CVE-2026-3055 is a critical out-of-bounds read vulnerability affecting customer-managed NetScaler ADC and NetScaler Gateway appliances when configured as a SAML Identity Provider. Citrix assigns a CVSS v4.0 score of 9.3 and attributes the issue to insufficient input validation. An unauthenticated remote attacker can exploit this flaw to read sensitive data from appliance memory. Citrix released patches on March 23, 2026, and multiple reports indicate that exploitation activity has already begun.
Citrix describes CVE-2026-3055 as a memory overread vulnerability caused by improper input validation in NetScaler ADC and Gateway when operating as a SAML IdP.
The vulnerability does not require authentication or user interaction. An attacker can send crafted requests to a vulnerable appliance to trigger memory disclosure. Because the issue allows reading process memory, attackers may extract sensitive information such as session data or other credentials that can be used for follow-on access.
The exposure is configuration-dependent. Only systems configured as a SAML Identity Provider are affected. Citrix explicitly notes that Citrix-managed cloud services are not impacted.
The Rapid Response test in NodeZero is designed to help security teams answer the question that matters most: is this actually exploitable in our environment? For CVE-2026-3055, the test can be used to validate exposure before remediation and confirm the issue is no longer exploitable after the fix is applied.
Citrix has not published a formal list of indicators such as attacker IP addresses, file hashes, or filenames for CVE-2026-3055.
However, based on the exploit behavior described, defenders should monitor for:
Reports from security researchers indicate that repeated crafted requests can return different segments of memory, which may be used to extract sensitive data over time.
Affected:
Patch:
Citrix recommends verifying whether the system is configured as a SAML IdP by checking for the presence of SAML IdP profiles in the configuration.