Zero Day Monitor
DashboardVulnerabilitiesTrendingZero-DaysNews
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
1401 articles · 106435 vulns · 36/55 feeds (7d)
← Back to list
9.3
CVE-2026-3055

Insufficient input validation in NetScaler ADC and NetScaler Gateway when configured as a SAML IDP leading to memory overread

Description

Customers can determine if they have an appliance configured as a SAML IDP Profile by inspecting their NetScaler Configuration for the specified string: add authentication samlIdPProfile .*

Affected Products

VendorProductVersions
CitrixNetScaler ADC and NetScaler Gateway14.1 before 14.1-66.59, 13.1 before 13.1-62.23, 13.1-FIPS before 13.1-37.262, 13.1-NDcPP before 13.1-37.262, 13.1-62.23 or newer, 13.1-FIPS and 13.1-NDcPP 13.1.37.262 or newer

References

  • https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX696300

Related News (5 articles)

Tier D
SecurityWeek1d ago
Critical Citrix NetScaler Vulnerability Poised for Exploitation, Security Firms Warn
→ No new info (linked only)
Tier C
Rapid7 Blog1d ago
CVE-2026-3055: Citrix NetScaler ADC and NetScaler Gateway Out-of-Bounds Read
→ No new info (linked only)
Tier D
Heise Security1d ago
Kritische Sicherheitslücke in Citrix Gateway und Netscaler ADC
→ No new info (linked only)
Tier B
CCCS Canada1d ago
Citrix security advisory (AV26-267)
→ No new info (linked only)
Tier B
CERT-FR2d ago
Multiples vulnérabilités dans les produits Citrix (23 mars 2026)
→ No new info (linked only)
CVSS 3.19.3 CRITICAL
CISA KEV❌ No
Actively exploited✅ Yes
CWECWE-125
Published3/23/2026
Last enriched3h agov7
Tags
CVE-2026-4368
Trending Score48
Source articles5
Independent5
Info Completeness10/14
Missing: epss, kev, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Pin to Dashboard

Verification

State: verified
Confidence: 100%

Version History

v7
Last enriched 3h ago
v7Tier D3h ago

Added detailed description on how to check for SAML IDP configuration and included a new CVE tag for CVE-2026-4368.

description
via SecurityWeek
v6Tier D3h ago

Updated vendor to Cloud Software Group, added new affected versions, changed severity to HIGH for CVE-2026-4368, and included new patch information.

affectedVersionstags
via Heise Security
v5Tier C3h ago

Updated patch available information to include specific fixed version numbers for affected products.

patchAvailable
via Rapid7 Blog
v4Tier C4h ago

Updated description with detailed technical information and changed severity from HIGH to CRITICAL.

descriptionseveritypatchAvailable
via Rapid7 Blog
v3Tier C4h ago

Updated severity from NONE to HIGH, marked exploit as available, and noted that the vulnerability is actively exploited.

severityexploitAvailableactivelyExploited
via Rapid7 Blog
v2Tier C4h ago

Updated vendor and product information, added critical severity and CVSS score of 9.3, and specified affected versions along with patch details.

vendorproductaffectedVersionscvssEstimatepatchAvailable
via Rapid7 Blog
v112h ago

Initial creation