipConnection -all
  • kill aaa session -all
  • kill rdp connection -all
  • clear lb persistentSessions

Additionally, organizations can utilize a shell script provided by NCSC-NL to search for indicators of compromise linked to this vulnerability.

Key Signs of Potential Exploitation

NCSC-NL urges organizations to be vigilant for files with unusual .php extensions within the Citrix NetScaler system folders, as these may suggest malicious activity. Monitoring for newly created accounts—particularly those with escalated privileges—can also serve as a critical measure in identifying potential breaches.

spot_img

Related articles

Recent articles

Layoffs Ignite Dark Web Demand for Tech Talent

Overall, in 2025, resumes outnumber vacancies 55 per cent to 45 per cent, driven by global layoffs and an influx of younger candidates. |...

UAE Announces Significant Tax Rule Changes Effective January 1, 2026

Updates to UAE Tax Procedures Framework The United Arab Emirates has announced notable changes in its tax procedures with the introduction of Federal Decree-Law No....

French Football Federation Reveals Data Breach Following Administrative Software Compromise

Stolen Credentials Lead to Major Data Breach in French Football The French Football Federation (FFF) has recently confirmed a significant cyber breach affecting club memberships...

Legacy Python Bootstrap Scripts Expose Domain Takeover Risks in Several PyPI Packages

Vulnerabilities Found in Python Packages: A Growing Threat Discovery of Legacy Vulnerabilities Recent investigations by cybersecurity experts at ReversingLabs have revealed significant vulnerabilities within older Python...