Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4368: Vulnerability in NetScaler ADC

0
High
VulnerabilityCVE-2026-4368cvecve-2026-4368
Published: Mon Mar 23 2026 (03/23/2026, 20:09:44 UTC)
Source: CVE Database V5
Vendor/Project: NetScaler
Product: ADC

Description

Race Condition in NetScaler ADC and NetScaler Gateway when appliance is configured as Gateway (SSL VPN, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server leading to User Session Mixup

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/23/2026, 20:46:00 UTC

Technical Analysis

CVE-2026-4368 is a race condition vulnerability identified in Citrix NetScaler ADC and NetScaler Gateway appliances, specifically when configured as Gateway (including SSL VPN, ICA Proxy, CVPN, RDP Proxy) or AAA virtual servers. The vulnerability arises from improper handling of concurrent user session requests, leading to a user session mixup where one user's session data may be incorrectly associated with another user. This flaw can result in unauthorized access to sensitive session information, violating confidentiality and potentially allowing attackers to hijack or manipulate user sessions. The affected product version is 14.1.66.54. The vulnerability requires low privileges (PR:L) but does not require user interaction (UI:N), making it easier for an attacker with limited access to exploit. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), partial authentication required (AT:P), and high impact on confidentiality, integrity, and availability (VC:H/VI:H/VA:H). No known exploits have been reported in the wild yet, but the critical nature of NetScaler ADC in enterprise environments for secure remote access and application delivery makes this vulnerability a significant risk. The race condition can be exploited remotely, potentially affecting multiple users simultaneously, and could lead to session hijacking or unauthorized data access. The vulnerability does not require scope change or user interaction, increasing its exploitability. As of now, no official patches or mitigation links have been published, emphasizing the need for immediate risk assessment and temporary mitigations by affected organizations.

Potential Impact

The impact of CVE-2026-4368 is substantial for organizations relying on Citrix NetScaler ADC appliances for secure remote access and application delivery. Successful exploitation can lead to unauthorized access to user sessions, resulting in confidentiality breaches where sensitive user data and credentials may be exposed. Integrity of session data can be compromised, allowing attackers to manipulate session information or impersonate legitimate users. Availability could also be affected if session mixups cause service disruptions or denial of service conditions. Given that NetScaler ADC is widely used in enterprise environments, including financial institutions, healthcare, government agencies, and large enterprises, the potential for data breaches and operational disruption is high. The vulnerability's ease of exploitation with low privileges and no user interaction required increases the likelihood of targeted attacks. Organizations could face regulatory compliance issues, reputational damage, and financial losses if this vulnerability is exploited. The absence of known exploits in the wild currently provides a window for proactive mitigation, but the risk remains elevated due to the critical nature of the affected systems.

Mitigation Recommendations

1. Immediate upgrade to a patched version of NetScaler ADC once Citrix releases an official fix for CVE-2026-4368. Monitor Citrix advisories closely for patch availability. 2. Until a patch is available, implement strict access controls to limit administrative and user access to the NetScaler ADC management interfaces and Gateway configurations. 3. Employ network segmentation and firewall rules to restrict access to the NetScaler ADC appliances only to trusted networks and users. 4. Enable detailed logging and monitoring of user sessions and authentication events to detect anomalies indicative of session mixups or unauthorized access attempts. 5. Consider deploying multi-factor authentication (MFA) for all users accessing the Gateway services to reduce the risk of session hijacking. 6. Review and tighten session timeout and re-authentication policies to minimize the window of opportunity for session misuse. 7. Conduct regular security assessments and penetration testing focused on the NetScaler ADC environment to identify and remediate potential exploitation paths. 8. Educate security and IT teams about the nature of race condition vulnerabilities and the specific risks posed by this issue to ensure rapid incident response if exploitation is suspected.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
NetScaler
Date Reserved
2026-03-18T05:23:50.518Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c1a302f4197a8e3b8aa1e6

Added to database: 3/23/2026, 8:30:58 PM

Last enriched: 3/23/2026, 8:46:00 PM

Last updated: 3/23/2026, 10:39:05 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses