DEV Community

Cover image for Critical Memory Leak and Session Hijacking Vulnerabilities Patched in Citrix NetScaler
BeyondMachines for BeyondMachines

Posted on • Originally published at beyondmachines.net

Critical Memory Leak and Session Hijacking Vulnerabilities Patched in Citrix NetScaler

Summary

Citrix patched a critical memory overread (CVE-2026-3055) and a high-severity session-swapping race condition (CVE-2026-4368) in NetScaler ADC and Gateway. These vulnerabilities allow unauthenticated attackers to leak sensitive memory data or hijack user sessions in environments configured for SAML or VPN services.

Take Action:

If possible, make sure your NetScaler ADC and Gateway appliances are isolated from the internet and accessible from trusted networks only. Them plan a quick update. If you can't isolate from the internet, this is urgent. Update the firmware to the fixed versions (14.1-66.59, 13.1-62.23, or 13.1-37.262 for FIPS/NDcPP). Attackers have previously exploited similar flaws via the CitrixBleed exploit.


Read the full article on BeyondMachines


This article was originally published on BeyondMachines

Top comments (0)