Critical Vulnerability Reported in Citrix NetScaler ADC and Gateway (CVE-2025-12101)
Executive Summary
On November 11th, Citrix published an advisory detailing a critical vulnerability in their NetScaler ADC and NetScaler Gateway lines of products. This bug (tracking as CVE-2025-12101) is a cross-site scripting (XSS) vulnerability on NetScaler ADC or NetScaler Gateway devices when the appliance is configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server. These devices are typically deployed as internet facing by design, so this vulnerability can be used by threat actors to gain initial access to an organization’s internal network.
There are no public technical details of the vulnerability or public proof-of-concept (PoC) exploits available at time of writing. Beazley Security recommends affected organizations should upgrade impacted devices as soon as possible.
Affected Systems and Products
NetScaler ADC and NetScaler Gateway versions 12.1 and 13.0 are now end of life and no longer supported. Customers that are on those versions are recommended to upgrade their appliances to one of the supported versions that address the vulnerabilities.
Mitigations and Workarounds
Citrix has indicated there are no effective mitigations or workarounds for this vulnerability. Organizations should update impacted NetScaler ADC and NetScaler Gateways to the latest patched versions.
If patches cannot be immediately applied, network access to the appliances should be restricted to trusted networks only.
Patches
Citrix has released advisory CTX695486 to track versioning and patching information for this issue. Citrix NetScaler released patches to mitigate this issue and other technical support can be found by logging into the Citrix Support Center.
Technical Details
Details on the vulnerability have not been provided, but Citrix has provided guidance on how to determine if an organization has a vulnerable configuration on their device:
- An Auth Server (AAA Vserver):
add authentication vserver .*
- A Gateway (VPN Vserver, ICA Proxy, CVPN, RDP Proxy):
add vpn vserver .*
How Beazley Security is Responding
Beazley Security is monitoring client perimeter devices through our Exposure Management Platform to identify impacted devices and support organizations in remediation of any issues found.
We are also conducting threat hunts across our MDR environment to detect potential exploitation attempts against our clients.
If you believe your organization may have been impacted by this attack campaign and need support, please contact our Incident Response team.
Sources
Aware of an incident impacting your industry? Let us know:
