Description
Race Condition in NetScaler ADC and NetScaler Gateway when appliance is configured as Gateway (SSL VPN, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server leading to User Session Mixup
Published: 2026-03-23
Score: 7.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Session Access
Action: Immediate Patch
AI Analysis

Impact

Race condition in NetScaler ADC and NetScaler Gateway occurs when the appliance is set as a Gateway for SSL VPN, ICA Proxy, CVPN, RDP Proxy, or an AAA virtual server. The condition allows two concurrent session creation processes to interfere, causing the authentication information of one user to be swapped with that of another. This mix‑up can let an attacker observe or interact with a different user's session state, resulting in unintended access to data or functionality. The vulnerability is a classic race condition (CWE‑847) affecting confidentiality and potentially integrity of user sessions.

Affected Systems

The flaw impacts Citrix NetScaler ADC and NetScaler Gateway appliances configured for Gateway mode (SSL VPN, ICA Proxy, CVPN, RDP Proxy) or as an AAA virtual server. No specific firmware versions are listed in the advisory, so all current installations matching those configurations are potentially vulnerable.

Risk and Exploitability

The CVSS base score of 7.7 indicates a high severity, while the EPSS score of less than 1 % suggests a low probability of widespread exploitation at present. The vulnerability is not present in the CISA KEV catalog. Attacks would require successful manipulation of the appliance’s session handling logic, likely over a network channel used for VPN or proxy traffic. Because no public exploit has been disclosed, the practical risk remains moderate to high for environments exposing unpatched Gateways, but the attack surface is limited to the specific configuration types.

Generated by OpenCVE AI on March 27, 2026 at 21:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Download and install the published firmware update from Citrix that addresses the race condition in NetScaler ADC and NetScaler Gateway.
  • Confirm that Gateway mode is enabled only for legitimate use cases and review appliance configuration for unnecessary services.
  • Apply additional controls such as multi‑factor authentication and enforce strict session isolation policies as interim protection.
  • Enable detailed session logging and regularly review logs for anomalous cross‑user activity.

Generated by OpenCVE AI on March 27, 2026 at 21:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 29 Mar 2026 20:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-847

Fri, 27 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-287
CWE-362

Fri, 27 Mar 2026 09:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-287
CWE-362

Thu, 26 Mar 2026 12:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-362

Wed, 25 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-362

Tue, 24 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Netscaler
Netscaler adc
Netscaler gateway
Vendors & Products Netscaler
Netscaler adc
Netscaler gateway

Tue, 24 Mar 2026 02:30:00 +0000

Type Values Removed Values Added
Description Race Condition in NetScaler ADC and NetScaler Gateway when appliance is configured as Gateway (SSL VPN, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server leading to User Session Mixup
Title Race Condition leading to User Session Mixup
References
Metrics cvssV4_0

{'score': 7.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: NetScaler

Published:

Updated: 2026-03-24T03:56:06.153Z

Reserved: 2026-03-18T05:23:50.518Z

Link: CVE-2026-4368

cve-icon Vulnrichment

Updated: 2026-03-23T20:38:57.892Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-23T21:17:17.667

Modified: 2026-03-24T15:54:09.400

Link: CVE-2026-4368

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-29T20:28:50Z

Weaknesses