Insufficient Input Validation in NetScaler ADC and Gateway by Citrix
CVE-2026-3055
Key Information:
Badges
What is CVE-2026-3055?
CVE-2026-3055 is a vulnerability affecting the NetScaler ADC and NetScaler Gateway products by Citrix, particularly when these systems are configured to serve as Security Assertion Markup Language (SAML) Identity Providers (IdP). This issue arises from insufficient input validation, which can lead to a memory overread condition. Such a flaw allows an attacker to manipulate input data in a way that could unintentionally disclose sensitive information from memory, potentially leading to unauthorized access to confidential data. Given the pivotal role these systems play in managing and securing network traffic, the exploitation of this vulnerability could severely compromise an organization’s security posture, allowing malicious actors to retrieve sensitive configuration data or credentials stored in memory.
Potential Impact of CVE-2026-3055
-
Data Exposure: The primary risk associated with this vulnerability is the potential for undisclosed sensitive data to be read from memory. This could include access tokens, user credentials, or other critical information that can be utilized for further attacks.
-
Unauthorized Access: With the capability to exploit insufficient input validation, attackers could gain unauthorized access to systems or networks. This access might facilitate the execution of other malicious activities, including data manipulation or installation of further malicious software.
-
Increased Attack Surface: Organizations leveraging NetScaler as a SAML IdP may face an increased attack surface due to this vulnerability. The potential for an exploit to be executed could lead to cascading security failures, making it essential for organizations to implement immediate security measures and patching protocols to safeguard against exploitation.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
ADC 14.1 < 66.59
ADC 13.1 < 62.23
ADC 13.1 FIPS and NDcPP < 37.262
References
CVSS V4
Timeline
- 📈
Vulnerability started trending
Vulnerability published
Vulnerability Reserved