Home Cybersecurity Disaster Recovery Identity Security AI Governance Sectors IT Services About Insights Contact
Cybersecurity

Critical SAML Flaw Gives Attackers Instant Access to UK Enterprise Systems

30 March 2026 · 3 min read

← All insights

The NCSC issued an urgent advisory on 26th March warning UK organisations of two critical vulnerabilities in Citrix NetScaler systems that could grant attackers immediate access to enterprise networks. With thousands of UK mid-market organisations relying on NetScaler for secure remote access, the flaws represent an immediate threat to business operations. SAML (Security Assertion Markup Language) is the authentication protocol that enables single sign-on across enterprise applications, making these vulnerabilities particularly dangerous for business continuity.

Key Facts:
- CVE-2026-3055 affects SAML identity providers with memory overread vulnerabilities
- CVE-2026-4368 creates user session mixup conditions in multi-user environments
- NCSC advisory published 26th March 2026 marks this as urgent priority for UK enterprises
- NetScaler systems provide secure remote access for thousands of UK organisations

How Memory Leaks Enable Identity Bypass

According to the NCSC advisory, CVE-2026-3055 exploits memory overread conditions in NetScaler's SAML processing engine. When handling authentication requests, the flaw allows attackers to read sensitive data from adjacent memory locations, potentially exposing user credentials, session tokens, and cryptographic keys. This creates a pathway for attackers to impersonate legitimate users without requiring stolen passwords or compromised devices.

The vulnerability particularly threatens organisations using SAML federation with cloud services like Microsoft 365 or Google Workspace. A successful exploit could grant attackers access to an organisation's entire cloud ecosystem through a single compromised NetScaler instance. This mirrors the pattern seen in previous Citrix memory leak attacks that exposed thousands of UK businesses to unauthorised access.

Why Session Mixup Attacks Defeat Multi-Factor Authentication

CVE-2026-4368 creates user session confusion in multi-user environments, allowing attackers to inherit authenticated sessions from legitimate users. Unlike traditional credential theft, this vulnerability bypasses multi-factor authentication entirely by exploiting timing windows during session establishment. The NCSC warns that organisations with high concurrent user loads face the greatest exposure, as session collision probability increases with user volume.

The attack requires no user interaction or social engineering. Attackers simply need to time their authentication attempts to coincide with legitimate user logins, potentially inheriting administrative privileges if they successfully intercept a privileged user's session.

Boardroom Questions

Quick Diagnostic

PTG Intelligence Desk
Pacific Technology Group

Related Reading

UK Enterprises Face Third CitrixBleed-Style Attack as Memory Leak Flaw Threatens SAML Deployments — Critical CVE-2026-3055 vulnerability enables unauthenticated attackers to extract sensitive data from Citrix NetScaler S

Critical Citrix Memory Leak Flaw Threatens UK Enterprise Single Sign-On Systems — CVE-2026-3055 enables unauthenticated attackers to extract sensitive authentication data from Citrix NetScaler SAML conf

Four Weekly Cyber Attacks Now Hit UK Critical Infrastructure as Defence Gap Widens — NCSC data reveals UK faces four nationally significant cyber attacks weekly - a 129% increase from 2024, with manufactur

UK Spy Chief's Vibe Coding Warning Creates Security Standards Crisis — NCSC CEO warns that rapid AI code generation without review is creating massive security gaps requiring immediate indust

Oracle's Critical RCE Flaw Leaves UK Enterprises Exposed to Instant System Takeover — Oracle's emergency patch for CVE-2026-21992 addresses unauthenticated remote code execution in Identity Manager, mirrori

Strengthen your organisation's security posture

Take the PTG Cyber Assessment Speak With Our Advisory Team

Ready to strengthen your cyber resilience?

Talk to our team about protecting your organisation against evolving threats.

Get in Touch