CrowdSecLive Exploit Tracker
9/10CrowdSec Score

NetScaler - Memory Disclosure (CVE-2026-3055)

Published on23-03-2026
First seen on30-03-2026

27Exploiting IPs reported

Insufficient input validation leading to memory overread in NetScaler ADC and NetScaler Gateway when configured as a SAML Identity Provider (SAML IDP).

CrowdSec analysis

CVE-2026-3055 is a critical memory overread vulnerability in Citrix NetScaler ADC and NetScaler Gateway when configured as a SAML Identity Provider. Due to insufficient input validation, unauthenticated attackers can trigger an out-of-bounds read that leaks sensitive memory contents, including administrative session cookies, potentially enabling full appliance compromise.

CrowdSec has been tracking this vulnerability and its exploits since 30th of March 2026.

CrowdSec network observations suggest that most exploitation of CVE-2026-3055 involves focused reconnaissance to identify viable targets. Attackers typically tailor their campaigns based on system exposure and configuration. It is unlikely that a given attack is accidental. Telemetry from the CrowdSec network also shows that exploitation activity for CVE-2026-3055 remains steady week-over-week. Attack volumes are consistent with long-term trends, indicating sustained interest from threat actors. CVE-2026-3055 continues to be an active part of the threat landscape and will likely remain this way for the forseeable future.

Attackers exploit the SAML IDP endpoints by sending crafted POST requests to /saml/login with a malicious SAMLRequest payload, or GET requests to /wsfed/passive?wctx with an empty parameter value, triggering memory overread that leaks sensitive data such as session cookies in the NSC_TASS cookie.

Exploitation

Get real-time information about exploitation attempts and actors involved.

Exploit Timeline

This timeline shows the history of exploitation attempts for this CVE, as detected by the CrowdSec community.

Detected IPs

Discover the IPs that targeted this vulnerability across the CrowdSec Network.

Common Weakness Enumeration (CWE)

Protection

Find out relevant information to protect your stack against this CVE.

Stay Protected against CVE Exploiters

Quick Download icon

Quick Download

Get the list of IPs exploiting this vulnerability

Download
Firewall Sync icon

Firewall Sync

Sync with your firewall a live feed of IPs exploiting this vulnerability

Sync
JSON Live Feed icon

JSON Live Feed

Access a dedicated API endpoint to get a live JSON feed

Get The Feed