Zero Day Monitor
DashboardVulnerabilitiesTrendingZero-DaysNews
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
1291 articles · 106377 vulns · 36/55 feeds (7d)
← Back to list
9.3
CVE-2026-3055

Insufficient input validation in NetScaler ADC and NetScaler Gateway when configured as a SAML IDP leading to memory overread

Description

Customers can determine if they have an appliance configured as a SAML IDP Profile by inspecting their NetScaler Configuration for the specified string: add authentication samlIdPProfile .*

Affected Products

VendorProductVersions
CitrixNetScaler ADC and NetScaler Gateway14.1 before 14.1-66.59, 13.1 before 13.1-62.23, 13.1-FIPS before 13.1-37.262, 13.1-NDcPP before 13.1-37.262, 13.1-62.23 or newer, 13.1-FIPS and 13.1-NDcPP 13.1.37.262 or newer

References

  • https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX696300

Related News (6 articles)

Tier D
SecurityWeek1d ago
Critical Citrix NetScaler Vulnerability Poised for Exploitation, Security Firms Warn
→ No new info (linked only)
Tier D
The Hacker News1d ago
Citrix Urges Patching Critical NetScaler Flaw Allowing Unauthenticated Data Leaks
→ No new info (linked only)
Tier C
Rapid7 Blog1d ago
CVE-2026-3055: Citrix NetScaler ADC and NetScaler Gateway Out-of-Bounds Read
→ No new info (linked only)
Tier D
Heise Security1d ago
Kritische Sicherheitslücke in Citrix Gateway und Netscaler ADC
→ No new info (linked only)
Tier B
CCCS Canada1d ago
Citrix security advisory (AV26-267)
→ No new info (linked only)
Tier B
CERT-FR2d ago
Multiples vulnérabilités dans les produits Citrix (23 mars 2026)
→ No new info (linked only)
CVSS 3.19.3 CRITICAL
CISA KEV❌ No
Actively exploited✅ Yes
CWECWE-125
Published3/23/2026
Last enriched1h agov7
Tags
CVE-2026-4368
Trending Score48
Source articles10
Independent4
Info Completeness10/14
Missing: epss, kev, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Pin to Dashboard

Verification

State: verified
Confidence: 100%

Version History

v7
Last enriched 1h ago
v7Tier D1h ago

Added detailed description on how to check for SAML IDP configuration and included a new CVE tag for CVE-2026-4368.

description
via SecurityWeek
v6Tier D2h ago

Updated vendor to Cloud Software Group, added new affected versions, changed severity to HIGH for CVE-2026-4368, and included new patch information.

affectedVersionstags
via Heise Security
v5Tier C2h ago

Updated patch available information to include specific fixed version numbers for affected products.

patchAvailable
via Rapid7 Blog
v4Tier C2h ago

Updated description with detailed technical information and changed severity from HIGH to CRITICAL.

descriptionseveritypatchAvailable
via Rapid7 Blog
v3Tier C2h ago

Updated severity from NONE to HIGH, marked exploit as available, and noted that the vulnerability is actively exploited.

severityexploitAvailableactivelyExploited
via Rapid7 Blog
v2Tier C2h ago

Updated vendor and product information, added critical severity and CVSS score of 9.3, and specified affected versions along with patch details.

vendorproductaffectedVersionscvssEstimatepatchAvailable
via Rapid7 Blog
v110h ago

Initial creation