Overview
CVE-2026-3055 is a memory overread vulnerability in Citrix NetScaler ADC and NetScaler Gateway. The flaw is caused by insufficient input validation when the appliance is configured as a SAML Identity Provider (IDP), leading to an out-of-bounds read (CWE-125) that discloses sensitive process memory — including session tokens and authentication credentials — to unauthenticated remote attackers. This vulnerability has been compared to "CitrixBleed" due to its similar exploitation pattern and devastating impact.
Active Exploitation & "CitrixBleed 3" Comparisons
This CVE was added to CISA KEV on March 30, 2026 — one week after publication on March 23 — with an unusually aggressive 3-day remediation deadline of April 2, 2026. This extremely short deadline signals the severity and urgency that CISA attributes to active exploitation.
/saml/login and /wsfed/passive endpoints.
Why This Is So Dangerous
- Unauthenticated, remote exploitation: No credentials, no user interaction — just a single HTTP request can trigger memory disclosure.
- Session token theft: Leaked memory contains active administrative session IDs, enabling full appliance takeover.
- Multiple vulnerable endpoints: watchTowr Labs identified at least two distinct memory overread paths
(
/saml/loginand/wsfed/passive?wctx) patched under this single CVE ID. - Historical pattern: This follows the same exploitation pattern as the original CitrixBleed (CVE-2023-4966) and CitrixBleed 2 (CVE-2025-5777), making this effectively "CitrixBleed 3".
- Critical infrastructure exposure: NetScaler ADC and Gateway appliances sit at the network edge, providing VPN, load balancing, and authentication services for enterprise environments.
Vulnerability Description
Insufficient input validation in NetScaler ADC and NetScaler Gateway when configured as a SAML IDP leading to memory overread.
The root cause is an out-of-bounds read (CWE-125) triggered when specific SAML/WS-Federation
endpoints process requests with missing or malformed parameter values. When a query string parameter
(such as wctx) is present but has no associated value, the application checks only for the
parameter's presence rather than verifying that valid data exists. It then accesses a buffer
that points to uninitialized or freed memory, causing kilobytes of process memory to be disclosed
to the attacker — base64-encoded in response cookies.
The leaked memory is highly dynamic and can contain active session tokens, authentication credentials, HTTP request data from other users, and internal configuration details. An attacker can repeatedly send requests to harvest different memory regions, eventually obtaining administrative session IDs that grant full control of the appliance.
Affected Products & Versions
This vulnerability affects customer-managed NetScaler ADC and NetScaler Gateway appliances configured as a SAML Identity Provider. Citrix-managed cloud services and Citrix-managed Adaptive Authentication are not affected (Cloud Software Group applies updates to those automatically).
NetScaler ADC & NetScaler Gateway
| Product / Branch | Affected Versions |
|---|---|
| NetScaler ADC & Gateway 14.1 | Before 14.1-60.58 |
| NetScaler ADC & Gateway 13.1 | Before 13.1-62.23 |
| NetScaler ADC 13.1-FIPS | Before 13.1-37.262 |
| NetScaler ADC 13.1-NDcPP | Before 13.1-37.262 |
Vulnerable Endpoints
How to Check if You're Vulnerable
add authentication samlIdPProfile .*
If this configuration exists and your firmware version is older than the patched versions listed above, your appliance is vulnerable.
Exploitation Details
Exploitation of this vulnerability is trivially simple. A single unauthenticated HTTP GET request is sufficient to trigger a memory disclosure:
Attack Flow
- Attacker sends a crafted HTTP request to a vulnerable SAML/WS-Federation endpoint with a parameter present but missing its value.
- The NetScaler appliance reads beyond the intended buffer boundary (out-of-bounds read).
- Leaked process memory is returned to the attacker, base64-encoded in a response cookie
(
NSC_TASS). - The attacker repeats the request to harvest different memory regions, looking for session tokens and credentials.
- Once an administrative session ID is captured, the attacker uses it to authenticate as an administrator — gaining full control of the appliance.
What Attackers Can Obtain
- Administrative session IDs — full appliance takeover
- User authentication tokens — impersonate legitimate users
- HTTP request data from other sessions — including headers and cookies
- Internal configuration details — network topology information
- Memory heap data — potentially containing credentials and sensitive configuration
Impact
| Impact Area | Detail |
|---|---|
| Confidentiality | High — Disclosure of session tokens, credentials, and sensitive memory contents |
| Integrity | High — Stolen sessions enable full administrative control and configuration changes |
| Availability | High — Attacker with admin access can disrupt all services behind the appliance |
| Attack Vector | Network — remotely exploitable over the internet |
| Privileges Required | None — completely unauthenticated |
| User Interaction | None — no user action needed to trigger |
Mitigation & Remediation
Patched Versions
| Branch | Fixed Version |
|---|---|
| NetScaler ADC & Gateway 14.1 | 14.1-60.58 and later |
| NetScaler ADC & Gateway 14.1 (additional) | 14.1-66.59 and later |
| NetScaler ADC & Gateway 13.1 | 13.1-62.23 and later |
| NetScaler ADC 13.1-FIPS / NDcPP | 13.1-37.262 and later |
Recommended Actions
- Upgrade immediately to one of the patched firmware versions listed above.
- Rotate all session tokens and credentials after patching — leaked sessions may still be active.
- Review access logs for suspicious requests to
/saml/loginand/wsfed/passiveendpoints, particularly requests with parameters missing values. - If patching is not immediately possible: consider temporarily disabling the SAML IDP configuration if operationally feasible, or restrict network access to the SAML endpoints.
- Monitor CISA KEV Catalog for any updated guidance.
Post-Patch Verification
302 redirect with no NSC_TASS
cookie containing leaked memory. If your appliance still returns base64-encoded data in the
NSC_TASS cookie after patching, the update may not have been applied correctly.
Key Details
| Property | Value |
|---|---|
| CVE ID | CVE-2026-3055 |
| Vendor / Product | Citrix — NetScaler |
| NVD Published | 2026-03-23 |
| NVD Last Modified | 2026-03-31 |
| CVSS 3.1 Score | 9.8 |
| CVSS 3.1 Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| Severity | CRITICAL |
| CWE | CWE-125 |
| CISA KEV Added | 2026-03-30 |
| CISA KEV Deadline | 2026-04-02 |
| Known Ransomware Use | No |
CVSS 3.1 Breakdown
Required Action
Timeline
| Date | Event |
|---|---|
| 2026-03-23 | CVE published on NVD; Citrix Security Bulletin CTX696300 released |
| 2026-03-27 | watchTowr Labs observes in-the-wild exploitation from known threat actor IPs; Citrix updates advisory |
| 2026-03-29 | watchTowr Labs publishes Part 2 analysis revealing second vulnerable endpoint (/wsfed/passive) |
| 2026-03-30 | Added to CISA Known Exploited Vulnerabilities catalog |
| 2026-03-31 | NVD record last modified |
| 2026-04-02 | CISA BOD 22-01 remediation deadline |
References
| Resource | Type |
|---|---|
| NVD — CVE-2026-3055 | Vulnerability Database |
| CISA KEV Catalog Entry | US Government |
| Citrix Security Bulletin CTX696300 | Vendor Advisory |
| watchTowr Labs — CVE-2026-3055 Memory Overread Analysis (Part 1) | Security Research |
| watchTowr Labs — CVE-2026-3055 Memory Overread Analysis (Part 2) | Security Research |