Source: The Hacker News
Author: info@thehackernews.com (The Hacker News)
URL: https://thehackernews.com/2026/03/citrix-urges-patching-critical.html
ONE SENTENCE SUMMARY:
Citrix patched two NetScaler flaws, including critical unauthenticated memory disclosure, urging rapid updates due to likely imminent exploitation.
MAIN POINTS:
- Citrix issued security updates for NetScaler ADC and NetScaler Gateway vulnerabilities.
- CVE-2026-3055 is critical (9.3) due to insufficient input validation memory overread.
- Rapid7 describes CVE-2026-3055 as an out-of-bounds read leaking sensitive memory.
- Exploitation requires the appliance configured as a SAML Identity Provider profile.
- Customers should search configs for
add authentication samlIdPProfile .*to confirm exposure. - CVE-2026-4368 (7.7) is a race condition causing user session mixups.
- CVE-2026-4368 needs gateway or AAA server configurations to be exploitable.
- Validate configurations using
add authentication vserver .*oradd vpn vserver .*. - Affected releases include 14.1 < 14.1-66.59 and 13.1 < 13.1-62.23.
- Patch urgently given NetScaler’s history of repeated exploitation (Citrix Bleed and successors).
TAKEAWAYS:
- Apply the newest NetScaler updates immediately across all impacted versions and editions.
- Prioritize remediation where SAML IdP is enabled, since it unlocks unauthenticated memory leakage.
- Treat gateway and AAA deployments as higher-risk due to session-mixup conditions.
- Use provided configuration-string checks to quickly scope exposure in environments.
- Assume high exploitation likelihood despite no confirmed in-the-wild abuse yet.