Vulnerability Description
Insufficient input validation in NetScaler ADC and NetScaler Gateway when configured as a SAML IDP leading to memory overread
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Citrix | Netscaler Application Delivery Controller | >= 13.1, < 13.1-37.262 |
| Citrix | Netscaler Gateway | >= 13.1, < 13.1-62.23 |
Related Weaknesses (CWE)
References
- https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX696300Vendor Advisory
- https://labs.watchtowr.com/please-we-beg-just-one-weekend-free-of-appliances-citExploitThird Party Advisory
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-US Government Resource
FAQ
What is CVE-2026-3055?
CVE-2026-3055 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Insufficient input validation in NetScaler ADC and NetScaler Gateway when configured as a SAML IDP leading to memory overread
How severe is CVE-2026-3055?
CVE-2026-3055 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-3055?
Check the references section above for vendor advisories and patch information. Affected products include: Citrix Netscaler Application Delivery Controller, Citrix Netscaler Gateway.