XenServer Security Update for CVE-2024-36350 and CVE-2024-36357 – CTX694846

XenServer Security Update for CVE-2024-36350 and CVE-2024-36357 – CTX694846

Severity: Medium

Description of Problem

AMD has disclosed several security issues affecting AMD CPUs.  These CPU hardware issues may allow code in a guest VM to infer some active memory content of another VM that is running on the same host.  Although these are not vulnerabilities in the XenServer product itself, for the convenience of customers we are providing updates that contain updated AMD microcode and corresponding product code changes to mitigate these CPU hardware issues.

These issues have the following identifiers:

  • CVE-2024-36350
  • CVE-2024-36357

Affected Versions

These issues affect XenServer 8.4.

(Note that Citrix Hypervisor 8.2 CU1 is now End of Life (EoL) and so no longer receives security updates or security bulletins.)

Disclaimer

This document is provided on an «as is» basis and does not imply any kind of guarantee or warranty, including the warranties of merchantability or fitness for a particular use. Your use of the information on the document is at your own risk. Cloud Software Group reserves the right to change or update this document at any time. Customers are therefore recommended to always view the latest version of this document directly from the Citrix Knowledge Center.

Details

What Customers Should Do

We have pushed updates to both the Early Access and Normal update channels of XenServer 8.4. We recommend that customers update to the latest version from their chosen channel following the instructions at https://docs.xenserver.com/en-us/xenserver/8/update

Windows Virtual Delivery Agent for CVAD and Citrix DaaS Security Bulletin CVE-2025-6759

Windows Virtual Delivery Agent for CVAD and Citrix DaaS Security Bulletin CVE-2025-6759

Severity – High

Description of Problem

A vulnerability has been identified that impacts Virtual Delivery Agent for Windows used by Citrix Virtual Apps and Desktops and Citrix DaaS. 

Affected Versions: 

The vulnerability affects the following supported versions of Windows Virtual Delivery Agent for single-session OS: 

Current Release (CR)

  • Citrix Virtual Apps and Desktops versions before 2503 

Long Term Service Release (LTSR)

  • Citrix Virtual Apps and Desktops 2402 LTSR CU2 and earlier versions of 2402 LTSR

Note: Citrix Virtual Apps and Desktops 2203 LTSR is not affected by this vulnerability.

Disclaimer

The information on this page is being provided to you on an «AS IS» and «AS-AVAILABLE» basis. The issues described on this page may or may not impact your system(s). Cloud Software Group, Inc. and its subsidiaries (collectively, «Cloud SG») make no representations, warranties, or guarantees as to the information contained herein. ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, WITHOUT LIMITATION, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT AND FITNESS FOR A PARTICULAR PURPOSE ARE HEREBY DISCLAIMED. BY ACCESSING THIS PAGE, YOU ACKNOWLEDGE THAT CLOUD SG SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN. Cloud SG reserves the right to change or update the information on this page at any time. We accordingly recommend that you always view the latest version of this page. The information contained herein is being provided to you under the terms of your applicable customer agreement with Cloud SG, and may be used only for the purposes contemplated by such agreement. If you do not have such an agreement with Cloud SG, this information is provided under the cloud.com Terms of Use, and may be used only for the purposes contemplated by such Terms of Use.

Details

Virtual Delivery Agent for Windows used by Citrix Virtual Apps and Desktops and Citrix DaaS contains the vulnerability mentioned below:

CVE-ID Description Pre-conditionsCWECVSSv4
CVE-2025-6759Local Privilege escalation allows a low-privileged user to gain SYSTEM privilegesLocal access to the target systemCWE-269: Improper Privilege ManagementCVSS v4.0 Base Score: 6.9(CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)

What Customers Should Do

Citrix strongly recommends that customers upgrade their Windows Virtual Delivery Agent for single-session OS to versions that contain the fixes as soon as possible.  

Windows Virtual Delivery Agent versions that contain the fixes are: 

Current Release (CR)

  • Citrix Virtual Apps and Desktops 2503 and later versions 

The following Updates have been released to address the issues in Citrix Virtual Apps and Desktops 2402 LTSR CU1 and CU2.  Customers should ensure they have installed the corresponding cumulative update and then install any applicable updates: 

Long Term Service Release (LTSR)

Additional Information:

Citrix Virtual Apps and Desktops and Citrix DaaS customers may use Citrix provisioning services or Machine creation services technologies, if applicable, to update their non-persistent Virtual Delivery Agents to the Current Release (CR) Citrix Virtual Apps and Desktops 2503 or later.

Citrix DaaS customers may use VDA Upgrade Service (VUS) to update their Windows persistent Virtual Delivery Agents for Remote PC Access, HDX Plus for Windows 365, and any other persistent or provisioned and dedicated catalogs. Customers are recommended to review the VUS Prerequisites to determine if they can use the VDA Upgrade Service.

Workarounds/ Mitigating Factors

While applying the recommended hotfixes is the preferred solution, customers who are unable to upgrade immediately can apply the following registry change as a temporary workaround  on affected systems:

[HKEY_LOCAL_MACHINE\SOFTWARE\Citrix\CtxExceptionHandler]

«Enabled»=dword:00000000

Note: Customers may leverage Citrix Workspace Environment Management to deploy the above registry key. More details can be found here: https://docs.citrix.com/en-us/workspace-environment-management/current-release/user-interface-description/actions/group-policy-settings.html

Citrix Secure Access Client for Windows Security Bulletin for CVE-2025-0320

Citrix Secure Access Client for Windows Security Bulletin for CVE-2025-0320

Severity – High

Description of Problem

A vulnerability has been discovered in the Citrix Secure Access Client for Windows. Refer to below for further details: 

Affected Versions

The following supported versions of Citrix Secure Access Client for Windows are affected:

  • Citrix Secure Access Client for Windows versions BEFORE 25.5.1.15

Disclaimer

The information on this page is being provided to you on an «AS IS» and «AS-AVAILABLE» basis. The issues described on this page may or may not impact your system(s). Cloud Software Group, Inc. and its subsidiaries (collectively, «Cloud SG») make no representations, warranties, or guarantees as to the information contained herein. ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, WITHOUT LIMITATION, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT AND FITNESS FOR A PARTICULAR PURPOSE ARE HEREBY DISCLAIMED. BY ACCESSING THIS PAGE, YOU ACKNOWLEDGE THAT CLOUD SG SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN. Cloud SG reserves the right to change or update the information on this page at any time. We accordingly recommend that you always view the latest version of this page. The information contained herein is being provided to you under the terms of your applicable customer agreement with Cloud SG, and may be used only for the purposes contemplated by such agreement. If you do not have such an agreement with Cloud SG, this information is provided under the cloud.com Terms of Use, and may be used only for the purposes contemplated by such Terms of Use.

Details

Citrix Secure Access Client for Windows contains a vulnerability mentioned below

CVE-ID Description Pre-conditionsCWECVSSv4
CVE-2025-0320Local Privilege escalation allows a low-privileged user to gain SYSTEM privilegesStandard user access on local system CWE-269: Improper Privilege ManagementCVSS v4.0 Base Score: 8.5
(CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)

What Customers Should Do

Cloud Software Group strongly urges customers of Citrix Secure Access Client for Windows  to install the relevant updated versions as soon as possible: 

  • Citrix Secure Access Client for Windows 25.5.1.15 and later releases

Acknowledgements

Cloud Software Group thanks Damien Foulde of Axians for working with us to protect Cloud Software Group customers.

Additional information / Reference

Changelog

2025-06-17Initial Publication
Windows Virtual Delivery Agent for CVAD and Citrix DaaS Security Bulletin CVE-2025-6759

NetScaler Console and NetScaler SDX (SVM) Security Bulletin for CVE-2025-4365

Severity – Medium

Description of Problem

A vulnerability has been discovered in NetScaler Console (formerly NetScaler ADM) and NetScaler SDX (SVM) . Refer to below for further details: 

Affected Versions

The following supported versions of NetScaler Console are affected:

  • NetScaler Console 14.1 BEFORE 14.1.47.46
  • NetScaler Console 13.1 BEFORE 13.1.58.32
  • NetScaler SDX (SVM) 14.1 BEFORE 14.1.47.46
  • NetScaler SDX (SVM) 13.1 BEFORE 13.1.58.32

This bulletin only applies to the customer-managed NetScaler Console.  Customers using Citrix-managed NetScaler Console Service do not need to take any action.

Disclaimer

The information on this page is being provided to you on an «AS IS» and «AS-AVAILABLE» basis. The issues described on this page may or may not impact your system(s). Cloud Software Group, Inc. and its subsidiaries (collectively, «Cloud SG») make no representations, warranties, or guarantees as to the information contained herein. ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, WITHOUT LIMITATION, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT AND FITNESS FOR A PARTICULAR PURPOSE ARE HEREBY DISCLAIMED. BY ACCESSING THIS PAGE, YOU ACKNOWLEDGE THAT CLOUD SG SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN. Cloud SG reserves the right to change or update the information on this page at any time. We accordingly recommend that you always view the latest version of this page. The information contained herein is being provided to you under the terms of your applicable customer agreement with Cloud SG, and may be used only for the purposes contemplated by such agreement. If you do not have such an agreement with Cloud SG, this information is provided under the cloud.com Terms of Use, and may be used only for the purposes contemplated by such Terms of Use.

Details

NetScaler Console contains the vulnerability mentioned below:

CVE ID          DescriptionPre-conditions    CWECVSSv4
CVE-2025-4365Arbitrary file readAuthenticated Access to NetScaler ConsoleCWE-284: Improper Access ControlCVSS v4.0 Base Score: 6.9(CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N )

What Customers Should Do

Cloud Software Group strongly urges customers of NetScaler Console and NetScaler SDX (SVM) to install the relevant updated versions as soon as possible: 

  • NetScaler Console 14.1.47.46 and later releases
  • NetScaler Console 13.1.58.32 and later releases of 13.1
  • NetScaler SDX (SVM) 14.1.47.46 and later releases
  • NetScaler SDX (SVM) 13.1.58.32 and later releases of 13.1

Acknowledgements

Cloud Software Group thanks Calum Hutton of Rapid7 for working with us to protect Cloud Software Group customers

Additional information / Reference

Changelog

2025-06-17Initial Publication
Citrix Secure Access Client for Windows Security Bulletin for CVE-2025-0320

NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2025-5349 and CVE-2025-5777

Severity – Critical

Description of Problem

A vulnerability has been discovered in NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (formerly Citrix Gateway). Refer below for further details.

Affected Versions

The following supported versions of NetScaler ADC and NetScaler Gateway are affected by the vulnerabilities: 

  • NetScaler ADC and NetScaler Gateway 14.1 BEFORE 14.1-43.56
  • NetScaler ADC and NetScaler Gateway 13.1 BEFORE 13.1-58.32
  • NetScaler ADC 13.1-FIPS and NDcPP  BEFORE 13.1-37.235-FIPS and NDcPP
  • NetScaler ADC 12.1-FIPS BEFORE 12.1-55.328-FIPS

Note: NetScaler ADC and NetScaler Gateway versions 12.1 and 13.0 are now End Of Life (EOL) and are vulnerable. Customers are recommended to upgrade their appliances to one of the supported versions that address the vulnerabilities. 

Additional Note: Secure Private Access on-prem or Secure Private Access Hybrid deployments using NetScaler instances are also affected by the vulnerabilities. Customers need to upgrade these NetScaler instances to the recommended NetScaler builds to address the vulnerabilities. 

This bulletin only applies to customer-managed NetScaler ADC and NetScaler Gateway. Cloud Software Group upgrades the Citrix-managed cloud services and Citrix-managed Adaptive Authentication with the necessary software updates.

Disclaimer

The information on this page is being provided to you on an «AS IS» and «AS-AVAILABLE» basis. The issues described on this page may or may not impact your system(s). Cloud Software Group, Inc. and its subsidiaries (collectively, «Cloud SG») make no representations, warranties, or guarantees as to the information contained herein. ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, WITHOUT LIMITATION, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT AND FITNESS FOR A PARTICULAR PURPOSE ARE HEREBY DISCLAIMED. BY ACCESSING THIS PAGE, YOU ACKNOWLEDGE THAT CLOUD SG SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN. Cloud SG reserves the right to change or update the information on this page at any time. We accordingly recommend that you always view the latest version of this page. The information contained herein is being provided to you under the terms of your applicable customer agreement with Cloud SG, and may be used only for the purposes contemplated by such agreement. If you do not have such an agreement with Cloud SG, this information is provided under the cloud.com Terms of Use, and may be used only for the purposes contemplated by such Terms of Use.

Details

NetScaler ADC and NetScaler Gateway contain the vulnerabilities mentioned below:

CVE ID          DescriptionPre-conditionsCWECVSSv4
CVE-2025-5349Improper access control on the NetScaler Management InterfaceAccess to NSIP, Cluster Management IP or local GSLB Site IPCWE-284: Improper Access ControlCVSS v4.0 Base Score: 8.7(CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L)
CVE-2025-5777Insufficient input validation leading to memory overreadNetScaler must be configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual serverCWE-125: Out-of-bounds ReadCVSS v4.0 Base Score: 9.3(CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L)

What Customers Should Do

Cloud Software Group strongly urges affected customers of NetScaler ADC and NetScaler Gateway to install the relevant updated versions as soon as possible. 

  • NetScaler ADC and NetScaler Gateway 14.1-43.56 and later releases
  • NetScaler ADC and NetScaler Gateway 13.1-58.32 and later releases of 13.1
  • NetScaler ADC 13.1-FIPS and 13.1-NDcPP 13.1-37.235 and later releases of 13.1-FIPS and 13.1-NDcPP
  • NetScaler ADC 12.1-FIPS 12.1-55.328 and later releases of 12.1-FIPS

Additionally, we recommend running the following commands to terminate all active ICA and PCoIP sessions after all NetScaler appliances in the HA pair or cluster have been upgraded to the fixed builds.:

kill icaconnection -all

kill pcoipConnection -all

Please ensure that the formatting remains intact as you copy and paste these commands.

Note: NetScaler ADC and NetScaler Gateway versions 12.1 and 13.0 are now End Of Life (EOL) and no longer supported. Customers are recommended to upgrade their appliances to one of the supported versions that address the vulnerabilities. 

Acknowledgements