Citrix NetScaler Two CVE Threats Memory and Compulsory Parche Sessions

Published 4 min de lectura 164 reading

Citrix released patches for two security failures that affect its NetScaler ADC and NetScaler Gateway applications. One of them has an important resemblance to the memory-reading vulnerabilities known as CitrixBleed and CitrixBleed2, which in recent years were exploited in zero-day attacks and caused major head breaks to critical infrastructure managers.

The first of the failures, recorded as CVE-2026-3055, is derived from an insufficient validation of input data and can lead to a reading outside the memory limits on NetScaler devices configured as SAML (IDP) identity provider. In practice, this could allow a remote attacker without privileges to access sensitive information stored in the memory, including session tokens or other temporary credentials. Citrix published a security note urging affected customers to implement the updated versions without delay; the official alert is available on their knowledge base CTX696300 and in the technical guide to locating and patching vulnerable the documentation of NetScaler.

Citrix NetScaler Two CVE Threats Memory and Compulsory Parche Sessions
Image generated with IA.

The second problem, CVE-2026-4368, affects configured applications such as Gateway (SSL VPN, ICA Proxy, CVPN, proxy RDP) or virtual AAA servers. This is a career condition that, exploited, can cause blends of sessions between users and other unexpected behaviors; actors with few privileges in the system could force these incorrect responses by relatively simple attacks.

Official corrections are included in versions 13.1-62.23 and 14.1-66.59 for releases 13.1 and 14.1, and also in specific updates for FIPS and NDcPP building of 13.1. It is important to check which specific buildings are deployed in each environment and follow Citrix's instructions for safe updating.

The exposure is material: the Shadowserver surveillance group tracks more than 30,000 NetScaler ADC instances accessible from the Internet and more than 2,300 Gateways published on the public network, although there is no exact accounting of how many have a vulnerable configuration or were already parched. The Shadowserver telemetry can be consulted on its public panels to get an idea of the scope: NetScaler ADC Here. and Gateway Here..

Researchers and security companies have raised their voices since the patch was published. Several firms have noted the technical similarity between CVE-2026-3055 and the old CitrixBleed, which in 2023 (CVE-2023-4966) and in a later variant in 2025 allowed attackers to obtain sensitive data through readings outside the memory limits. Publications of groups such as Rapid7 provide technical analysis and practical recommendations on risk and the signals to be monitored: the blog of Rapid7, and managed service providers like Arctic Wolf have published customer notes on the implications: Arctic Wolf analysis. In addition, actors in the sector have warned that when a patch is released there is a risk that third parties will "reverse it" to build exploits, which often accelerates the emergence of public concept tests and exploitation campaigns.

States and agencies also follow these paths closely. The US Agency for Infrastructure and Cybersecurity. The United States (CISA) maintains a catalogue of known vulnerabilities that have been exploited in the real world and it records multiple failures of Citrix products used by government organizations and private companies; its inventory can be found in the CISA website.

What should IT and security officers do now? The priority is to check if there are NetScaler ADC or Gateway applications on the network that run affected versions and apply official Citrix updates as soon as possible. In environments where immediate updating is not feasible, it is appropriate to reduce the exposure area by restricting access to administration and public endpoints of application through firewall, access control lists and network segmentation, as well as actively monitoring records and alerts by abnormal patterns that may indicate attempts to operate. It is also good practice to rotate tokens and sensitive sessions if exposure is suspected and to review SAML and authentication policies to minimize sensitive information sustained in memory.

Citrix NetScaler Two CVE Threats Memory and Compulsory Parche Sessions
Image generated with IA.

The practical lesson is that devices that act as entry points (VPN, proxies, Gateways, ADClaro, etc.) should be given priority treatment in the parking cycles: their role exposes the organization to high risks if input validation controls or memory management fail. And given the recent history with CitrixBleed, it is not wise to wait for public exploits to appear to act.

For those who need quick references: the technical description of each failure is in the NVD database ( CVE-2026-3055 and CVE-2026-4368), the official instructions and patches on the Citrix support page ( CTX696300 and remediation guide), and community analysis of the Rapid7 and Arctic Wolf links mentioned above.

In short, the emergence of these two failures and their technical relationship with previously exploited vulnerabilities underline the need to keep up-to-date inventories, prioritize patches in gateways and remote access systems, and apply in-depth defenses to mitigate impact while remediation is being carried out.

Coverage

Related

More news on the same subject.