CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ⬡ Vulnerabilities & CVEs Apr 07, 2026

Critical flaw in Citrix NetScaler raises fears of new exploitation wave - Cybersecurity Dive

Cybersecurity Dive Archived Apr 07, 2026 ✓ Full text saved

Critical flaw in Citrix NetScaler raises fears of new exploitation wave Cybersecurity Dive

Full text archived locally
✦ AI Summary · Claude Sonnet


    Critical flaw in Citrix NetScaler raises fears of new exploitation wave Researchers warn that security teams need to take immediate mitigation steps before a public proof of concept is released. Published March 26, 2026 • Updated March 27, 2026 David Jones Reporter Share License Add us on Google Citrix Synergy Solutions Expo, 2019. Citrix is urging users to patch their systems after disclosing a critical vulnerability in NetScaler ADC and NetScaler Gateway. Citrix via Flickr Security researchers warn that a critical vulnerability in Citrix NetScaler products might lead to a wave of exploitation that could rival the 2023 CitrixBleed crisis.  Citrix on Monday disclosed an insufficient input validation flaw in NetScaler ADC and NetScaler Gateway application-delivery products, tracked as CVE-2026-3055, with a severity score of 9.3.  Citrix also disclosed a race condition flaw, tracked as CVE-2026-4368, in the same products. That vulnerability has a severity score of 7.7. The input validation flaw can allow an attacker to leak sensitive information, similar to the original CitrixBleed flaw, which led to a wave of high profile data theft and ransomware attacks.  “NetScalers are critical solutions that have been continuously targeted for initial access into enterprise environments,” Benjamin Harris, founder and CEO of watchTowr, told Cybersecurity Dive.  Harris warned that anyone running NetScaler needs to immediately patch their systems as exploitation could begin “imminently.” Citrix found the vulnerability through an internal review process.  The 2023 CitrixBleed vulnerability, tracked as CVE-2023-4966, was linked to a wave of attacks targeting major organizations, including Comcast Xfinity and Boeing. LockBit 3.0 was linked to several ransomware attacks stemming from the CitrixBleed flaw and became the target of an international law enforcement takedown. The U.K.’s National Cyber Security Centre, a close partner of U.S. agencies, issued an advisory on Wednesday for British companies and other security leaders to take immediate action to mitigate the risk of attack.  In the U.S., the Cybersecurity and Infrastructure Security Agency has been hampered by the partial government shutdown, told Cybersecurity Dive that it is aware of the NetScaler flaw and is working “hand in glove” with partners to “rapidly detect and mitigate” any potential exploitation activity, through a spokesperson.  Rapid7 researchers point out that systems configured as a Security Assertion Markup Language Identity Provider are vulnerable to exploitation, while default configurations are not at risk. Rapid7 notes that SAML IP configurations are common at organizations with single sign-on authentication methods.   Rapid7 researchers expect to see exploitation as soon as a public proof of concept is released on the NetScaler flaw.  “We do see increased scanning activity toward Citrix but not necessarily tied to this particular CVE,” Christiaan Beek, vice president, cyber intelligence at Rapid7, told Cybersecurity Dive. “We do monitor any signs of it and anticipate a POC wouldn’t take long to be released to abuse this vulnerability.” In mid-March researchers at Defused noted a spike in exploitation targeting NetScaler flaws CVE-2023-4966 and CVE-2025-5777.   “We monitor baselines and this was a clear anomaly,” said Simo Kohonen, founder and CEO of Defused.  Researchers from Defused on Friday said they have detected “auth method fingerprinting activity” in the wild against NetScaler ADC and Netscaler Gateway.  Researchers from watchTowr said Friday they are detecting active reconnaissance activity against CVE-2026-3055, through the security firm’s honeypot network.  Editor’s note: Adds additional comment from watchTowr, CISA and Defused.  Add us on Google Share PURCHASE LICENSING RIGHTS Filed Under: Vulnerability
    💬 Team Notes
    Article Info
    Source
    Cybersecurity Dive
    Category
    ⬡ Vulnerabilities & CVEs
    Published
    Apr 07, 2026
    Archived
    Apr 07, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗