Brunswick, ME • (207) 245-1010 • contact@johnzblack.com
No active exploitation. No public proof-of-concept. So why are researchers calling this one “poised for exploitation”?
CVE-2026-3055 is a CVSS 9.3 unauthenticated memory read in NetScaler ADC and Gateway. No credentials required. An attacker sends a crafted request, and the appliance hands back memory contents it shouldn’t. That can include active session tokens for users currently authenticated through the device.
If you remember CitrixBleed, CVE-2023-4966, same class of flaw, same component, same “serious but not yet actively exploited” framing at disclosure. LockBit and others weaponized it within weeks. The window between “Citrix patches a session-token leak” and “ransomware groups have working exploits” has historically been short.
Cloud-managed NetScaler customers are already covered. If you’re running self-managed, on-premises instances with SAML enabled, this is an emergency change window situation. Don’t wait for a maintenance window. Escalate past it.