Citrix urges admins to patch NetScaler flaws as soon as possible
好的,我现在需要帮用户总结一篇文章,控制在100字以内,而且不需要用“文章内容总结”之类的开头。首先,我得仔细阅读这篇文章,理解其主要内容。 文章讲的是Citrix修补了两个影响NetScaler ADC和Gateway的漏洞。其中一个漏洞CVE-2026-3055可能导致内存溢出,攻击者可以窃取敏感信息。另一个漏洞CVE-2026-4368可能引发会话混乱。Citrix已经发布了更新版本,并提供了修复指导。此外,有超过3万的NetScaler实例暴露在线上,但目前还不清楚有多少已经被修复。 接下来,我需要提取关键信息:修补了两个漏洞、影响的设备、漏洞可能导致的问题、Citrix的建议以及暴露的设备数量。然后把这些信息浓缩成一句话,不超过100字。 可能的结构是:Citrix修补了两个漏洞,影响NetScaler设备,可能导致内存溢出和会话混乱,建议用户尽快更新,并指出有大量设备暴露在线上。 最后检查字数是否符合要求,并确保表达清晰简洁。 </think> Citrix修补了影响NetScaler ADC和Gateway的两个安全漏洞,其中一个可能导致内存溢出并窃取敏感信息。建议用户尽快安装更新以应对潜在攻击。 2026-3-25 16:0:24 Author: www.bleepingcomputer.com(查看原文) 阅读量:2 收藏

Citrix

Citrix has patched two vulnerabilities affecting NetScaler ADC networking appliances and NetScaler Gateway secure remote access solutions, one of which is very similar to the CitrixBleed and CitrixBleed2 flaws exploited in zero-day attacks in recent years.

The critical security bug (tracked as CVE-2026-3055) stems from insufficient input validation, which can lead to a memory overread on Citrix ADC or Citrix Gateway appliances configured as a SAML identity provider (IDP), potentially enabling remote attackers without privileges to steal sensitive information such as session tokens.

"Cloud Software Group strongly urges affected customers of NetScaler ADC and NetScaler Gateway to install the relevant updated versions as soon as possible," the company warned in a Monday advisory.

Citrix has also shared detailed guidance on how to identify and patch NetScaler instances vulnerable to CVE-2026-3055.

The company also patched the CVE-2026-4368 vulnerability affecting appliances configured as Gateways (SSL VPN, ICA Proxy, CVPN, RDP proxy) or AAA virtual servers, which can enable threat actors with low privileges on the targeted system to exploit a race condition in low-complexity attacks, potentially leading to user session mix-ups.

The two flaws affect NetScaler ADC and NetScaler Gateway versions 13.1 and 14.1 (fixed in 13.1-62.23 and 14.1-66.59) and NetScaler ADC 13.1-FIPS and 13.1-NDcPP (addressed in 13.1-37.262).

Internet security watchdog group Shadowserver is currently tracking over 30,000 NetScaler ADC instances and more than 2,300 Gateway instances exposed online. However, there is currently no information regarding how many of them are using vulnerable configurations or have already been patched against attacks.

Citrix NetScaler ADC instances exposed online
Citrix NetScaler ADC instances exposed online (Shadowserver)

Since Citrix released security updates to address the vulnerability, multiple cybersecurity companies have warned that it's critical to secure NetScaler against attacks targeting CVE-2026-3055.

Many of them have also pointed out obvious similarities to the CitrixBleed and CitrixBleed2 out-of-bounds memory-read vulnerabilities exploited in zero-day attacks in recent years.

"Unfortunately, many will recognise this as sounding similar to the widely exploited 'CitrixBleed' vulnerability from 2023 and the subsequent 'CitrixBleed2' variant disclosed in 2025, both of which were and continue to be actively leveraged in real-world attacks," cybersecurity company watchTowr said.

"Although Citrix states that the vulnerability was identified internally, it is reasonable to expect that threat actors will attempt to reverse engineer the patch to develop exploit capabilities."

"Exploitation of CVE-2026-3055 is likely to occur once exploit code becomes public. Therefore, it is crucial that customers running affected Citrix systems remediate this vulnerability as soon as possible; Citrix software has previously seen memory leak vulnerabilities broadly exploited in the wild, including the infamous 'CitrixBleed' vulnerability, CVE-2023-4966, in 2023," Rapid7 added.

In August 2025, CISA flagged CitrixBleed2 as actively exploited and gave federal agencies a single day to secure their systems. In total, the U.S. cybersecurity agency has tagged 21 Citrix vulnerabilities as exploited in the wild, seven of which were used in ransomware attacks.

tines

Red Report 2026: Why Ransomware Encryption Dropped 38%

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.


文章来源: https://www.bleepingcomputer.com/news/security/citrix-urges-admins-to-patch-netscaler-flaws-as-soon-as-possible/
如有侵权请联系:admin#unsafe.sh