Citrix NetScaler Exploit Alert: Critical Vulnerabilities Exploited
Exploitation of Fresh Citrix NetScaler Vulnerability Underway
Citrix NetScaler appliances configured as SAML Identity Providers (SAML IDPs) and running outdated software have fallen prey to in-the-wild exploitation of a recently disclosed critical-severity vulnerability, according to attack surface management firm WatchTowr.
Vulnerability Details
- Vulnerability Name: CVE-2026-3055
- CVSS Score: 9.3
- Impact: Critical
The security defect, an out-of-bounds read issue, was reportedly discovered and addressed internally by Citrix. However, the company cautioned that threat actors were likely to capitalize on the vulnerability soon after disclosure, drawing parallels with notorious vulnerabilities like CitrixBleed and CitrixBleed2.
Evidence suggests that in-the-wild exploitation of vulnerable NetScaler instances commenced at least by March 27. The company demonstrated sensitive information leakage by revealing the ID of an authenticated administrative session, illustrating the potential consequences of this vulnerability.
Affected Systems
- NetScaler ADC and Gateway: Versions prior to 14.1-60.58 and 13.1-62.23
- ADC FIPS and NDcPP: Versions prior to 13.1-37.26
