Citrix Urges Patching Critical NetScaler Flaw Allowing Unauthenticated Data Leaks
好的,用户让我总结一篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”之类的开头。首先,我需要通读整篇文章,抓住主要信息。 文章讲的是Citrix发布了安全更新,修复了NetScaler ADC和Gateway中的两个漏洞。一个是CVE-2026-3055,CVSS评分9.3,属于严重漏洞,可能导致内存溢出读取,进而泄露敏感数据。另一个是CVE-2026-4368,评分7.7,涉及竞态条件导致用户会话混乱。 接下来,Rapid7指出CVE-2026-3055可以让未认证的远程攻击者读取内存中的敏感信息。但只有当设备配置为SAML身份提供商时才受影响,默认配置没问题。而CVE-2026-4368则需要设备作为网关或AAA服务器。 漏洞影响了多个版本的NetScaler产品,建议用户尽快更新。虽然目前没有被利用的证据,但过去Citrix设备曾多次被攻击者利用,所以这次也需要重视。 最后,专家警告说这个漏洞类似于之前的Citrix Bleed事件,可能很快被利用,必须立即修补。 总结的时候要简洁明了,涵盖漏洞名称、影响、配置要求和建议措施。控制在100字以内。 </think> Citrix修复了NetScaler ADC和Gateway中的两个安全漏洞:CVE-2026-3055(CVSS 9.3)可能导致内存溢出读取敏感数据;CVE-2026-4368(CVSS 7.7)可能导致用户会话混乱。前者需设备配置为SAML身份提供商,默认配置不受影响;后者需设备作为网关或AAA服务器。建议用户尽快更新以防范潜在攻击。 2026-3-24 05:59:0 Author: thehackernews.com(查看原文) 阅读量:6 收藏

Vulnerability / Enterprise Security

Citrix has released security updates to address two vulnerabilities in NetScaler ADC and NetScaler Gateway, including a critical flaw that could be exploited to leak sensitive data from the application.

The vulnerabilities are listed below -

  • CVE-2026-3055 (CVSS score: 9.3) - Insufficient input validation leading to memory overread
  • CVE-2026-4368 (CVSS score: 7.7) - Race condition leading to user session mixup

Cybersecurity company Rapid7 said that CVE-2026-3055 refers to an out-of-bounds read that could be exploited by unauthenticated remote attackers to leak potentially sensitive information from the appliance's memory.

However, for exploitation to be successful, the Citrix ADC or Citrix Gateway appliance must be configured as a SAML Identity Provider (SAML IDP), which means default configurations are unaffected. To determine if the device has been configured as a SAML IDP Profile, Citrix is urging customers to inspect their NetScaler Configuration for the specified string: "add authentication samlIdPProfile .*"

CVE-2026-4368, on the other hand, requires the appliance to be configured as a gateway (i.e., SSL VPN, ICA Proxy, CVPN, and RDP Proxy) or an Authentication, Authorization, and Accounting (AAA) server. Customers can check the NetScaler Configuration to ascertain if their devices have been configured as either of the nodes -

  • AAA virtual server - add authentication vserver .*
  • Gateway - add vpn vserver .*

The vulnerabilities affect NetScaler ADC and NetScaler Gateway versions 14.1 before 14.1-66.59 and 13.1 before 13.1-62.23, as well as NetScaler ADC 13.1-FIPS and 13.1-NDcPP before 13.1-37.262. Users are advised to apply the latest updates as soon as possible for optimal protection.

While there is no evidence that the shortcomings have been exploited in the wild, security flaws in NetScaler devices have been repeatedly exploited by threat actors (CVE-2023-4966, aka Citrix Bleed, CVE-2025-5777, aka Citrix Bleed 2, CVE-2025-6543, and CVE-2025-7775), making it imperative that users take steps to update their instances.

"CVE-2026-3055 allows unauthenticated attackers to leak and read sensitive memory from NetScaler ADC deployments. If it sounds familiar, it's because it is – this vulnerability sounds suspiciously similar to Citrix Bleed and Citrix Bleed 2, which continue to represent a trauma event for many," watchTowr CEO and founder Benjamin Harris told The Hacker News.

"NetScalers are critical solutions that have been continuously targeted for initial access into enterprise environments. While the advisory just went live, defenders need to act quickly. Anyone running impacted versions needs to patch urgently. Imminent exploitation is highly likely."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/03/citrix-urges-patching-critical.html
如有侵权请联系:admin#unsafe.sh