CVE-2026-3055: NetScaler Memory Bugs Exploited

Slack lit up last Wednesday: clients freaking over Citrix NetScaler CVE-2026-3055. Memory overreads dumping session tokens—hackers are already inside.

Citrix NetScaler's CVE-2026-3055: Memory Leaks Deja Vu, Now With Exploitation — theAIcatchup

Key Takeaways

  • CVE-2026-3055 covers two memory overreads in NetScaler SAML, leaking admin tokens—actively exploited.
  • Patch to specified versions immediately; disable SAML IdP as interim if desperate.
  • Citrix downplayed it initially, echoing CitrixBleed—disingenuous disclosure risks trust.

Last Wednesday, my inbox imploded before coffee.

Three clients, same panic: “Is our NetScaler safe from CVE-2026-3055?” Turns out, no — not if you’ve got SAML configured. This beast hit disclosure on March 23, and by Saturday, CISA slapped it on their Known Exploited Vulnerabilities list. Seven days flat from bug to boom. Patch or pray, folks.

Why CVE-2026-3055 Feels Like Groundhog Day

Citrix NetScaler ADC and Gateway. SAML endpoint. Crafted request. Boom — memory dumps galore, including admin session tokens. CVSS 9.3. Unauthenticated. It’s CitrixBleed 3.0, minus the bleeding but with the same oops.

watchTowr Labs cracked it open: not one bug, two. First, /saml/login sans AssertionConsumerServiceURL — leaks via NSC_TASS cookie. Second, /wsfed/passive with wctx but no value — Base64’d dead memory, same cookie, no size cap. Grab a token. Admin access. Yours.

“The researchers at watchTowr Labs found that CVE-2026-3055 actually covers two separate memory overread bugs, not one.”

That’s straight from the analysis. Citrix bundled ‘em under one CVE. Sloppy.

Short timeline? Brutal. Disclosure March 23. Exploitation March 27 — honeypots lit up. Metasploit module by March 30. CISA deadline? Today, April 2. Federal agencies: patch or ditch.

Affected? On-prem NetScaler ADC/Gateway with SAML IdP. Cloud ones? Safe, for now. Grep your config: add authentication samlIdPProfile. There? You’re toast without patches.

Versions:

NetScaler ADC/Gateway 14.1 < 14.1-66.59 NetScaler ADC/Gateway 13.1 < 13.1-62.23 NetScaler ADC 13.1-FIPS < 13.1-37.262 NetScaler ADC 13.1-NDcPP < 13.1-37.262

29,000 ADCs, 2,250 Gateways internet-facing. US, Germany, UK lead the exposure parade. Attackers fingerprint via /cgi/GetAuthMethods. Automated. Relentless.

Is Your NetScaler Getting Probed Right Now?

Here’s my beef — and it’s fresh. Citrix’s bulletin? Called it an “internal security review finding.” No whiff of exploitation. No nod to dual bugs. watchTowr dubbed the disclosure “disingenuous.” Spot on.

(They’re edge appliances handling your whole org’s auth. Downplay a memory leaker echoing 2023’s mega-exploit? That’s not review; that’s spin.)

Remember CitrixBleed? Millions hit. Citrix spun then too — late warnings, vague fixes. History rhymes. My prediction: regulators circle back if breaches pile up. GDPR fines? SEC probes? Bet on it. Enterprises won’t forget a third round.

Patch table:

Product Fixed Version
NetScaler ADC & Gateway 14.1 14.1-66.59
NetScaler ADC & Gateway 13.1 13.1-62.23
NetScaler ADC 13.1-FIPS 13.1-37.262
NetScaler ADC 13.1-NDcPP 13.1-37.262

Can’t patch? Disable SAML IdP. But that’ll nuke SSO — users revolt. Better: maintenance window, reboot, done.

Post-patch paranoia checklist:

Review logs. Weird admin logins? Odd IPs? Rotate creds anyway. Hunt leaked tokens. Assume compromise.

Shadowserver’s scan? 30k+ boxes. Shodan confirms: your neighborhood’s crawling.

Why Does CVE-2026-3055 Matter More Than the Last One?

SAML’s everywhere. Enterprise SSO darling. NetScaler’s the gatekeeper. Leak here? Game over — internal pivots galore.

And the humor? Dark. Citrix, kings of ADC, can’t seal memory bounds. Third time? Buffers overflow like bad diets.

But seriously. This isn’t hype. Defused Cyber saw probes. Rapid7 armed Metasploit. Your CLI’s next.

Unique angle: think Heartbleed 2014. OpenSSL’s memory goof shook the web. Citrix? Proprietary, but same vibe — trust shattered. Except Heartbleed got fixed ecosystem-wide. Citrix? Customers chase patches solo. Vendor fatigue sets in.

Patch. Now. Or watch your Slack light up — but from attackers.


🧬 Related Insights

Frequently Asked Questions

What is Citrix NetScaler CVE-2026-3055?

Two memory overread bugs in SAML endpoints, leaking admin tokens via cookies. Unauth. Exploited.

How do I check if my NetScaler has CVE-2026-3055?

Grep config for “add authentication samlIdPProfile.” Versions below fixes? Vulnerable.

Is CVE-2026-3055 actively exploited?

Yes — honeypots caught it days post-disclosure. CISA KEV. Metasploit ready. Patch yesterday.

Aisha Patel
Written by

Former ML engineer turned writer. Covers computer vision and robotics with a practitioner perspective.

Frequently asked questions

What is Citrix NetScaler CVE-2026-3055?
Two memory overread bugs in SAML endpoints, leaking admin tokens via cookies. Unauth. Exploited.
How do I check if my NetScaler has CVE-2026-3055?
Grep config for "add authentication samlIdPProfile." Versions below fixes? Vulnerable.
Is CVE-2026-3055 actively exploited?
Yes — honeypots caught it days post-disclosure. CISA KEV. Metasploit ready. Patch yesterday.

Worth sharing?

Get the best AI stories of the week in your inbox — no noise, no spam.

Originally reported by dev.to

Stay in the loop

The week's most important stories from theAIcatchup, delivered once a week.