
CVE-2026-3055
CVE-2026-3055: CitrixBleed 3, CVSS 9.3 unauthenticated memory overread in NetScaler SAML IdP path; added to CISA KEV 28 March 2026.
Last refreshed: 17 April 2026 · Appears in 1 active topic
What exactly does CitrixBleed 3 let an attacker do without a password?
Timeline for CVE-2026-3055
CitrixBleed 3 lands on SAML broker
Cybersecurity: Threats and Defences- What is CVE-2026-3055 and how serious is it?
- CVE-2026-3055 (CitrixBleed 3) is an unauthenticated memory overread in Citrix NetScaler's SAML login path, scored CVSS 9.3. It allows attackers to extract session tokens and bypass authentication for all SSO-protected applications without a password. CISA added it to KEV on 28 March 2026.Source: Citrix / CISA / WatchTowr
Background
CVE-2026-3055 is the vulnerability designated CitrixBleed 3: an unauthenticated memory overread in Citrix NetScaler ADC and NetScaler Gateway when configured as a SAML Identity Provider, scored CVSS v4.0 9.3. Citrix disclosed it on 23 March 2026; CISA added it to the Known Exploited Vulnerabilities catalogue on 28 March with a federal remediation deadline of 2 April. WatchTowr confirmed active reconnaissance before mass exploitation; the NCSC issued an advisory on 25 March.
The technical attack path follows the CitrixBleed 2023 template: a crafted SAMLRequest to the `/saml/login` endpoint that omits the AssertionConsumerServiceURL field causes NetScaler to leak memory via the `NSC_TASS` cookie. The leaked memory can contain session tokens, enabling authentication bypass for any application protected by the compromised SAML broker without requiring a valid username or password.
The CVE's appearance is the third iteration of a structurally identical class of memory-disclosure vulnerability in NetScaler's SAML code in thirty months (CVE-2023-4966 in 2023; a 2024 variant; CVE-2026-3055 in 2026). Security researchers at Qualys and Picus have assessed this pattern as evidence of a shared root cause in NetScaler's SAML request memory management, rather than three independent bugs. Enterprises using NetScaler as their SAML broker must patch immediately and should add the CVE to a formal architecture-review agenda.