<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-4368 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-4368/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 01 Apr 2026 08:44:01 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-4368/feed.xml" rel="self" type="application/rss+xml"/><item><title>Critical Vulnerabilities in NetScaler ADC and Gateway Allow Sensitive Data Exposure and Session Hijacking</title><link>https://feed.craftedsignal.io/briefs/2026-04-netscaler-vulns/</link><pubDate>Wed, 01 Apr 2026 08:44:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-netscaler-vulns/</guid><description>Unauthenticated attackers can exploit CVE-2026-3055 (out-of-bounds read) to exfiltrate sensitive data from NetScaler ADC and Gateway, while CVE-2026-4368 (race condition) enables user session hijacking, necessitating immediate patching and enhanced monitoring.</description><content:encoded><![CDATA[<p>Citrix NetScaler ADC and Gateway are affected by two critical vulnerabilities, CVE-2026-3055 and CVE-2026-4368. CVE-2026-3055 is an out-of-bounds read vulnerability that allows an unauthenticated attacker to read arbitrary memory content. This could lead to the exfiltration of sensitive data like credentials and session tokens. CVE-2026-4368 is a race condition vulnerability that can lead to user session mix-up, potentially allowing one user to access another user&rsquo;s session. CISA has added CVE-2026-3055 to its Known Exploited Vulnerabilities catalog, indicating active exploitation in the wild as of March 30, 2026. The affected versions include NetScaler ADC and NetScaler Gateway 14.1 before 14.1-66.59, 13.1 before 13.1-62.23, and NetScaler ADC FIPS and NDcPP before 13.1-37.262. Defenders should prioritize patching and closely monitor affected systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a specially crafted request to a vulnerable NetScaler ADC or Gateway configured as a SAML IDP (for CVE-2026-3055).</li>
<li>Due to insufficient input validation, the appliance attempts to read memory beyond the allocated buffer.</li>
<li>The out-of-bounds read allows the attacker to access sensitive information stored in memory, such as session tokens, credentials, or other confidential data.</li>
<li>The attacker exfiltrates the gleaned sensitive information via network communication.</li>
<li>For CVE-2026-4368, multiple users attempt to authenticate to a NetScaler ADC or Gateway configured as a Gateway or AAA virtual server.</li>
<li>A race condition occurs during session creation or management.</li>
<li>One user&rsquo;s session is incorrectly associated with another user&rsquo;s account.</li>
<li>The attacker gains unauthorized access to another user&rsquo;s session, potentially performing actions on their behalf or accessing sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-3055 allows attackers to steal sensitive information, potentially leading to account compromise, data breaches, and further unauthorized access to internal resources. CVE-2026-4368 can lead to unauthorized access to user accounts, potentially exposing sensitive data or enabling malicious activities under the guise of a legitimate user. Given that CISA has confirmed active exploitation of CVE-2026-3055, organizations using affected NetScaler products are at immediate risk. The impact spans across all sectors utilizing these products for application delivery and secure access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately patch NetScaler ADC and Gateway to the latest versions: 14.1-66.59 or later, 13.1-62.23 or later, and 13.1-37.262 or later for FIPS and NDcPP to remediate CVE-2026-3055 and CVE-2026-4368 as described in the Citrix advisory (<a href="https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX696300">https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX696300</a>).</li>
<li>Deploy the Sigma rule <code>Detect Netscaler CVE-2026-3055 GET Request</code> to identify potential exploitation attempts of CVE-2026-3055 based on suspicious HTTP GET requests targeting the SAML IDP.</li>
<li>Enable and review NetScaler audit logs for unusual authentication patterns or session activity that could indicate exploitation of CVE-2026-4368.</li>
<li>Monitor web server logs for HTTP requests with abnormally long URIs, which may be indicative of attempts to trigger the out-of-bounds read in CVE-2026-3055.</li>
<li>Apply the Sigma rule <code>Detect Netscaler CVE-2026-4368 POST Request</code> to identify potential exploitation attempts of CVE-2026-4368 based on suspicious HTTP POST requests targeting the Gateway or AAA virtual server</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>netscaler</category><category>cve-2026-3055</category><category>cve-2026-4368</category><category>out-of-bounds read</category><category>race condition</category><category>memory corruption</category><category>session hijacking</category></item></channel></rss>