NetScaler Console service

Remediate vulnerabilities for CVE-2025-5777

In the NetScaler Console security advisory dashboard, under Current CVEs <number of> NetScaler instances are impacted by CVEs, you can see all the instances vulnerable due to CVE-2025-5777. To check the details of the instances impacted by the CVEs, select CVE-2025-5777 and click View Affected Instances.

Security advisory dashboard for CVE-2025-5777

Note:

To understand the reason for NetScaler vulnerability, download the CSV report in Scan logs tab in Security Advisory.

The <number of> NetScaler instances impacted by CVEs window appears. In the following screen capture, you can see the count and details of the NetScaler instances impacted by CVE-2025-5777.

Instances impacted by CVE-2025-5777

For more information about the security advisory dashboard see, Security Advisory.

Note:

It might take a couple of hours for the security advisory system scan to conclude and reflect the impact of CVE-2025-5777 in the security advisory module. To see the impact sooner, start an on-demand scan by clicking Scan-Now.

Remediate CVE-2025-5777

For CVE-2025-5777 -impacted NetScaler instances, the remediation is a two-step process. In the GUI, under Current CVEs > NetScaler instances are impacted by CVEs, you can see step 1 and 2.

Remediation steps for CVE-2025-5777

The two steps include:

  1. Upgrading the vulnerable NetScaler instances to a release and build that has the fix.

  2. Applying the required configuration commands using the customizable built-in configuration template in configuration jobs.

Under Current CVEs> NetScaler instances impacted by CVEs, you see two separate workflows for this 2-step remediation process: which are Proceed to upgrade workflow and Proceed to configuration job workflow.

Step 1: Upgrade the vulnerable NetScaler instances

To upgrade the vulnerable instances, select the instances and click Proceed to upgrade workflow. The upgrade workflow opens with the vulnerable NetScaler instances already populated.

For more information on how to use NetScaler Console to upgrade NetScaler instances, see Create a NetScaler upgrade job.

Note:

This step can be done at once for all the vulnerable NetScaler instances.

Step 2: Apply configuration commands

After you’ve upgraded the impacted instances, in the <number of> NetScaler instances impacted by CVEs window, select the instance impacted by CVE-2025-5777 and click Proceed to configuration job workflow. The workflow includes the following steps.

  1. Customizing the configuration.
  2. Reviewing the auto-populated impacted instances.
  3. Running the job.

Keep the following points in mind before you select an instance and click Proceed to configuration job workflow:

  • For a NetScaler instance impacted by multiple CVEs (such as CVE-2020-8300, CVE-2021-22927, CVE-2021-22920, CVE-2021-22956, and CVE-2025-5777): when you select the instance and click Proceed to configuration job workflow, the built-in configuration template does not auto-populate under Select configuration. You must Drag and drop the appropriate config job template under Security Advisory Template manually to the config job pane on the right side.

  • For multiple NetScaler instances that are impacted by CVE-2025-5777 only: you can run config jobs on all instances at once. For example, you’ve NetScaler 1, NetScaler 2, and NetScaler 3, and all of them are impacted only by CVE-2025-5777. Select all these instances and click Proceed to configuration job workflow, and the built-in configuration template auto-populates under Select configuration.

  • For multiple NetScaler instances impacted by CVE-2025-5777 and one or more other CVEs (such as CVE-2020-8300, CVE-2021-22927, and CVE-2021-22920), which require remediation to be applied to each NetScaler at a time: when you select these instances and click Proceed to configuration job workflow, an error message appears telling you to run the config job on each NetScaler at a time.

Step 1: Select configuration

In the configuration job workflow, the built-in configuration base template auto-populates under Select configuration.

Select config

Step 2: Select the instance

The impacted instance is auto-populated under Select Instances. Select the instance. If this instance is part of an HA pair, select Execute on Secondary Nodes. Click Next.

Select instance

Note:

For NetScaler instances in cluster mode, using security advisory, the NetScaler Console supports running the config job only on the cluster configuration coordinator (CCO) node. Run the commands on non-CCO nodes separately.

Step 3: Run the job

Click Finish to run the configuration job.

Run configuration job

After the job is run, it appears under Infrastructure > Configuration > Configuration Jobs.

After completing the two remediation steps for all vulnerable NetScaler instances, you can run an on-demand scan to see the revised security posture.

Remediate vulnerabilities for CVE-2025-5777