
""Before we move on, we need to say something clearly: in-the-wild exploitation has begun," the researchers wrote, pointing to honeypot data they said showed activity from infrastructure previously linked to threat actors as of March 27."
""There's no great magic to exploiting it. Fire off a request with a parameter that exists but contains nothing - not even an '=' sign - and NetScaler just rolls with it.""
""WatchTowr says the flaw 'looks, smells, and quacks' like CitrixBleed2, continuing a long-running theme of memory handling issues in edge appliances that sit directly in front of authentication systems.""
""According to the researchers, CVE-2026-3055 isn't just one bug but multiple closely related memory leaks - effectively several vulnerabilities bundled under a single ID.""
Exploitation of CVE-2026-3055, a critical Citrix NetScaler vulnerability, has commenced shortly after its disclosure. Researchers observed reconnaissance traffic and confirmed active exploitation within days. The flaw allows attackers to access sensitive data by sending specific requests that trigger memory overreads. This vulnerability is part of a series of memory handling issues in Citrix products. The UK's National Cyber Security Centre has urged organizations to apply patches immediately to mitigate risks associated with this vulnerability.
Read at Theregister
Unable to calculate read time
Collection
[
|
...
]