Vulnerabilities & CVEs

CVE-2026-3055: Citrix NetScaler Exploited

Just when Citrix fans breathed easy post-Bleed, CVE-2026-3055 rips open NetScaler memory via SAML setups. It's live in exploits, CISA-KEV listed, Metasploit-ready—history repeating fast.

Diagram of CVE-2026-3055 out-of-bounds read attack on Citrix NetScaler SAML IDP

Key Takeaways

  • CVE-2026-3055 targets SAML IDP configs in NetScaler, a common enterprise SSO setup, enabling unauthenticated memory leaks.
  • Rapid exploitation: advisory to CISA KEV and Metasploit in a week—patch immediately if affected.
  • Echoes CitrixBleed but hits modern auth architectures harder; expect prolonged threats.

CVE-2026-3055 dropped like a forgotten grenade in Citrix’s NetScaler world. Everyone figured the company had ironed out those nasty memory bugs after the 2023 CitrixBleed fiasco—CVE-2023-4966, remember? That one bled session tokens everywhere, fueling massive breaches. But here we are, March 2026, and another out-of-bounds read vulnerability, scored a brutal 9.3 on CVSS, lets unauthenticated attackers slurp sensitive data straight from appliance memory.

Systems set up as SAML Identity Providers? They’re wide open. Default configs dodge the bullet, but who runs defaults in SSO-land? Organizations everywhere lean on this for single sign-on magic.

Citrix’s advisory nails it: check your config for “add authentication samlIdPProfile” strings. If they pop up, you’re exposed—versions 14.1 before 66.59, 13.1 before 62.23, and those FIPS/NDcPP builds too. Cloud-managed by Citrix? Safe. On-prem customer rigs? Scramble.

How Did CVE-2026-3055 Sneak Past Defenses?

Look. Citrix spotted this internally during a security review—no external researcher glory here. No public PoC at launch on March 23. But by March 29, watchTowr Labs dissects it technically. March 30: CISA slaps it on the Known Exploited Vulnerabilities list, citing active attacks. March 31: Metasploit module drops, ready to rumble.

That’s warp speed—from advisory to weaponized. Why? Simple architecture flaw in SAML IDP handling triggers the out-of-bounds read. Attackers craft packets, memory spills secrets—keys, tokens, whatever’s floating there. It’s not RCE, but info leaks fuel chains to worse.

And here’s my take, one you won’t find in the advisories: this isn’t CitrixBleed redux; it’s evolution. Bleed hit session handling broadly. This targets SAML IDP, now table stakes for federated identity in hybrid clouds. Enterprises chasing zero-trust dreams via SSO gateways just handed attackers a skeleton key. Bold prediction—expect nation-states to hoard this for espionage, not just script kiddies.

Citrix’s PR spins it as ‘internal find, patch quick’—fair, but why another memory oopsie? Their appliance code begs for fuzzing love, or better, memory-safe langs. Rust could’ve neutered this clan of bugs years ago.

“The vulnerability allows unauthenticated remote attackers to leak potentially sensitive information from the appliance’s memory.”

That’s straight from Citrix’s CTX696300 advisory—dry words masking panic potential.

Exploitation evidence? CISA doesn’t fib. Metasploit module confirms: send malformed SAML traffic, harvest the dump. No auth needed. Rapid7’s tools already scan for it in InsightVM et al., post-March 26 release.

But wait—only SAML IDP configs. So, inventory time: grep those profiles, stat your versions. Patches landed: 14.1-66.59, 13.1-62.23, 13.1-37.262 for the hardened ones. Emergency upgrade, stat.

Why Does CVE-2026-3055 Matter More Than the Last One?

Short answer: ubiquity. NetScaler ADC and Gateway guard perimeters everywhere—load balancing, VPNs, app firewalls. SAML SP or IDP? Check. Modern auth stacks scream for it: Okta, Azure AD integrations galore.

Picture this sprawl: a Fortune 500’s IdP proxying auth for internal apps, exposed to the net. Attacker sniffs memory, grabs service account creds or session artifacts. Pivot city. We’ve seen it—Bleed led to LockBit ransomware parties. This? Faster fuse, thanks to Metasploit.

Organizations dawdling on patches? CISA’s KEV means feds mandate fixes. Compliance whack incoming. And attackers? They’re not waiting for your weekend maintenance window.

Here’s the deeper why: architectural rot. Gateways like NetScaler evolved from hardware beasts to software sprawl, piling features without refactoring core. SAML IDP bolted on years back, same leaky C-code under the hood. Shift needed—containerize, microservices, memory safety. Or watch history loop.

One-punch para: Patch. Now.

Is Your Citrix NetScaler Vulnerable to CVE-2026-3055?

Run show authentication samlIdPProfile on your CLI. Nothing? Breathe. Hits? Version check, then upgrade. Tools like Rapid7’s Exposure Command flag it authenticated-style.

No cloud worries if Citrix-managed. But self-hosted? You’re the firewall.

watchTowr’s analysis (March 29) details the trigger: crafted POST to SAML endpoint, oversized params overflow buffers. PoC-free at advisory time, but Metasploit fills the gap.

Enterprise ripple: scan chains. If NetScaler’s your IdP, downstream apps inherit risks. Rotate keys if leaked—assume breach.

Citrix learned? Patches prove yes, but track record screams ‘fragile.’ Compare to Ivanti’s zero-days or SolarWinds piles—appliance vendors chase features, lag security.

SAML IDP setups aren’t niche; they’re the SSO spine. This vuln shifts the game: perimeter auth can’t be an afterthought.

Final nudge: if you’re on affected versions, script the check across your fleet. Air-gapped? Still risky via supply chain.


🧬 Related Insights

Frequently Asked Questions

What is CVE-2026-3055 in Citrix NetScaler?

Critical out-of-bounds read letting attackers leak memory from SAML IDP-configured NetScaler ADC/Gateway appliances. CVSS 9.3, now exploited.

How to patch CVE-2026-3055 on NetScaler?

Upgrade to 14.1-66.59, 13.1-62.23, or 13.1-37.262. Check configs for samlIdPProfile first.

Is CVE-2026-3055 being exploited in the wild?

Yes—CISA KEV-listed March 30, 2026, with Metasploit module available.

Sarah Chen
Written by

AI research editor covering LLMs, benchmarks, and the race between frontier labs. Previously at MIT CSAIL.

Frequently asked questions

What is CVE-2026-3055 in Citrix NetScaler?
Critical out-of-bounds read letting attackers leak memory from SAML IDP-configured NetScaler ADC/Gateway appliances. CVSS 9.3, now exploited.
How to patch CVE-2026-3055 on NetScaler?
Upgrade to 14.1-66.59, 13.1-62.23, or 13.1-37.262. Check configs for samlIdPProfile first.
Is CVE-2026-3055 being exploited in the wild?
Yes—CISA KEV-listed March 30, 2026, with Metasploit module available.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by Rapid7 Blog

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.