Source: BleepingComputer
Author: Sergiu Gatlan
URL: https://www.bleepingcomputer.com/news/security/citrix-urges-admins-to-patch-netscaler-flaws-as-soon-as-possible/
ONE SENTENCE SUMMARY:
Citrix patched NetScaler flaws, including CitrixBleed-like memory overread, urging rapid upgrades amid widespread exposure and likely exploitation.
MAIN POINTS:
- Citrix released fixes for two NetScaler ADC and Gateway vulnerabilities.
- CVE-2026-3055 is critical, caused by insufficient input validation.
- The bug enables memory overread when configured as a SAML identity provider.
- Unprivileged remote attackers could steal sensitive data like session tokens.
- Citrix urged customers to install updated versions immediately.
- Guidance was provided to identify and remediate vulnerable NetScaler instances.
- CVE-2026-4368 impacts Gateway/AAA configurations via a race condition.
- Low-privileged attackers could trigger user session mix-ups with low-complexity exploitation.
- Affected versions include 13.1/14.1 and FIPS/NDcPP builds with specified fixed releases.
- Shadowserver reports 30,000+ ADC and 2,300+ Gateway instances exposed online.
TAKEAWAYS:
- Prioritize patching CVE-2026-3055 due to token leakage risk and CitrixBleed similarities.
- Validate whether SAML IDP is enabled, since it influences exposure to the critical flaw.
- Upgrade to 13.1-62.23, 14.1-66.59, or 13.1-37.262 for FIPS/NDcPP.
- Treat CVE-2026-4368 as a practical threat because low privileges may suffice.
- Assume exploit attempts will follow patch release through reverse engineering and public PoCs.