<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[➡️ CVE-2026-3055 👀 👇 https:&#x2F;&#x2F;support.citrix.com&#x2F;support-home&#x2F;kbsearch&#x2F;article?articleNumber=CTX696300]]></title><description><![CDATA[<p><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/27a1.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--arrow_right" style="height:23px;width:auto;vertical-align:middle" title="➡" alt="➡" />️ CVE-2026-3055 <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f440.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--eyes" style="height:23px;width:auto;vertical-align:middle" title="👀" alt="👀" /> <br /><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f447.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--point_down" style="height:23px;width:auto;vertical-align:middle" title="👇" alt="👇" /> <br /><a href="https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX696300" rel="nofollow noopener"><span>https://</span><span>support.citrix.com/support-hom</span><span>e/kbsearch/article?articleNumber=CTX696300</span></a></p><ul><li><p>CVE-2026-3055 - Out-of-Bounds Read vulnerability - CVSSv4 base score: 9.3<br />    Note: Citrix NetScaler ADC or Citrix Gateway must be configured as SAML IDP to be vulnerable to CVE-2026-3055.</p><ul><li>   CVE-2026-4368 - Race Condition vulnerability - CVSSv4 base score: 7.7Note: Affected appliances must be configured as a Gateway (SSL VPN, ICA Proxy, CVPN, RDP proxy) or AAA virtual server to be vulnerable CVE-2026-4368.</li></ul></li></ul><p>( -&gt; <a href="https://cve.circl.lu/search?q=CVE-2026-3055" rel="nofollow noopener"><span>https://</span><span>cve.circl.lu/search?q=CVE-2026</span><span>-3055</span></a> )</p><p><a href="https://infosec.exchange/tags/cyberveille" rel="tag">#<span>cyberveille</span></a>  <a href="https://infosec.exchange/tags/CVE_2026_3055" rel="tag">#<span>CVE_2026_3055</span></a>  <a href="https://infosec.exchange/tags/infosec" rel="tag">#<span>infosec</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/1faf2bdb-c945-4543-909e-ba0858a0374e/cve-2026-3055-https-support.citrix.com-support-home-kbsearch-article-articlenumber-ctx696300</link><generator>RSS for Node</generator><lastBuildDate>Sat, 18 Apr 2026 01:26:05 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/1faf2bdb-c945-4543-909e-ba0858a0374e.rss" rel="self" type="application/rss+xml"/><pubDate>Mon, 23 Mar 2026 15:48:01 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to ➡️ CVE-2026-3055 👀 👇 https:&#x2F;&#x2F;support.citrix.com&#x2F;support-home&#x2F;kbsearch&#x2F;article?articleNumber=CTX696300 on Mon, 30 Mar 2026 07:26:04 GMT]]></title><description><![CDATA[<p><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/26a0.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--warning" style="height:23px;width:auto;vertical-align:middle" title="⚠" alt="⚠" />️  CVE-2026-3055 / Citrix NetScaler : la reconnaissance est en cours.</p><p>Des activités de reconnaissance ciblent déjà les appliances exposées, avec notamment des requêtes vers /cgi/GetAuthMethods pour identifier les configs exploitables, en particulier les environnements SAML IdP. <br />GBHackers relaie ces observations<br /><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f447.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--point_down" style="height:23px;width:auto;vertical-align:middle" title="👇" alt="👇" /> <br /><a href="https://gbhackers.com/hackers-probe-citrix-netscaler-systems-cve-2026-3055-exploitation/" rel="nofollow noopener"><span>https://</span><span>gbhackers.com/hackers-probe-ci</span><span>trix-netscaler-systems-cve-2026-3055-exploitation/</span></a></p><p>Côté exposition, ONYPHE recense plus de 18000 IP uniques sur une version vulnérable, (dont environ +800 en Suisse). <br /><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f447.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--point_down" style="height:23px;width:auto;vertical-align:middle" title="👇" alt="👇" /> <br /><a href="https://www.linkedin.com/posts/onyphe_vulnerability-asm-attacksurfacemanagement-activity-7442250727046987776-ofYV" rel="nofollow noopener"><span>https://www.</span><span>linkedin.com/posts/onyphe_vuln</span><span>erability-asm-attacksurfacemanagement-activity-7442250727046987776-ofYV</span></a></p><p>Le pattern rappelle clairement les précédents CitrixBleed : si du NetScaler est encore exposé, la fenêtre avant exploitation de masse pourrait être très courte.</p><p><a href="https://infosec.exchange/tags/CyberVeille" rel="tag">#<span>CyberVeille</span></a> <a href="https://infosec.exchange/tags/CVE_2026_3055" rel="tag">#<span>CVE_2026_3055</span></a>  <a href="https://infosec.exchange/tags/Citrix" rel="tag">#<span>Citrix</span></a></p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/decio/statuses/116316934261011231</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/decio/statuses/116316934261011231</guid><dc:creator><![CDATA[decio@infosec.exchange]]></dc:creator><pubDate>Mon, 30 Mar 2026 07:26:04 GMT</pubDate></item><item><title><![CDATA[Reply to ➡️ CVE-2026-3055 👀 👇 https:&#x2F;&#x2F;support.citrix.com&#x2F;support-home&#x2F;kbsearch&#x2F;article?articleNumber=CTX696300 on Mon, 23 Mar 2026 17:05:23 GMT]]></title><description><![CDATA[<p><span><a href="/user/christopherkunz%40chaos.social" rel="nofollow noopener">@<span>christopherkunz</span></a></span>   Let’s hope not,🫣  but yeah, this smells bad. Some honeypot operators have reported a noticeable rise in attacks targeting these devices over the past week and watchtwr is sounding the horn.<br />If the wind carries the smell…</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/decio/statuses/116279576063752506</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/decio/statuses/116279576063752506</guid><dc:creator><![CDATA[decio@infosec.exchange]]></dc:creator><pubDate>Mon, 23 Mar 2026 17:05:23 GMT</pubDate></item><item><title><![CDATA[Reply to ➡️ CVE-2026-3055 👀 👇 https:&#x2F;&#x2F;support.citrix.com&#x2F;support-home&#x2F;kbsearch&#x2F;article?articleNumber=CTX696300 on Mon, 23 Mar 2026 15:52:44 GMT]]></title><description><![CDATA[<p><span><a href="/user/decio%40infosec.exchange">@<span>decio</span></a></span> Here we go again - CitrixBleed 3?</p>]]></description><link>https://board.circlewithadot.net/post/https://chaos.social/users/christopherkunz/statuses/116279290421250562</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://chaos.social/users/christopherkunz/statuses/116279290421250562</guid><dc:creator><![CDATA[christopherkunz@chaos.social]]></dc:creator><pubDate>Mon, 23 Mar 2026 15:52:44 GMT</pubDate></item></channel></rss>