<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-3055 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-3055/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 01 Apr 2026 08:44:01 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-3055/feed.xml" rel="self" type="application/rss+xml"/><item><title>Critical Vulnerabilities in NetScaler ADC and Gateway Allow Sensitive Data Exposure and Session Hijacking</title><link>https://feed.craftedsignal.io/briefs/2026-04-netscaler-vulns/</link><pubDate>Wed, 01 Apr 2026 08:44:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-netscaler-vulns/</guid><description>Unauthenticated attackers can exploit CVE-2026-3055 (out-of-bounds read) to exfiltrate sensitive data from NetScaler ADC and Gateway, while CVE-2026-4368 (race condition) enables user session hijacking, necessitating immediate patching and enhanced monitoring.</description><content:encoded><![CDATA[<p>Citrix NetScaler ADC and Gateway are affected by two critical vulnerabilities, CVE-2026-3055 and CVE-2026-4368. CVE-2026-3055 is an out-of-bounds read vulnerability that allows an unauthenticated attacker to read arbitrary memory content. This could lead to the exfiltration of sensitive data like credentials and session tokens. CVE-2026-4368 is a race condition vulnerability that can lead to user session mix-up, potentially allowing one user to access another user&rsquo;s session. CISA has added CVE-2026-3055 to its Known Exploited Vulnerabilities catalog, indicating active exploitation in the wild as of March 30, 2026. The affected versions include NetScaler ADC and NetScaler Gateway 14.1 before 14.1-66.59, 13.1 before 13.1-62.23, and NetScaler ADC FIPS and NDcPP before 13.1-37.262. Defenders should prioritize patching and closely monitor affected systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a specially crafted request to a vulnerable NetScaler ADC or Gateway configured as a SAML IDP (for CVE-2026-3055).</li>
<li>Due to insufficient input validation, the appliance attempts to read memory beyond the allocated buffer.</li>
<li>The out-of-bounds read allows the attacker to access sensitive information stored in memory, such as session tokens, credentials, or other confidential data.</li>
<li>The attacker exfiltrates the gleaned sensitive information via network communication.</li>
<li>For CVE-2026-4368, multiple users attempt to authenticate to a NetScaler ADC or Gateway configured as a Gateway or AAA virtual server.</li>
<li>A race condition occurs during session creation or management.</li>
<li>One user&rsquo;s session is incorrectly associated with another user&rsquo;s account.</li>
<li>The attacker gains unauthorized access to another user&rsquo;s session, potentially performing actions on their behalf or accessing sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-3055 allows attackers to steal sensitive information, potentially leading to account compromise, data breaches, and further unauthorized access to internal resources. CVE-2026-4368 can lead to unauthorized access to user accounts, potentially exposing sensitive data or enabling malicious activities under the guise of a legitimate user. Given that CISA has confirmed active exploitation of CVE-2026-3055, organizations using affected NetScaler products are at immediate risk. The impact spans across all sectors utilizing these products for application delivery and secure access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately patch NetScaler ADC and Gateway to the latest versions: 14.1-66.59 or later, 13.1-62.23 or later, and 13.1-37.262 or later for FIPS and NDcPP to remediate CVE-2026-3055 and CVE-2026-4368 as described in the Citrix advisory (<a href="https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX696300">https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX696300</a>).</li>
<li>Deploy the Sigma rule <code>Detect Netscaler CVE-2026-3055 GET Request</code> to identify potential exploitation attempts of CVE-2026-3055 based on suspicious HTTP GET requests targeting the SAML IDP.</li>
<li>Enable and review NetScaler audit logs for unusual authentication patterns or session activity that could indicate exploitation of CVE-2026-4368.</li>
<li>Monitor web server logs for HTTP requests with abnormally long URIs, which may be indicative of attempts to trigger the out-of-bounds read in CVE-2026-3055.</li>
<li>Apply the Sigma rule <code>Detect Netscaler CVE-2026-4368 POST Request</code> to identify potential exploitation attempts of CVE-2026-4368 based on suspicious HTTP POST requests targeting the Gateway or AAA virtual server</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>netscaler</category><category>cve-2026-3055</category><category>cve-2026-4368</category><category>out-of-bounds read</category><category>race condition</category><category>memory corruption</category><category>session hijacking</category></item><item><title>Citrix NetScaler ADC and Gateway CVE-2026-3055 Exploitation</title><link>https://feed.craftedsignal.io/briefs/2026-03-citrix-netscaler-cve-2026-3055/</link><pubDate>Tue, 31 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-citrix-netscaler-cve-2026-3055/</guid><description>Threat actors are actively exploiting CVE-2026-3055, a critical memory overread vulnerability in Citrix NetScaler ADC and NetScaler Gateway appliances configured as a SAML identity provider (IDP), to extract sensitive information, including authenticated administrative session IDs, potentially leading to full system takeover.</description><content:encoded><![CDATA[<p>A critical vulnerability, CVE-2026-3055, impacts Citrix NetScaler ADC and NetScaler Gateway appliances configured as SAML identity providers (IDP). Disclosed on March 23, 2026, and actively exploited since at least March 27, 2026, this flaw allows attackers to perform memory overreads via the <code>/saml/login</code> and <code>/wsfed/passive</code> endpoints. Successful exploitation enables the extraction of sensitive information, including authenticated administrative session IDs. The vulnerability affects versions…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>citrix</category><category>netscaler</category><category>cve-2026-3055</category><category>memory-overread</category><category>information-disclosure</category></item></channel></rss>