{"id":5017,"date":"2026-03-29T23:37:42","date_gmt":"2026-03-29T23:37:42","guid":{"rendered":"http:\/\/ft365.org\/index.php\/2026\/03\/29\/citrix-urges-immediate-patching-for-critical-netscaler-vulnerabilities\/"},"modified":"2026-03-29T23:37:42","modified_gmt":"2026-03-29T23:37:42","slug":"citrix-urges-immediate-patching-for-critical-netscaler-vulnerabilities","status":"publish","type":"post","link":"http:\/\/ft365.org\/index.php\/2026\/03\/29\/citrix-urges-immediate-patching-for-critical-netscaler-vulnerabilities\/","title":{"rendered":"Citrix Urges Immediate Patching for Critical NetScaler Vulnerabilities"},"content":{"rendered":"<div id=\"cphContent_pnlArticleBody\">\n<div id=\"layout-83fd440c-fa36-4288-97b1-59a8e807b4c3\" data-layout-id=\"2\" data-edit-folder-name=\"text\" data-index=\"0\">\n<p>Citrix has released a new critical security bulletin addressing two new vulnerabilities in its NetScaler Application Delivery Controller (ADC) and NetScaler Gateway.<\/p>\n<p>The two products, formerly known as Citrix ADC and Citrix Gateway, are networking and security solutions used by enterprises to manage, optimize and secure application delivery and remote access.<\/p>\n<h2><strong>CVE-2026-3055: Critical Out-of-Bounds Read<\/strong><\/h2>\n<p>The first vulnerability, tracked as CVE-2026-3055 is a critical out-of-bounds read with a severity score (CVSS v4.0) of 9.3.<\/p>\n<p>Identified internally by Citrix\u2019s parent company, the Cloud Software Group, the flaw is due to insufficient input validation leading to memory overread. If exploited, it can enable an unauthenticated remote attacker to leak potentially sensitive information from the appliance&#8217;s memory.<\/p>\n<p>The products affected by CVE-2026-3055 include:<\/p>\n<ul>\n<li>NetScaler ADC and NetScaler Gateway\u202fversions 14.1\u202fbefore 14.1-66.59<\/li>\n<li>NetScaler ADC and NetScaler Gateway\u202f13.1\u202fbefore 13.1-62.23<\/li>\n<li>NetScaler ADC FIPS and NDcPP before 13.1-37.262<\/li>\n<\/ul>\n<p>However, according to Citrix\u2019s advisory, published on March 23, these vulnerabilities only affect NetScaler systems explicitly configured as a SAML Identity Provider (SAML IDP). Default or standard configurations remain unaffected.<\/p>\n<p>Additionally, Citrix noted that only customer-managed instances are affected, not cloud instances managed by Citrix.<\/p>\n<p>Customers can determine if they have an appliance configured as a SAML IDP Profile by inspecting their NetScaler Configuration for the specified string: \u201c<em>add authentication samlIdPProfile .*<\/em>.\u201d<\/p>\n<p>Cloud Software Group strongly urges affected customers to install the relevant updated versions as soon as possible, which include:<\/p>\n<ul>\n<li>NetScaler ADC\u202fand NetScaler Gateway 14.1-66.59 and later releases<\/li>\n<li>NetScaler ADC\u202fand NetScaler Gateway 13.1-62.23 and later releases of 13.1<\/li>\n<li>NetScaler ADC 13.1-FIPS and 13.1-NDcPP 13.1.37.262 and later releases of 13.1-FIPS and 13.1-NDcPP<\/li>\n<\/ul>\n<p>NetScaler introduced the Global Deny List feature in its 14.1.60.52 versions. This new feature provides a method of adopting an instant-on patch to a running NetScaler without requiring a reboot.<\/p>\n<p>Cloud Software Group has released Global Deny List signatures for mitigating CVE 2026-3055.<\/p>\n<p>\u201cPlease note that to receive signatures meant for the Global Deny List, you must use NetScaler Console (Console On-prem with Cloud Connect or Console Service). Additionally, mitigation via Global Deny List signatures for CVE 2026-3055 is applicable only on 14.1-60.52 and 14.1-60.57 firmware builds,\u201d the company noted.<\/p>\n<p>\u201cWe recommend that you adopt fully patched builds as explained above. The Global Deny List feature is meant to be a method of quickly protecting your NetScaler so that upgrades can be done during a scheduled outage window.\u201d<\/p>\n<p>There is no known in-the-wild exploitation and no public proof-of-concept (PoC) exploit available at the time of writing.<\/p>\n<\/p><\/div>\n<figure id=\"layout-3fa25f41-1a64-401f-ab2c-13547b5fe6f8\" data-layout-id=\"4\" data-edit-folder-name=\"image\" data-index=\"1\"><img decoding=\"async\" src=\"http:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/localimages\/610e3bb6-4c35-4e29-888e-bb9af5641a88.png\" alt=\"Source: Infosecurity Magazine\"><figcaption>Source: Infosecurity Magazine<\/figcaption><\/figure>\n<div id=\"layout-7da3a3fe-0604-4fdf-9e93-ea4287bf8afd\" data-layout-id=\"2\" data-edit-folder-name=\"text\" data-index=\"2\">\n<h2><strong>CVE-2026-4368: High-Severity Race Condition Flaw<\/strong><\/h2>\n<p>A second vulnerability, tracked as CVE-2026-4368 is a race condition flaw with a severity score (CVSS v4.0) of 7.7.<\/p>\n<p>If exploited, CVE-2026-4368 can cause session mix up.<\/p>\n<p>It affects NetScaler ADC and NetScaler Gateway version 14.1-66.54 if NetScaler is configured as Gateway (SSL VPN, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server.<\/p>\n<p>Customers can determine if they have an appliance configured as one of the following by inspecting their NetScaler Configuration for the specified strings<\/p>\n<ul>\n<li>An Auth Server (AAA Vserver): \u201c<em>add authentication vserver .*<\/em>\u201d<\/li>\n<li>A Gateway (VPN Vserver,\u00a0ICA Proxy, CVPN, RDP Proxy): \u201c<em>add vpn vserver .*<\/em>\u201d<\/li>\n<\/ul>\n<p>Affected customers are advised to install NetScaler ADC\u202fand NetScaler Gateway version 14.1-66.59 to apply the patch for CVE-2026-4368.<\/p>\n<p><em>Image credits:\u00a0\u00a0JHVEPhoto \/ viewimage \/ Shutterstock.com<\/em><\/p>\n<p><em>Read now: Salt Typhoon Uses Citrix Flaw in Global Cyber-Attack<\/em><\/p>\n<\/p><\/div>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Citrix has released a new critical security bulletin addressing two new vulnerabilities in its NetScaler Application Delivery Controller (ADC) and NetScaler Gateway. The two products, formerly known as Citrix ADC and Citrix Gateway, are networking and security solutions used by enterprises to manage, optimize and secure application delivery and remote access. CVE-2026-3055: Critical Out-of-Bounds Read<\/p>\n","protected":false},"author":2,"featured_media":5018,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-5017","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"featured_image_urls":{"full":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/5017-9936cf10-e9ba-49e9-aa71-950c492e4797.jpg",300,300,false],"thumbnail":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/5017-9936cf10-e9ba-49e9-aa71-950c492e4797-150x150.jpg",150,150,true],"medium":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/5017-9936cf10-e9ba-49e9-aa71-950c492e4797.jpg",300,300,false],"medium_large":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/5017-9936cf10-e9ba-49e9-aa71-950c492e4797.jpg",300,300,false],"large":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/5017-9936cf10-e9ba-49e9-aa71-950c492e4797.jpg",300,300,false],"1536x1536":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/5017-9936cf10-e9ba-49e9-aa71-950c492e4797.jpg",300,300,false],"2048x2048":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/5017-9936cf10-e9ba-49e9-aa71-950c492e4797.jpg",300,300,false],"morenews-featured":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/5017-9936cf10-e9ba-49e9-aa71-950c492e4797.jpg",300,300,false],"morenews-large":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/5017-9936cf10-e9ba-49e9-aa71-950c492e4797.jpg",300,300,false],"morenews-medium":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/5017-9936cf10-e9ba-49e9-aa71-950c492e4797.jpg",300,300,false],"crawlomatic_preview_image":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/5017-9936cf10-e9ba-49e9-aa71-950c492e4797-146x146.jpg",146,146,true]},"author_info":{"display_name":"henry","author_link":"http:\/\/ft365.org\/index.php\/author\/henry\/"},"category_info":"<a href=\"http:\/\/ft365.org\/index.php\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","tag_info":"Uncategorized","comment_count":"0","_links":{"self":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/5017","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/comments?post=5017"}],"version-history":[{"count":0,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/5017\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media\/5018"}],"wp:attachment":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media?parent=5017"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/categories?post=5017"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/tags?post=5017"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}