top of page
Search

Zero-Day Security Alert — March 31, 2026: Citrix NetScaler Actively Exploited Memory Overread

  • Writer: Jacob Hughes
    Jacob Hughes
  • Mar 31
  • 1 min read

Daily Security Briefing

March 31, 2026

CVE-2026-3055 | CVSS 9.3 | CRITICAL Severity | Actively Exploited (CISA KEV)

Affected Product

Citrix NetScaler ADC and NetScaler Gateway (all versions when configured as a SAML Identity Provider)

Description

An out-of-bounds read vulnerability exists in Citrix NetScaler ADC and NetScaler Gateway when configured as a SAML Identity Provider (IDP). Insufficient input validation allows an unauthenticated remote attacker to trigger a memory overread, potentially exposing sensitive data from server memory. This vulnerability is confirmed to be actively exploited in the wild and has been added to the CISA Known Exploited Vulnerabilities catalog.

Attack Vector

Network-based. No authentication or user interaction is required. The attacker sends crafted requests to a NetScaler appliance configured as a SAML IDP. Attack complexity is low. The vulnerability can be exploited remotely by any unauthenticated attacker who can reach the appliance over the network.

Remediation

Apply the vendor-supplied patch immediately. Citrix has published remediation guidance in advisory CTX696300 at support.citrix.com. Organizations using NetScaler ADC or Gateway as a SAML IDP should prioritize patching. If immediate patching is not possible, consider temporarily disabling the SAML IDP configuration until the update can be applied. Review logs for indicators of exploitation.

CISA Remediation Due Date: April 2, 2026

This report is generated automatically from NVD and CISA KEV data.

Recent Posts

See All

Comments


Contact

3056 S Camino Lagos

Grand Prairie, TX 75054

info@zilllabs.com

Be in the Know

Be notified of product additions, feature updates, promotions, and news/articles.  No spam. No selling. No sharing.

Follow us on

© 2026 by Zill IT Labs, LLC

bottom of page