
Redazione RHC : 12 November 2025 10:18
NetScaler and Citrix – On November 11, 2025, released security bulletin CTX695486 regarding the CVE-2025-12101 vulnerability, which affects the NetScaler ADC and NetScaler Gateway products. The vulnerability is rated ” Medium ” and affects specific configuration scenarios of systems used for remote access and authentication.
The identified issue is a Cross-Site Scripting (XSS) vulnerability, classified as CWE-79 , that occurs when the NetScaler appliance is configured as a ” Gateway ” (for example, VPN Virtual Server, ICA Proxy, CVPN or RDP Proxy) or as an AAA (Authentication, Authorisation, Accounting) virtual server.
Under these conditions, an attacker could inject malicious code into web pages generated by the device, compromising the security of user sessions or stealing sensitive information.
CVE-ID | Description | Preconditions | CWE | CVSSv4 |
| CVE-2025-12101 | Cross-Site Scripting (XSS) | NetScaler must be configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy)ORAAA virtual server | CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) | 5.9 (CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:L/VA:L/SC:L/SI:L/SA:L) |
The non-vulnerable versions, which fix the vulnerability are:
Additionally, releases 12.1 and 13.0 have already been declared “End of Life” (EOL) and are therefore vulnerable without further security updates. The company specified that on-premises or hybrid “Secure Private Access” deployments using NetScaler instances are also affected.
All customers are urgently advised to install the updated versions: 14.1-56.73 or later, 13.1-60.32 or later, 13.1-FIPS/NDcPP 13.1-37.250 or later, and 12.1-FIPS/NDcPP 12.1-55.333 or later. There are currently no known public exploits, but the nature of the attack—which directly targets authentication portals—makes it potentially dangerous, especially for organizations that expose these interfaces to the Internet.
To reduce risk, system administrators should check their appliance configurations for the strings “add vpn vserver . ” or “add authentication vserver . “ , which indicate the presence of Gateway or AAA services.
Critical infrastructure, government and financial sectors, which often use NetScaler for secure management of remote connections, are advised to apply the updates immediately to prevent possible XSS attacks and subsequent compromise of user sessions.
Redazione