High-Risk Vulnerability Hits Citrix NetScaler ADC and Gateway, Impacting Security
Citrix Releases Patches for Critical Vulnerabilities in NetScaler
Citrix has issued patches for two critical flaws affecting its NetScaler Application Delivery Controller (ADC) and NetScaler Gateway products.
- Vulnerability Overview:
- One flaw (CVE-2026-3055) could potentially allow attackers to extract active session tokens from memory if exploited.
- The other flaw, also related to Citrix, is not explicitly mentioned by name but is described in relation to CVE-2025-5777.
Flaws Affect Specific Versions of NetScaler
The more severe flaw, designated as CVE-2026-3055, impacts NetScaler ADC and Gateway versions 14.1 prior to 14.1-66.59 and 13.1 prior to 13.1-62.23, as well as NetScaler ADC 13.1-FIPS and 13.1-NDcPP prior to 13.1-37.262.
According to Citrix’s advisory, the SAML Identity Provider (SAML IDP) configuration is particularly vulnerable to this flaw. Rapid7 notes that SAML IDP configuration is commonly used in organizations implementing single sign-on, making them more susceptible to this vulnerability.
