Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4368: Vulnerability in NetScaler ADC

0
High
VulnerabilityCVE-2026-4368cvecve-2026-4368
Published: Mon Mar 23 2026 (03/23/2026, 20:09:44 UTC)
Source: CVE Database V5
Vendor/Project: NetScaler
Product: ADC

Description

CVE-2026-4368 is a high-severity race condition vulnerability in Citrix NetScaler ADC and Gateway appliances configured as Gateway (SSL VPN, ICA Proxy, CVPN, RDP Proxy) or AAA virtual servers. This flaw can cause user session mixups, potentially allowing an attacker with low privileges and network access to interfere with session integrity. Exploitation does not require user interaction but does require partial authentication. The vulnerability impacts confidentiality, integrity, and availability of user sessions, risking unauthorized access or session hijacking. No known exploits are currently in the wild, but the vulnerability affects version 14. 1. 66. 54 of NetScaler ADC. Organizations using these appliances for remote access or authentication services should prioritize patching and implement strict network segmentation and monitoring to mitigate risks. Countries with significant NetScaler deployments and critical infrastructure relying on secure remote access are at higher risk.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/30/2026, 20:47:58 UTC

Technical Analysis

CVE-2026-4368 is a race condition vulnerability identified in Citrix NetScaler ADC and NetScaler Gateway appliances when configured as Gateway services (including SSL VPN, ICA Proxy, CVPN, and RDP Proxy) or as AAA virtual servers. The vulnerability arises due to improper handling of concurrent session requests, leading to user session mixups where one user's session data may be incorrectly associated with another user. This flaw compromises session integrity and confidentiality, potentially allowing an attacker with low privileges and network access to intercept or manipulate user sessions. The vulnerability has a CVSS 4.0 base score of 7.7, indicating high severity, with an attack vector over the network, low attack complexity, partial authentication required, and no user interaction needed. The impact covers confidentiality, integrity, and availability, as session mixups can lead to unauthorized access or denial of service. The affected version is specifically 14.1.66.54 of NetScaler ADC. Although no public exploits are known, the vulnerability's nature and affected components make it a significant risk for environments relying on NetScaler for secure remote access and authentication. The race condition likely occurs during session establishment or validation, where concurrent requests are not properly synchronized, causing session identifiers or tokens to be incorrectly assigned or reused.

Potential Impact

The vulnerability can lead to unauthorized access to user sessions, exposing sensitive data and allowing attackers to impersonate legitimate users. This undermines the confidentiality and integrity of remote access sessions, potentially enabling lateral movement within networks or access to critical internal resources. Session mixups can also cause denial of service by disrupting legitimate user sessions. Organizations relying on NetScaler ADC for SSL VPN, ICA Proxy, CVPN, or RDP Proxy services are at risk of compromised remote access security, which is critical for business continuity and data protection. The requirement for partial authentication lowers the barrier for exploitation compared to fully authenticated attacks, increasing risk. The vulnerability could be leveraged in targeted attacks against enterprises, government agencies, and service providers that use NetScaler appliances extensively for secure remote connectivity.

Mitigation Recommendations

1. Apply vendor patches or updates as soon as they become available for NetScaler ADC version 14.1.66.54 or affected versions. 2. If patches are not immediately available, consider temporarily disabling or limiting the use of Gateway and AAA virtual server features to reduce exposure. 3. Implement strict network segmentation to isolate NetScaler appliances from untrusted networks and limit access to management interfaces. 4. Enable detailed logging and monitoring of session activity to detect anomalies indicative of session mixups or unauthorized access attempts. 5. Use multi-factor authentication (MFA) to add an additional layer of security beyond partial authentication. 6. Conduct regular security assessments and penetration testing focused on remote access infrastructure to identify potential exploitation attempts. 7. Educate administrators and users about the risks and signs of session hijacking or mixups to improve incident response readiness.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
NetScaler
Date Reserved
2026-03-18T05:23:50.518Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c1a302f4197a8e3b8aa1e6

Added to database: 3/23/2026, 8:30:58 PM

Last enriched: 3/30/2026, 8:47:58 PM

Last updated: 5/8/2026, 8:13:55 AM

Views: 350

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses