The Citrixwatch hub is a vendor-specific view inside ITECS MSP Threat Radar. We pull the latest security advisories, incidents, and known-exploited CVEs directly from the official feeds below, score each one for MSP relevance, and surface what's most likely to need attention this week.
Confirm whether recent Citrix activity overlaps with your environment.
Prioritize advisories by MSP-relevance score, severity, and status.
Turn the signal into an assessment, briefing, or managed-service engagement with ITECS.
At a glance
Tracked
23
Active
22
Featured
22
Unique CVEs
20
Most recent entry
Mar 29, 2026, 7:00 PM
Feed refreshes daily · 5:15 a.m. Central
Sources·CISA KEV and NVD (product vendor coverage)
"Most recent entry" is the newest item the upstream feed has published — not our sync time.
Watch items
Recent Citrix watch items
Showing the 20 most recent items, newest first. Each row links to the official advisory.
20 rows · sorted newest first
Operations view
Citrix NetScaler Out-of-Bounds Read Vulnerability
critical
activeCISA KEVCVE-2026-3055
Citrix NetScaler ADC (formerly Citrix ADC), NetScaler Gateway (formerly Citrix Gateway) and NetScaler ADC FIPS and NDcPP contain an out-of-bounds reads vulnerability when configured as a SAML IDP leading to memory overread.
Citrix NetScaler ADC and NetScaler Gateway contain a memory overflow vulnerability that could allow for remote code execution and/or denial of service.
Citrix Session Recording Deserialization of Untrusted Data Vulnerability
critical
activeCISA KEVCVE-2024-8069
Citrix Session Recording contains a deserialization of untrusted data vulnerability that allows limited remote code execution with privilege of a NetworkService Account access. Attacker must be an authenticated user on the same intranet as the session recording server.
Citrix Session Recording contains an improper privilege management vulnerability that could allow for privilege escalation to NetworkService Account access. An attacker must be an authenticated user in the same Windows Active Directory domain as the session recording server domain.
Citrix NetScaler ADC and Gateway Out-of-Bounds Read Vulnerability
critical
activeCISA KEVCVE-2025-5777
Citrix NetScaler ADC and Gateway contain an out-of-bounds read vulnerability due to insufficient input validation. This vulnerability can lead to memory overread when the NetScaler is configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server. Known ransomware use: Known.
Citrix NetScaler ADC and Gateway Buffer Overflow Vulnerability
critical
activeCISA KEVCVE-2025-6543
Citrix NetScaler ADC and Gateway contain a buffer overflow vulnerability leading to unintended control flow and Denial of Service. NetScaler must be configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server.
Citrix NetScaler ADC and NetScaler Gateway Buffer Overflow Vulnerability
critical
activeCISA KEVCVE-2023-6549
Citrix NetScaler ADC and NetScaler Gateway contain a buffer overflow vulnerability that allows for a denial-of-service when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server.
Citrix NetScaler ADC and NetScaler Gateway Code Injection Vulnerability
critical
activeCISA KEVCVE-2023-6548
Citrix NetScaler ADC and NetScaler Gateway contain a code injection vulnerability that allows for authenticated remote code execution on the management interface with access to NSIP, CLIP, or SNIP.
Citrix NetScaler ADC and NetScaler Gateway Buffer Overflow Vulnerability
critical
activeCISA KEVCVE-2023-4966
Citrix NetScaler ADC and NetScaler Gateway contain a buffer overflow vulnerability that allows for sensitive information disclosure when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server. Known ransomware use: Known.
Citrix Content Collaboration ShareFile Improper Access Control Vulnerability
critical
activeCISA KEVCVE-2023-24489
Citrix Content Collaboration contains an improper access control vulnerability that could allow an unauthenticated attacker to remotely compromise customer-managed ShareFile storage zones controllers.
Citrix NetScaler ADC and NetScaler Gateway Code Injection Vulnerability
critical
activeCISA KEVCVE-2023-3519
Citrix NetScaler ADC and NetScaler Gateway contains a code injection vulnerability that allows for unauthenticated remote code execution. Known ransomware use: Known.
Citrix Application Delivery Controller (ADC) and Gateway Authentication Bypass Vulnerability
critical
activeCISA KEVCVE-2022-27518
Citrix Application Delivery Controller (ADC) and Gateway, when configured with SAML SP or IdP configuration, contain an authentication bypass vulnerability that allows an attacker to execute code as administrator.
Citrix ShareFile Improper Access Control Vulnerability
critical
activeCISA KEVCVE-2021-22941
Improper Access Control in Citrix ShareFile storage zones controller may allow an unauthenticated attacker to remotely compromise the storage zones controller. Known ransomware use: Known.
Citrix StoreFront Server XML External Entity (XXE) Processing Vulnerability
critical
activeCISA KEVCVE-2019-13608
Citrix StoreFront Server contains an XML External Entity (XXE) processing vulnerability that may allow an unauthenticated attacker to retrieve potentially sensitive information. Known ransomware use: Known.
Citrix ADC, Gateway, and SD-WAN WANOP Appliance Authorization Bypass Vulnerability
critical
activeCISA KEVCVE-2020-8193
Citrix ADC, Citrix Gateway, and multiple Citrix SD-WAN WANOP appliance models contain an authorization bypass vulnerability that may allow unauthenticated access to certain URL endpoints. The attacker must have access to the NetScaler IP (NSIP) in order to perform exploitation.
Citrix ADC, Gateway, and SD-WAN WANOP Appliance Code Execution Vulnerability
critical
activeCISA KEVCVE-2019-19781
Citrix ADC, Citrix Gateway, and multiple Citrix SD-WAN WANOP appliance models contain an unspecified vulnerability that could allow an unauthenticated attacker to perform code execution. Known ransomware use: Known.
Citrix Workspace Application and Receiver for Windows Remote Code Execution Vulnerability
critical
activeCISA KEVCVE-2019-11634
Citrix Workspace Application and Receiver for Windows contains remote code execution vulnerability resulting from local drive access preferences not being enforced into the clients' local drives. Known ransomware use: Known.
Citrix NetScaler ADC (formerly Citrix ADC), NetScaler Gateway (formerly Citrix Gateway) and NetScaler ADC FIPS and NDcPP contain an out-of-bounds reads vulnerability when configured as a SAML IDP leading to memory overread.
NetScaler
criticalCVE-2026-3055
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 45.2% EPSS.
Citrix NetScaler ADC and NetScaler Gateway contain a memory overflow vulnerability that could allow for remote code execution and/or denial of service.
NetScaler
criticalCVE-2025-7775
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 7.5% EPSS.
Citrix Session Recording Deserialization of Untrusted Data Vulnerability
Citrix Session Recording contains a deserialization of untrusted data vulnerability that allows limited remote code execution with privilege of a NetworkService Account access. Attacker must be an authenticated user on the same intranet as the session recording server.
Session Recording
criticalCVE-2024-8069
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 48.9% EPSS.
Citrix Session Recording contains an improper privilege management vulnerability that could allow for privilege escalation to NetworkService Account access. An attacker must be an authenticated user in the same Windows Active Directory domain as the session recording server domain.
Session Recording
criticalCVE-2024-8068
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 8.1% EPSS.
Citrix NetScaler ADC and Gateway Out-of-Bounds Read Vulnerability
Citrix NetScaler ADC and Gateway contain an out-of-bounds read vulnerability due to insufficient input validation. This vulnerability can lead to memory overread when the NetScaler is configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server. Known ransomware use: Known.
NetScaler ADC and Gateway
criticalCVE-2025-5777
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 66.7% EPSS.
Citrix NetScaler ADC and Gateway Buffer Overflow Vulnerability
Citrix NetScaler ADC and Gateway contain a buffer overflow vulnerability leading to unintended control flow and Denial of Service. NetScaler must be configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server.
NetScaler ADC and Gateway
criticalCVE-2025-6543
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 1.0% EPSS.
Citrix NetScaler ADC and NetScaler Gateway Buffer Overflow Vulnerability
Citrix NetScaler ADC and NetScaler Gateway contain a buffer overflow vulnerability that allows for a denial-of-service when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server.
NetScaler ADC and NetScaler Gateway
criticalCVE-2023-6549
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 76.5% EPSS.
Citrix NetScaler ADC and NetScaler Gateway Code Injection Vulnerability
Citrix NetScaler ADC and NetScaler Gateway contain a code injection vulnerability that allows for authenticated remote code execution on the management interface with access to NSIP, CLIP, or SNIP.
NetScaler ADC and NetScaler Gateway
criticalCVE-2023-6548
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 8.3% EPSS.
Citrix NetScaler ADC and NetScaler Gateway Buffer Overflow Vulnerability
Citrix NetScaler ADC and NetScaler Gateway contain a buffer overflow vulnerability that allows for sensitive information disclosure when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server. Known ransomware use: Known.
NetScaler ADC and NetScaler Gateway
criticalCVE-2023-4966
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 94.3% EPSS.
Citrix Content Collaboration ShareFile Improper Access Control Vulnerability
Citrix Content Collaboration contains an improper access control vulnerability that could allow an unauthenticated attacker to remotely compromise customer-managed ShareFile storage zones controllers.
Content Collaboration
criticalCVE-2023-24489
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 94.4% EPSS.
Citrix NetScaler ADC and NetScaler Gateway Code Injection Vulnerability
Citrix NetScaler ADC and NetScaler Gateway contains a code injection vulnerability that allows for unauthenticated remote code execution. Known ransomware use: Known.
NetScaler ADC and NetScaler Gateway
criticalCVE-2023-3519
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 93.8% EPSS.
Citrix Application Delivery Controller (ADC) and Gateway Authentication Bypass Vulnerability
Citrix Application Delivery Controller (ADC) and Gateway, when configured with SAML SP or IdP configuration, contain an authentication bypass vulnerability that allows an attacker to execute code as administrator.
Application Delivery Controller (ADC) and Gateway
criticalCVE-2022-27518
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 27.7% EPSS.
Citrix ShareFile Improper Access Control Vulnerability
Improper Access Control in Citrix ShareFile storage zones controller may allow an unauthenticated attacker to remotely compromise the storage zones controller. Known ransomware use: Known.
ShareFile
criticalCVE-2021-22941
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 88.5% EPSS.
Citrix StoreFront Server XML External Entity (XXE) Processing Vulnerability
Citrix StoreFront Server contains an XML External Entity (XXE) processing vulnerability that may allow an unauthenticated attacker to retrieve potentially sensitive information. Known ransomware use: Known.
StoreFront Server
criticalCVE-2019-13608
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 71.3% EPSS.
Citrix ADC, Gateway, and SD-WAN WANOP Appliance Authorization Bypass Vulnerability
Citrix ADC, Citrix Gateway, and multiple Citrix SD-WAN WANOP appliance models contain an authorization bypass vulnerability that may allow unauthenticated access to certain URL endpoints. The attacker must have access to the NetScaler IP (NSIP) in order to perform exploitation.
Application Delivery Controller (ADC), Gateway, and SD-WAN WANOP Appliance
criticalCVE-2020-8193
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 94.4% EPSS.
Citrix ADC, Gateway, and SD-WAN WANOP Appliance Code Execution Vulnerability
Citrix ADC, Citrix Gateway, and multiple Citrix SD-WAN WANOP appliance models contain an unspecified vulnerability that could allow an unauthenticated attacker to perform code execution. Known ransomware use: Known.
Application Delivery Controller (ADC), Gateway, and SD-WAN WANOP Appliance
criticalCVE-2019-19781
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 94.4% EPSS.
Citrix Workspace Application and Receiver for Windows Remote Code Execution Vulnerability
Citrix Workspace Application and Receiver for Windows contains remote code execution vulnerability resulting from local drive access preferences not being enforced into the clients' local drives. Known ransomware use: Known.
Workspace Application and Receiver for Windows
criticalCVE-2019-11634
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 30.8% EPSS.
It is the Citrix-specific view inside ITECS Threat Radar, built to track recent advisories, incidents, and watch items that may affect Dallas-area business operations.
How should teams use the Citrix watch page?
Use it to confirm whether current Citrix issues overlap with your environment, prioritize remediation, and decide whether you need an assessment, managed security follow-through, or vendor-specific hardening work.
Can ITECS help respond to Citrix security issues?
Yes. ITECS can help map Citrix advisories against your systems, validate affected services, prioritize remediation, and connect the issue to broader managed cybersecurity or managed IT workflows.