**Critical Citrix Vulnerabilities Exposed: Patch Your NetScaler Appliances Now**

Citrix, a leading provider of networking and security solutions, has released a critical security bulletin addressing two new vulnerabilities in its NetScaler Application Delivery Controller (ADC) and NetScaler Gateway. The flaws, tracked as CVE-2026-3055 and CVE-2026-4368, have been rated as critical and high-severity respectively, and affect various configurations of these products.

The first vulnerability, CVE-2026-3055, is a critical out-of-bounds read with a severity score (CVSS v4.0) of 9.3. This flaw allows an unauthenticated remote attacker to leak potentially sensitive information from the appliance's memory if exploited. The vulnerability affects only NetScaler systems explicitly configured as a SAML Identity Provider (SAML IDP), and customers can determine if they have an appliance configured as such by inspecting their NetScaler Configuration.

Citrix has also released a Global Deny List feature in its 14.1-60.52 versions, which provides a method of adopting an instant-on patch to a running NetScaler without requiring a reboot. This feature is particularly useful for customers who cannot apply patches immediately due to maintenance windows or other constraints. Cloud Software Group strongly urges affected customers to install the relevant updated versions as soon as possible, which include:

* NetScaler ADC and NetScaler Gateway version 14.1-60.52 * Global Deny List signatures for mitigating CVE 2026-3055

**Understanding the Vulnerabilities**

CVE-2026-3055 is a critical out-of-bounds read flaw that affects NetScaler systems explicitly configured as a SAML Identity Provider (SAML IDP). This vulnerability allows an unauthenticated remote attacker to leak potentially sensitive information from the appliance's memory if exploited.

On the other hand, CVE-2026-4368 is a race condition flaw with a severity score of 7.7. This vulnerability affects NetScaler ADC and NetScaler Gateway version 14.1-66.54 if NetScaler is configured as Gateway (SSL VPN, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server.

**Mitigation Strategies**

To mitigate these vulnerabilities, customers can follow the instructions provided by Citrix:

* For CVE-2026-3055: * Customers should inspect their NetScaler Configuration to determine if they have an appliance configured as a SAML IDP Profile. * If affected, customers should install the relevant updated versions of NetScaler ADC and NetScaler Gateway. * Alternatively, customers can use the Global Deny List feature to mitigate CVE 2026-3055 on affected appliances. * For CVE-2026-4368: * Customers should inspect their NetScaler Configuration to determine if they have an appliance configured as a Gateway (SSL VPN, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server. * If affected, customers should install NetScaler ADC and NetScaler Gateway version 14.1-66.59 to apply the patch.

**Conclusion**

Citrix has released critical security patches for its NetScaler appliances due to two new vulnerabilities, CVE-2026-3055 and CVE-2026-4368. These flaws have been rated as critical and high-severity respectively, and affect various configurations of these products. Affected customers are advised to install the relevant updated versions as soon as possible to prevent potential data breaches and security incidents.

**Recommendations**

To stay ahead of emerging threats, we recommend that all organizations follow best practices for vulnerability management, including:

* Regularly updating and patching software and systems * Conducting thorough risk assessments and penetration testing * Implementing robust incident response and disaster recovery plans

By taking proactive measures to address these vulnerabilities, organizations can minimize their attack surface and ensure the security of their sensitive data.