In cybersecurity, zero-days are among the most feared threats. These are flaws discovered before any patch is available—and attackers waste no time in taking advantage. That’s exactly what’s happening with NetScaler, a company behind widely used remote access and application delivery solutions.
At TecnetOne, we explain what's going on, why it matters, and the urgent actions you need to take.
On August 27, 2025, NetScaler issued an urgent security advisory: threat actors are actively exploiting a critical vulnerability in its devices. Registered as CVE-2025-7775, the flaw received a CVSS score of 9.2, placing it in the highest severity category.
The issue stems from a memory overflow that—under specific conditions—could lead to:
NetScaler immediately urged all customers to apply available patches.
The concern isn’t just the flaw itself—it’s already being exploited. Researchers from Horizon3.ai have confirmed attackers are using this vulnerability to plant backdoors in compromised systems. These backdoors may persist even after patching, meaning damage can continue unnoticed.
This drastically shortens the "exposure window"—the time between disclosure and mass exploitation.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has already added CVE-2025-7775 to its Known Exploited Vulnerabilities catalog, confirming the high risk.
Similar titles: Apple Fixes Zero-Day Vulnerability in WebKit
A scan by the Shadowserver Foundation revealed over 28,000 NetScaler instances exposed on the internet—many of them in the U.S. and Germany.
While not all have shown signs of active exploitation yet, the threat is real. If you haven’t patched, you’re vulnerable.
The exploit isn’t universal—it only works on devices configured as:
This echoes past vulnerabilities like CitrixBleed, where specific setups were required. But if your system meets the conditions, you're exposed.
CVE-2025-7775 wasn’t alone. NetScaler’s August update also addressed:
Together, these show why NetScaler admins must act immediately.
A growing concern in 2025 is the rise of offensive AI. Tools like HexStrike AI are enabling attackers to automate vulnerability discovery and exploitation in mere days.
This means even newly disclosed flaws can be weaponized by non-expert criminals using AI-powered toolkits.
Also of interest: New Zero-Day Vulnerability in WinRAR CVE-2025-8088
If you use NetScaler products, here are your immediate actions:
This case reinforces essential truths:
The NetScaler incident is a reminder that in cybersecurity, complacency is dangerous. A single misconfiguration, a delayed patch, or missed alerts can open the door to catastrophic breaches.
At TecnetOne, we emphasize rapid response and proactive defense. Keep systems updated, tighten your security posture, and have a clear incident response strategy ready to go.