Security & Infrastructure Tools
Citrix urges admins to patch NetScaler flaws as soon as possible
Citrix has released patches for two critical vulnerabilities (CVE‑2026‑3055 and CVE‑2026‑4368) affecting NetScaler ADC and Gateway appliances, which could allow remote attackers to read memory or cause session mix‑ups. The flaws are similar to the previously exploited CitrixBleed variants, raising concerns that exploit code may soon appear in the wild. Citrix urges customers to apply the updates immediately and provides guidance for identifying affected instances. Over 30,000 NetScaler ADC and more than 2,300 Gateway devices are exposed online, but it is unclear how many remain vulnerable.

Citrix has released security updates for two critical flaws affecting NetScaler ADC appliances and NetScaler Gateway remote access solutions. One of the bugs, tracked as CVE-2026-3055, stems from insufficient input validation and can cause a memory overread when a NetScaler device is configured to act as a SAML identity provider. In practical terms, this could allow remote attackers with no privileges to access sensitive information such as session tokens. The other vulnerability, CVE-2026-4368, centers on a race condition that can be exploited in low-privilege scenarios against Gateways, SSL VPNs, ICA Proxy, and related virtual servers, potentially leading to user session mix-ups.
Citrix has published patch guidance and updated releases for impacted products. The fixes target NetScaler ADC and NetScaler Gateway versions 13.1 and 14.1, with the specific patched builds identified as 13.1-62.23 and 14.1-66.59. There are also patches for the 13.1-FIPS and 13.1-NDcPP variants, addressed in 13.1-37.262. Admins running these lines should verify their deployments and apply the corresponding updates to mitigate the risk from both CVE-2026-3055 and CVE-2026-4368.
Security researchers and watchdog groups have been monitoring exposure levels since these advisories went live. Shadowserver’s observations indicate tens of thousands of NetScaler ADC instances and gateways exposed online, highlighting that a significant number of deployments may still be at risk due to unpatched software or vulnerable configurations. While the public-facing count is extensive, there is no precise disclosure yet about how many of those systems are actually susceptible or have already been updated.
Industry responses since the disclosures have underscored the urgency. Several cybersecurity companies have drawn explicit comparisons between the newly patched flaws and earlier Citrix memory-read vulnerabilities that were exploited in real-world attacks. Analysts have warned that memory-leak and out-of-bounds-read bugs in Citrix products have a track record of being weaponized rapidly once exploit code becomes available. The sentiment from researchers emphasizes that threat actors are often quick to reverse-engineer patches and retool exploit capabilities, which makes timely remediation critical for affected organizations.
The conversation around Citrix vulnerabilities is not new. Earlier in 2023, the CitrixBleed flaw demonstrated how memory-read issues could be exploited, followed by CitrixBleed2 in 2025. Security firms have noted the persistent risk of such vulnerabilities in the wild, with several advisories and blog posts highlighting how quickly attackers can pivot to targeted exploitation after a patch is announced. The broader context includes warnings from U.S. agencies during previous cycles that Citrix flaws have been actively exploited and that federal and enterprise networks alike must respond promptly to reduce exposure.
Looking back further, the security ecosystem has tracked a growing pattern of Citrix-related exposures and proactive patch campaigns. In August 2025, CISA flagged CitrixBleed2 as actively exploited and issued a directive that federal agencies patch within tight timeframes. Overall, the known Citrix vulnerabilities that have seen exploitation in the wild—some tied to ransomware campaigns—underscore the importance of timely remediation for organizations running NetScaler appliances or related Gateway services.
In summary, the newly patched CVE-2026-3055 and CVE-2026-4368 vulnerabilities reinforce a continuing lesson: the combination of remote-access services and memory- and race-condition flaws can create high-risk attack surfaces. Citrix’s updates, along with the broader industry scrutiny, serve as a reminder that keeping networking appliances up to date is essential to reduce the risk of token theft, session hijacking, and other attacker-induced disruptions in environments that rely on NetScaler for authentication and access control. As always with such families of vulnerabilities, the window between disclosure and remediation matters, and organizations should prioritize verification of patch status across all affected instances to close the exposed gaps.