The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added multiple Citrix NetScaler vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog—an urgent signal for federal agencies and private enterprises alike. At the center of this update is CVE-2025-6543, a memory overflow flaw affecting NetScaler ADC and Gateway appliances, which could lead to Denial of Service attacks under specific configurations. This joins earlier additions from 2023, including CVE-2023-6548 and CVE-2023-6549, covering code injection and buffer overflow vulnerabilities.
In this episode, we explore why NetScaler vulnerabilities are drawing heightened attention, how they are actively being exploited, and what organizations must do to stay ahead of increasingly sophisticated cyber threats. But the scope of this episode goes far beyond Citrix. We delve into the latest intelligence on:
Key insights from the episode:
The episode also covers TWCERT/CC’s alerts on actively exploited vulnerabilities in ASUS routers, Acer software, Zyxel devices, and SAP systems—underscoring the truly global and cross-sector nature of the threat landscape.
This episode is essential listening for security architects, IT managers, CISOs, and vulnerability management teams trying to cut through the noise and act on what truly matters. With mandated remediation deadlines (like July 21, 2025, for CVE-2025-6543) now baked into CISA advisories, the time to act is now.
En liten tjänst av I'm With Friends. Finns även på engelska.