Citrix NetScaler CVE-2026-3055 Critical Memory Overread Vulnerability
Summary
CISA added CVE-2026-3055 to the Known Exploited Vulnerabilities catalog. This critical memory overread vulnerability (CVSS 9.3) affects Citrix NetScaler ADC and Gateway when configured as SAML IDP. Affected versions include 14.1 before 66.59 and 13.1 before 62.23. CISA confirms active exploitation with automatable attack capability and total system impact potential.
What changed
CISA KEV catalog added CVE-2026-3055, a critical memory overread vulnerability in Citrix NetScaler ADC and Gateway when configured as SAML IDP. Insufficient input validation allows memory overread (CWE-125). CVSS 4.0 score is 9.3 (CRITICAL) with network-exploitable, low-complexity attack vector. Exploitation is confirmed active with total system impact potential.
Organizations running affected NetScaler versions must patch immediately to 14.1-66.59, 13.1-62.23, or later. Federal agencies should apply patches within 21 days per BOD 22-01 requirements. Given the active exploitation status and automatable attack vector, immediate remediation is critical regardless of organizational type.
What to do next
- Identify all NetScaler ADC and Gateway deployments configured as SAML IDP
- Check running versions against affected ranges (14.1 before 66.59, 13.1 before 62.23)
- Apply vendor patches to remediate CVE-2026-3055 immediately
Source document (simplified)
Required CVE Record Information
CNA: NetScaler
Description
Insufficient input validation in NetScaler ADC and NetScaler Gateway when configured as a SAML IDP leading to memory overread
CWE 1 Total
Learn more
- CWE-125: CWE-125 Out-of-bounds Read
CVSS 1 Total
Learn more
| Score | Severity | Version | Vector String |
| --- | --- | --- | --- |
| 9.3 | CRITICAL | 4.0 | CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L |
Product Status
Learn more Versions 3 Total
Default Status: unaffected
affected
affected from 14.1 before 66.59
affected from 13.1 before 62.23
affected from 13.1 FIPS and NDcPP before 37.262
Versions 2 Total
Default Status: unaffected
affected
affected from 14.1 before 66.59
affected from 13.1 before 62.23
References 1 Total
Authorized Data Publishers
CISA-ADP
Updated:
2026-03-31
SSVC and KEV, plus CVSS and CWE if not provided by the CNA.
SSVC 1 Total
Learn more
| Exploitation | Automatable | Technical Impact | Version | Date Accessed |
| --- | --- | --- | --- | --- |
| active | yes | total | 2.0.3 | 2026-03-23 |
KEV 1 Total
Learn more
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-3055 (2026-03-30)
Named provisions
Related changes
Source
Classification
Who this affects
Taxonomy
Browse Categories
Get Data Privacy & Cybersecurity alerts
Weekly digest. AI-summarized, no noise.
Free. Unsubscribe anytime.
Get alerts for this source
We'll email you when CISA Known Exploited Vulnerabilities (KEV) publishes new changes.