Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. ➡️ CVE-2026-3055 👀 👇 https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX696300

➡️ CVE-2026-3055 👀 👇 https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX696300

Scheduled Pinned Locked Moved Uncategorized
cyberveillecve20263055infosec
4 Posts 2 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • decio@infosec.exchangeD This user is from outside of this forum
    decio@infosec.exchangeD This user is from outside of this forum
    decio@infosec.exchange
    wrote last edited by
    #1

    ➡️ CVE-2026-3055 👀
    👇
    https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX696300

    • CVE-2026-3055 - Out-of-Bounds Read vulnerability - CVSSv4 base score: 9.3
      Note: Citrix NetScaler ADC or Citrix Gateway must be configured as SAML IDP to be vulnerable to CVE-2026-3055.

      • CVE-2026-4368 - Race Condition vulnerability - CVSSv4 base score: 7.7Note: Affected appliances must be configured as a Gateway (SSL VPN, ICA Proxy, CVPN, RDP proxy) or AAA virtual server to be vulnerable CVE-2026-4368.

    ( -> https://cve.circl.lu/search?q=CVE-2026-3055 )

    #cyberveille #CVE_2026_3055 #infosec

    christopherkunz@chaos.socialC decio@infosec.exchangeD 2 Replies Last reply
    0
    • decio@infosec.exchangeD decio@infosec.exchange

      ➡️ CVE-2026-3055 👀
      👇
      https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX696300

      • CVE-2026-3055 - Out-of-Bounds Read vulnerability - CVSSv4 base score: 9.3
        Note: Citrix NetScaler ADC or Citrix Gateway must be configured as SAML IDP to be vulnerable to CVE-2026-3055.

        • CVE-2026-4368 - Race Condition vulnerability - CVSSv4 base score: 7.7Note: Affected appliances must be configured as a Gateway (SSL VPN, ICA Proxy, CVPN, RDP proxy) or AAA virtual server to be vulnerable CVE-2026-4368.

      ( -> https://cve.circl.lu/search?q=CVE-2026-3055 )

      #cyberveille #CVE_2026_3055 #infosec

      christopherkunz@chaos.socialC This user is from outside of this forum
      christopherkunz@chaos.socialC This user is from outside of this forum
      christopherkunz@chaos.social
      wrote last edited by
      #2

      @decio Here we go again - CitrixBleed 3?

      decio@infosec.exchangeD 1 Reply Last reply
      0
      • christopherkunz@chaos.socialC christopherkunz@chaos.social

        @decio Here we go again - CitrixBleed 3?

        decio@infosec.exchangeD This user is from outside of this forum
        decio@infosec.exchangeD This user is from outside of this forum
        decio@infosec.exchange
        wrote last edited by
        #3

        @christopherkunz Let’s hope not,🫣 but yeah, this smells bad. Some honeypot operators have reported a noticeable rise in attacks targeting these devices over the past week and watchtwr is sounding the horn.
        If the wind carries the smell…

        1 Reply Last reply
        0
        • decio@infosec.exchangeD decio@infosec.exchange

          ➡️ CVE-2026-3055 👀
          👇
          https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX696300

          • CVE-2026-3055 - Out-of-Bounds Read vulnerability - CVSSv4 base score: 9.3
            Note: Citrix NetScaler ADC or Citrix Gateway must be configured as SAML IDP to be vulnerable to CVE-2026-3055.

            • CVE-2026-4368 - Race Condition vulnerability - CVSSv4 base score: 7.7Note: Affected appliances must be configured as a Gateway (SSL VPN, ICA Proxy, CVPN, RDP proxy) or AAA virtual server to be vulnerable CVE-2026-4368.

          ( -> https://cve.circl.lu/search?q=CVE-2026-3055 )

          #cyberveille #CVE_2026_3055 #infosec

          decio@infosec.exchangeD This user is from outside of this forum
          decio@infosec.exchangeD This user is from outside of this forum
          decio@infosec.exchange
          wrote last edited by
          #4

          ⚠️ CVE-2026-3055 / Citrix NetScaler : la reconnaissance est en cours.

          Des activités de reconnaissance ciblent déjà les appliances exposées, avec notamment des requêtes vers /cgi/GetAuthMethods pour identifier les configs exploitables, en particulier les environnements SAML IdP.
          GBHackers relaie ces observations
          👇
          https://gbhackers.com/hackers-probe-citrix-netscaler-systems-cve-2026-3055-exploitation/

          Côté exposition, ONYPHE recense plus de 18000 IP uniques sur une version vulnérable, (dont environ +800 en Suisse).
          👇
          https://www.linkedin.com/posts/onyphe_vulnerability-asm-attacksurfacemanagement-activity-7442250727046987776-ofYV

          Le pattern rappelle clairement les précédents CitrixBleed : si du NetScaler est encore exposé, la fenêtre avant exploitation de masse pourrait être très courte.

          #CyberVeille #CVE_2026_3055 #Citrix

          1 Reply Last reply
          1
          0
          • R relay@relay.infosec.exchange shared this topic
          Reply
          • Reply as topic
          Log in to reply
          • Oldest to Newest
          • Newest to Oldest
          • Most Votes


          • Login

          • Login or register to search.
          • First post
            Last post
          0
          • Categories
          • Recent
          • Tags
          • Popular
          • World
          • Users
          • Groups