Insufficient input validation in NetScaler ADC and NetScaler Gateway when configured as a SAML IDP leading to memory overread
https://thehackernews.com/2026/04/china-linked-storm-1175-exploits-zero.html
https://therecord.media/cisa-tells-federal-agencies-to-patch-citrix-netscaler-bug
https://www.theregister.com/2026/03/30/citrix_netscaler_flaw/
https://www.infosecurity-magazine.com/news/critical-citrix-netscaler/
https://www.securityweek.com/exploitation-of-fresh-citrix-netscaler-vulnerability-begins/
https://www.databreachtoday.com/under-fire-attackers-target-flaws-in-f5-citrix-gear-a-31289
https://thehackernews.com/2026/03/citrix-netscaler-under-active-recon-for.html
https://www.hipaajournal.com/urgent-action-required-to-fix-critical-citrix-netscaler-vulnerability/
https://www.infosecurity-magazine.com/news/citrix-patch-netscaler/
https://www.helpnetsecurity.com/2026/03/24/netscaler-adc-gateway-cve-2026-3055/
https://thehackernews.com/2026/03/citrix-urges-patching-critical.html
https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX696300
Published: 2026-03-23
Updated: 2026-03-31
Known Exploited Vulnerability (KEV)
Base Score: 10
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Severity: Critical
Base Score: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: Critical
Base Score: 9.3
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L
Severity: Critical
EPSS: 0.53796
Tenable Research has classified this CVE under the following Vulnerability Watch classification, which includes active and historical (inactive) classifications. You can learn more about these classifications on our blog.
Vulnerability of Interest