CVE-2026-3055
Published: 23 March 2026
Description
Insufficient input validation in NetScaler ADC and NetScaler Gateway when configured as a SAML IDP leading to memory overread
Mitigating Controls (NIST 800-53 r5)AI
Directly enforces comprehensive input validation mechanisms to prevent memory overreads from malformed SAML inputs in NetScaler ADC/Gateway.
Implements security safeguards to protect system memory from unauthorized access, directly mitigating the memory overread vulnerability.
Requires identification, reporting, and correction of flaws like this CVE through timely patching as per vendor advisory.
Security SummaryAI
CVE-2026-3055 is a critical vulnerability (CVSS 9.8, CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) stemming from insufficient input validation in NetScaler ADC and NetScaler Gateway when configured as a SAML Identity Provider (IDP), leading to a memory overread classified under CWE-125. Published on 2026-03-23, it affects these Citrix components in the specified configuration.
The vulnerability enables remote attackers to exploit it with low complexity, requiring no privileges, user interaction, or special conditions. Exploitation results in high impacts across confidentiality, integrity, and availability, potentially allowing attackers to read sensitive memory contents and disrupt system operations.
Mitigation details are outlined in the official Citrix advisory at CTX696300. Further technical analysis appears in Watchtower Labs' coverage, and the vulnerability is included in CISA's Known Exploited Vulnerabilities catalog.
Details
- CWE(s)
- KEV Date Added
- 30 March 2026
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is a remotely exploitable flaw in a public-facing NetScaler ADC/Gateway SAML IDP with no privileges required, directly enabling T1190: Exploit Public-Facing Application.