Browse all 14 CVE security advisories affecting NetScaler. AI-powered Chinese analysis, POCs, and references for each vulnerability.
NetScaler serves as a core application delivery controller and load balancer, optimizing web traffic and security for enterprise applications. Historically, it has been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from misconfigurations or unpatched components. With 14 CVEs currently on record, these flaws have allowed attackers to compromise systems, exfiltrate data, and establish persistent access. Notable incidents include widespread exploitation of CVE-2023-3519, which enabled unauthenticated RCE, highlighting critical risks in internet-facing deployments. Organizations must prioritize timely patching and hardening to mitigate these persistent security challenges.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-4365 | NetScaler Console and NetScaler SDX (SVM) - Arbitrary file read — ConsoleCWE-1284 | 6.2AI | MediumAI | 2025-06-17 |
| CVE-2024-12284 | Authenticated privilege escalation — ConsoleCWE-269 | 8.8 | - | 2025-02-19 |
This page lists every published CVE security advisory associated with NetScaler. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.