[CVE] CVE-2026-3055 Citrix NetScaler ADC Memory Disclosure Unauthenticated Edge Exploitation

Report Type
Threat Intelligence Assessment

Threat Category
Exploit Framework Activity
Multi-Stage Exploitation Chain
Client-Side Exploitation and Malware Delivery

Assessment Date
March 26, 2026

Primary Impact Domain
Endpoint Security (iOS / Mobile Platform)
Exploit Chain Execution and Detection Evasion
Device-Level Trust Boundaries and Telemetry Visibility


BLUF

 Internet-facing NetScaler ADC appliances configured as SAML Identity Providers expose organizations to unauthorized access risk because the vulnerability allows unauthenticated retrieval of authentication-related memory at the identity boundary. The issue is caused by improper input validation leading to memory overread conditions during request processing. Exploitation likelihood is high and time-compressed, with an assessed 82% probability of inclusion in the CISA Known Exploited Vulnerabilities catalog based on exposure conditions and exploit feasibility; EEP is a forward-looking analytic measure of operational exploitation potential, not a statement of confirmed exploitation, KEV inclusion, or incident activity. Executives should immediately identify and patch all exposed NetScaler SAML Identity Provider deployments and treat unpatched systems as active identity compromise risk.

Executive Risk Translation

This vulnerability enables direct exposure of authentication data from an internet-facing control point, creating risk of session misuse, unauthorized access, and loss of trust in identity enforcement mechanisms.

S3 Why This Matters Now

·        The vulnerability affects NetScaler ADC systems operating as SAML Identity Providers, placing authentication infrastructure directly at risk from unauthenticated network access.

·        The exploit requires no authentication, enabling automated scanning and rapid targeting of exposed appliances.

·        The memory disclosure condition creates the potential exposure of authentication tokens, session data, and credential artifacts during request handling.

·        Exposure is configuration-dependent, and organizations may lack visibility into where SAML Identity Provider functionality is enabled across deployments.

·        The assessed 82% likelihood of KEV inclusion indicates a strong probability of near-term exploitation activity.

S4 Key Judgments

·        CVE-2026-3055 is a high-impact identity-boundary vulnerability due to unauthenticated access to sensitive memory on internet-facing NetScaler ADC systems.

·        The highest-risk environments are those using NetScaler ADC as a SAML Identity Provider within federated authentication architectures.

·        The vulnerability enables exposure of authentication material, including session and credential artifacts, which can be leveraged for unauthorized access.

·        Unauthenticated exploitability enables large-scale scanning and opportunistic exploitation.

·        Delayed remediation increases exposure during the initial post-disclosure exploitation window.

S5 Executive Risk Summary

Business Risk

Compromise of authentication infrastructure at the network edge introduces the risk of unauthorized access, session misuse, and degradation of identity trust across enterprise systems.

Technical Cause

Improper input validation in NetScaler ADC request handling results in memory overread conditions exposing sensitive system memory.

Threat Posture

Exploitation conditions are favorable due to unauthenticated access and direct exposure of identity infrastructure, increasing the likelihood of rapid attacker targeting.

Executive Decision Requirement

Immediate identification and patching of all affected NetScaler ADC systems configured as SAML Identity Providers is required.

S6 Executive Cost Summary

This cost analysis was developed by the CyberDax team using expert judgment and assisted analytical tools to support clarity and consistency.

·        Low Impact $150,000 to $500,000
Rapid remediation with limited exposure duration, no confirmed authentication data exposure, and minimal disruption to identity or access services.

·        Moderate Impact $500,000 to $2 million
Emergency patching across multiple systems, authentication data validation, targeted credential rotation, and short-term disruption to SSO, VPN, or federated access workflows requiring user re-authentication.

·        High Impact $2 million to $7 million
Suspected or confirmed exposure of authentication or session data requiring enterprise-wide credential resets, forced re-authentication across identity platforms, disruption to access-dependent business operations, and full incident response engagement.

S6A Key Cost Drivers

·        Presence of internet-facing NetScaler ADC systems configured as SAML Identity Providers.

·        Duration of exposure prior to remediation.

·        Scope of identity infrastructure dependent on affected systems.

·        Requirement for credential rotation, token invalidation, and session reset.

·        Operational dependence on NetScaler for remote access and authentication workflows.

S6B Compliance and Risk Context

Compliance Exposure Indicator

Elevated due to potential compromise of authentication systems and identity-related data, which may trigger incident response, audit validation, and access control review obligations.

Risk Register Entry

Critical exposure of NetScaler ADC identity infrastructure due to unauthenticated memory disclosure vulnerability affecting SAML Identity Provider configurations.

Annualized Risk Exposure

Estimated at $300,000 to $4.5 million annually during the active exposure window, driven by exploitation likelihood and the impact of compromised authentication infrastructure at the network edge.

Risk Drivers

·        Internet exposure of NetScaler ADC appliances.

·        SAML Identity Provider configuration enabling vulnerability conditions.

·        Unauthenticated exploitability.

·        Exposure of sensitive memory containing authentication-related data.

·        High probability of near-term attacker targeting.

S8 Bottom Line for Executives

·        Identify and patch all NetScaler ADC systems configured as SAML Identity Providers without delay.

·        Treat any unpatched system as an identity compromise risk due to unauthenticated memory exposure.

·        Validate authentication integrity after remediation, including session handling and access control behavior.

S9 Board-Level Takeaway

·        The vulnerability affects a critical identity control layer responsible for authentication and enterprise access enforcement.

·        Governance focus should be on rapid remediation, validation of affected configurations, and assurance of identity system integrity post-remediation.

·        Management should confirm that exposure was identified, remediated, and validated within an accelerated response window.


S10 Vulnerability Overview

Vulnerability Type

Memory Disclosure via Out-of-Bounds Read

Affected Systems

Citrix NetScaler ADC instances configured as SAML Identity Providers

Exposure Conditions

·        SAML Identity Provider functionality enabled

·        Appliance is network-accessible (typically internet-facing)

·        Vulnerable firmware version in use

Privilege Requirements

None — unauthenticated exploitation

Attack Vector

Remote network-based interaction with exposed NetScaler ADC services

S11 Technical Vulnerability Details

Root Cause

Improper input validation in request-processing routines leading to out-of-bounds memory read conditions

Vulnerable Component

NetScaler ADC SAML Identity Provider request-handling logic

Trigger Mechanism

Crafted input processed by the SAML request-handling pipeline causes the system to read beyond intended memory boundaries

Exploitable Condition

The appliance processes attacker-controlled input within the SAML IdP workflow without sufficient boundary validation, exposing portions of process memory during request handling, including authentication-related data

S12 Exploitability Assessment

Exploit Complexity

Low — exploitation requires only crafted network requests without complex chaining

Authentication Requirements

None — vulnerability is exploitable without valid credentials

Network Exposure

High — commonly deployed as an internet-facing identity service

Operational Constraints

No specialized environmental dependencies or race conditions required; exploit reliability is driven primarily by exposure and configuration rather than timing or system state

S13 KEV Status and Patch Availability

KEV Status

Not listed in the CISA Known Exploited Vulnerabilities catalog as of report development

Patch Availability

Vendor-provided patches available for supported NetScaler ADC versions

Remediation Priority

Critical — immediate remediation required for exposed systems

KEV Likelihood Assessment (EEP)

Assessed at 82% likelihood of KEV inclusion based on unauthenticated exploitability, exposure at the identity boundary, and similarity to previously exploited NetScaler memory disclosure vulnerabilities; EEP is a forward-looking analytic measure of operational exploitation potential, not a statement of confirmed exploitation, KEV inclusion, or incident activity.

S14 Sectors / Countries Affected

Sectors Affected

·        Enterprise IT and Identity Infrastructure

·        Financial Services

·        Healthcare

·        Government

·        Technology and SaaS providers

·        Organizations using federated authentication or remote access via NetScaler

Countries Affected

·       Global

o   Exposure determined by deployment of affected systems rather than geographic targeting

S15 Adversary Capability Profiling

Skill Level

Low to moderate — requires ability to craft and deliver malformed network requests targeting exposed SAML endpoints

Tooling Requirements

·        Basic HTTP/S request manipulation

·        Easily automatable scanning capability

Infrastructure Needs

·        Standard internet-based scanning infrastructure

Operational Scale

High — vulnerability characteristics support rapid scanning and broad opportunistic targeting across exposed systems

S16 Targeting Probability Assessment

Organizations operating internet-facing NetScaler ADC systems configured as SAML Identity Providers have a high probability of targeting due to the direct exposure of authentication infrastructure, the absence of authentication requirements, and the potential to obtain authentication-related memory data. Environments with centralized identity services and federated authentication dependencies present elevated targeting value due to the potential impact of compromised authentication material.

S17 MITRE ATT&CK Chain Flow Mapping

Initial Access — T1190 Exploit Public-Facing Application

·        Attacker sends crafted requests to an exposed NetScaler ADC SAML Identity Provider endpoint to trigger memory overread behavior

Credential Access — T1555 Credentials from Password Stores (Adapted to Application Memory Exposure Context)

·        Authentication-related data, including session tokens or credential artifacts, is retrieved from exposed application memory during request processing

S18 Attack Path Narrative

An attacker initiates exploitation by sending crafted network requests to an internet-facing NetScaler ADC appliance configured as a SAML Identity Provider. These requests interact with the SAML processing workflow, targeting input handling within the request parsing logic.


During processing, insufficient boundary validation results in an out-of-bounds memory read condition. As a result, portions of process memory associated with authentication handling may be exposed as part of the system’s response behavior or processing outcome.


The exposed memory can contain authentication-related artifacts present at the time of request handling, such as session tokens, credential fragments, or identity assertion data. The scope and usefulness of retrieved data depend on the state of memory during processing.


This sequence enables retrieval of authentication-related data without requiring valid credentials or prior access to the system.

S19 Attack Chain Risk Amplification Summary

·        The vulnerability affects an identity boundary system, increasing operational impact relative to internal application-layer weaknesses.

·        Unauthenticated exploitability enables rapid enumeration and targeting of exposed NetScaler deployments.

·        Exposure of authentication-related memory complicates validation of affected sessions, identities, and trust relationships during incident response.

·        Authentication artifact exposure increases the likelihood of session misuse without triggering authentication controls.

·        Configuration-dependent exposure reduces visibility into affected systems, increasing the probability of unrecognized risk prior to exploitation.


S20 Tactics, Techniques, and Procedures

T1190 – Exploit Public-Facing Application
Attackers deliver crafted requests to exposed NetScaler ADC SAML Identity Provider endpoints, specifically targeting request parsing routines to trigger memory boundary violations during SAML processing.

T1555 – Credentials from Password Stores (Adapted to Application Memory Exposure Context)
Attackers retrieve authentication-related artifacts, including session tokens, credential fragments, or identity assertions, from process memory exposed during request handling; while not a traditional credential store, this mapping reflects extraction of usable authentication material from application-resident memory.

S20A Adversary Tradecraft Summary

Attackers are likely to exploit this vulnerability to obtain authentication artifacts directly from identity infrastructure without interacting with user-driven credential collection mechanisms. This approach targets weaknesses in SAML processing logic rather than authentication workflows.

The primary objective is to obtain usable session tokens or identity assertions that may allow access to federated services or authenticated application flows, depending on the validity and scope of the exposed data at the time of exploitation.

This tradecraft enables large-scale targeting of internet-facing NetScaler deployments where identity services are externally accessible, as well as focused exploitation of environments where SAML-based authentication provides access to enterprise systems.

S21 Detection Strategy Overview

Detection of CVE-2026-3055 requires identification of anomalous interactions with NetScaler ADC systems performing SAML Identity Provider functions, specifically targeting request parsing behavior associated with authentication workflows. The exploit operates through syntactically valid but structurally manipulated requests, requiring behavioral detection rather than signature matching.

Effective detection relies on correlation across:

·        abnormal SAML request handling at the network layer

·        inconsistencies in authentication and session behavior

·        deviations in request-response characteristics associated with identity workflows

Detection should prioritize identifying:

·        anomalies in SAML request structure and processing

·        mismatches between authentication events and session usage

·        repeated targeting patterns against IdP endpoints

S22 Primary Detection Signals

Network Telemetry (Primary Signal Source)

·        Abnormal HTTP POST requests to SAML IdP endpoints with atypical content length relative to baseline traffic

·        SAML requests with irregular encoding, structure, or parameter distribution inconsistent with normal authentication flows

·        Repeated access to SAML endpoints without corresponding authentication completion patterns

·        Request-response size asymmetry suggesting abnormal data returned from authentication endpoints

Identity / Authentication Telemetry (Secondary Signal Source)

·        Session tokens used without corresponding successful authentication events

·        Authentication flows where session establishment does not align with expected SAML assertion exchange patterns

·        Reuse of authentication artifacts across different client IPs or geographic locations without re-authentication

Network Behavior Correlation Signals

·        High-frequency targeting of SAML IdP endpoints from single or distributed IP sources

·        Sequential probing behavior against authentication endpoints indicating automated request generation

S23 Telemetry Requirements

Network / Proxy / Load Balancer Logs

o   Full HTTP/S request and response logging for SAML IdP endpoints

o   Content length, request method, and endpoint visibility

TLS Inspection Capability (Critical Dependency)

o   Required to inspect SAML payload structure and detect malformed or manipulated requests

o   Without TLS inspection, detection is limited to volumetric or behavioral anomalies

Identity Provider Logs

o   SAML assertion generation, validation, and session creation events

o   Token issuance and reuse tracking

NetScaler ADC Logs

o   Request processing logs tied to SAML workflows

o   Error or anomaly indicators during request parsing

Network Flow Telemetry

o   Source IP targeting patterns

o   Correlation of repeated access to authentication endpoints


S24 Detection Opportunities and Gaps

Detection Opportunities

·        Identification of abnormal SAML request structure through payload inspection

·        Detection of request-response size anomalies associated with memory exposure

·        Correlation of network anomalies with authentication inconsistencies

·        Detection of session usage patterns that bypass expected authentication workflows

Detection Gaps

·        Lack of direct visibility into process memory exposure within NetScaler appliances

·        Inability to inspect SAML payloads in environments without TLS decryption

·        Difficulty distinguishing crafted exploit requests from legitimate but atypical SAML traffic

·        Limited native logging of request parsing anomalies within NetScaler environments

S25 Ultra-Tuned Detection Engineering Rules

S25 Group 1 — Initial Access and Credential Exposure

Suricata

Rule Name

CyberDax NetScaler SAML IdP Oversized POST Request

Purpose

Detect materially oversized HTTP POST requests to locally validated NetScaler SAML Identity Provider endpoints that exceed expected SAML request norms and may indicate exploit payload shaping associated with CVE-2026-3055 targeting.

ATT&CK Technique

T1190 – Exploit Public-Facing Application

Telemetry Dependency

·        Suricata with HTTP parser enabled

·        HTTP traffic visible in cleartext or through a decryption or inspection point

·        HTTP method visibility

·        HTTP header visibility including Content-Length

·        URI visibility

·        Validated NetScaler SAML IdP destination scoping

Tuning Explanation

·        $NETSCALER_IDP_HOSTS must contain only confirmed NetScaler ADC assets serving SAML IdP traffic

·        The URI pattern is a deployment template and must be reduced or confirmed against actual IdP paths before production deployment

·        The Content-Length threshold must be tuned using local SAML request-size observations

·        Environments with large signed, compressed, or brokered SAML requests may require higher thresholds

·        If HTTP traffic is not visible, this rule is not executable as written

Detection Logic

·        Require HTTP POST

·        Require targeting of locally validated SAML IdP paths

·        Require request size materially above tuned local expectation

·        Surface exploit-shaping behavior, not confirmed exploitation

Operational Context

Use as an early network-layer exploit-shaping signal where HTTP request metadata is visible and validated IdP paths are known.

Logical Notes

Conditional

·        Requires local IdP path validation before deployment

·        Requires tuned request-size thresholds based on environment

·        Not executable where TLS inspection is not available

·        Should not be treated as exploit confirmation by itself

Rule Regret Check

·        Deployment caution
Validate local IdP paths and normal SAML request-size ranges before production deployment to reduce avoidable false positives.

·        Confidence caution
Treat this as an exploit-shaping indicator, not proof of successful exploitation.

·        Coverage value
This rule provides useful early network-layer visibility where HTTP metadata is available and request-size patterns are stable.

Execution Validity Status

Conditional production-ready

System-Ready Code

alert http $EXTERNAL_NET any -> $NETSCALER_IDP_HOSTS any (
    msg:"CYBERDAX NetScaler SAML IdP oversized POST request";
    flow:to_server,established;
    http.method; content:"POST";
    http.uri; pcre:"/\/(saml|saml\/login|saml\/idp|cgi\/saml|nf\/auth\/saml)(\/|$|\?)/Ui";
    http.header; pcre:"/Content-Length\x3a\s([5-9][0-9]{3,}|[1-9][0-9]{4,})/Hi";
    classtype:web-application-attack;
    sid:7306001; rev:2;
)

Rule Name

CyberDax NetScaler SAML IdP Repeated External POST Targeting

Purpose

Detect repeated external HTTP POST targeting of locally validated NetScaler SAML IdP endpoints from non-approved sources, consistent with exploit preparation or sustained hostile pressure against exposed identity infrastructure.

ATT&CK Technique

T1190 – Exploit Public-Facing Application

Telemetry Dependency

·        Suricata with HTTP parser enabled

·        HTTP traffic visible in cleartext or through a decryption or inspection point

·        HTTP method visibility

·        URI visibility

·        Source IP visibility

·        Validated NetScaler SAML IdP destination scoping

Tuning Explanation

·        $NETSCALER_IDP_HOSTS must contain only confirmed NetScaler ADC assets serving SAML IdP traffic

·        URI paths must be locally validated before production use

·        Request-count thresholds must be tuned against real SSO traffic patterns, especially where partner federation or synthetic monitoring exists

·        Approved scanners, health checks, and federation test sources should be excluded outside the rule where possible

·        If HTTP traffic is not visible, this rule is not executable as written

Detection Logic

·        Require HTTP POST

·        Require targeting of locally validated SAML IdP paths

·        Detect repeated requests from the same external source over a short interval

·        Surface sustained endpoint pressure, not confirmed exploit success

Operational Context

Use as a network-layer pre-exploitation pressure analytic where HTTP request metadata and source tracking are visible.

Logical Notes

Conditional

·        Requires local IdP path validation before deployment

·        Requires threshold tuning against normal SSO patterns

·        Not executable where HTTP visibility is unavailable

·        Should not be treated as proof of compromise

Rule Regret Check

·        Deployment caution
Tune thresholds against legitimate federation and SSO patterns before alerting to avoid unnecessary noise.

·        Confidence caution
Repeated targeting indicates pressure or preparation, but not confirmed exploit success.

·        Coverage value
This rule is useful for surfacing repeated hostile attention against exposed IdP assets before stronger exploit-specific signals appear.

Execution Validity Status

Conditional production-ready

System-Ready Code

alert http $EXTERNAL_NET any -> $NETSCALER_IDP_HOSTS any (
    msg:"CYBERDAX NetScaler SAML IdP repeated external POST targeting";
    flow:to_server,established;
    http.method; content:"POST";
    http.uri; pcre:"/\/(saml|saml\/login|saml\/idp|cgi\/saml|nf\/auth\/saml)(\/|$|\?)/Ui";
    detection_filter:track by_src, count 6, seconds 120;
    classtype:web-application-attack;
    sid:7306002; rev:1;
)

Rule Name

CyberDax NetScaler SAML IdP High-Rate Burst Targeting

Purpose

Detect short-duration burst targeting of locally validated NetScaler SAML IdP endpoints from a single external source, consistent with automated exploit staging, endpoint validation, or rapid exploit-delivery pressure.

ATT&CK Technique

T1190 – Exploit Public-Facing Application

Telemetry Dependency

·        Suricata with HTTP parser enabled

·        HTTP method visibility

·        URI visibility

·        Source IP visibility

·        Validated NetScaler SAML IdP destination scoping

·        HTTP visibility required

Tuning Explanation

·        This rule is intentionally distinct from repeated-targeting logic by focusing on compressed high-rate activity rather than sustained access

·        URI paths must be locally validated before production use

·        Burst thresholds should be tuned against legitimate federation failover testing and approved synthetic traffic

·        In environments with poor HTTP visibility or unstable IdP pathing, this should remain supporting only

Detection Logic

·        Require HTTP POST to validated IdP paths

·        Detect high-rate source activity within a short interval

·        Surface aggressive automated ingress behavior

Operational Context

Use as a supporting network-layer analytic for fast exploit-preparation bursts against exposed IdP endpoints.

Logical Notes

Conditional

·        Requires local path validation

·        Requires threshold tuning

·        Not executable where HTTP visibility is unavailable

·        Best used as a supporting pressure signal, not a standalone compromise analytic

Rule Regret Check

·        Deployment caution
Tune burst thresholds against legitimate high-volume authentication or failover behavior before operational use.

·        Confidence caution
Treat this as a pressure or automation indicator rather than a standalone compromise signal.

·        Coverage value
This rule can help surface rapid exploit-staging activity that slower repeated-targeting analytics may not catch quickly.

Execution Validity Status
Conditional production-ready

System-Ready Code

alert http $EXTERNAL_NET any -> $NETSCALER_IDP_HOSTS any (
    msg:"CYBERDAX NetScaler SAML IdP high-rate burst targeting";
    flow:to_server,established;
    http.method; content:"POST";
    http.uri; pcre:"/\/(saml|saml\/login|saml\/idp|cgi\/saml|nf\/auth\/saml)(\/|$|\?)/Ui";
    detection_filter:track by_src, count 12, seconds 45;
    classtype:web-application-attack;
    sid:7306003; rev:1;
)

SentinelOne

Rule Name

CyberDax NetScaler Service-Lineage Suspicious Interpreter Execution

Purpose

Detect suspicious shell, interpreter, or retrieval utility execution spawned by NetScaler-facing service processes on VPX or other host-observable NetScaler deployments, consistent with exploit-consequence behavior following malformed SAML request handling.

ATT&CK Technique

T1190 – Exploit Public-Facing Application

Telemetry Dependency

·        SentinelOne process telemetry

·        Parent-child process lineage

·        Command-line visibility

·        Host-observable NetScaler deployment model, such as VPX

·        Confirmed usable process field model in the tenant

Tuning Explanation

·        Scope only to confirmed NetScaler VPX or host-observable asset groups

·        Validate actual parent service lineage in the local deployment before production use

·        Suppress maintenance, support, diagnostics, and upgrade activity explicitly

·        Do not treat this as universal appliance coverage

·        Do not treat the provided field names as guaranteed tenant-exact syntax without confirmation

·        This rule should remain conditional because the primary observed exploit chain is network and identity oriented, not endpoint oriented

Detection Logic

·        NetScaler service-lineage process spawns shell, interpreter, or retrieval utility

·        Child process shows inline command execution, temp-path execution, or retrieval behavior

·        Exclude known maintenance and support activity

Operational Context

Use as a host-side exploit-consequence analytic in VPX or host-observable NetScaler deployments where process lineage is available and trustworthy. This is a supporting rule, not a primary detection layer for this CVE.

Logical Notes

Local adaptation required

·        Field names are not universally consistent across SentinelOne tenants

·        Requires tenant-specific query validation and mapping

·        Requires confirmed NetScaler service lineage in environment

·        Not executable as written without tenant validation

·        Not applicable to appliance-only deployments

Rule Regret Check

·        Deployment caution
Validate tenant field mappings and local NetScaler service lineage before production use.

·        Confidence caution
Treat this as a host-side exploit-consequence signal, not universal proof of compromise across all NetScaler form factors.

·        Coverage value
This rule is valuable only in VPX or other host-observable deployments where strong process telemetry exists and request-layer visibility may be incomplete.

Execution Validity Status

Local adaptation required

System-Ready Code (tenant-adaptation template)

endpoint.name matches "(?i)(netscaler|adc|citrix-adc|ns-vpx|idp)"
and event.type = "Process Creation"
and src.process.name matches "(?i)^(nsapimgr|nsppe|httpd|nginx|perl|python)$"
and tgt.process.name matches "(?i)^(bash|sh|dash|python|python3|perl|curl|wget|nc|netcat)$"
and (
  tgt.process.cmdline matches "(?i)(\\s-c\\s|/tmp/|/var/tmp/|wget\\s|curl\\s|python\\s+-c|python3\\s+-c|nc\\s)"
  or tgt.process.image.path matches "(?i)^(/tmp/|/var/tmp/)"
)
and not tgt.process.cmdline matches "(?i)(approved-maintenance-window|vendor-support-session|backup-job|health-check|known-admin-script|netscaler-upgrade|support-bundle)"

Splunk

Splunk

System Positioning

Splunk provides the primary detection layer for this report because it can observe:

·        exploit interaction behavior at the HTTP layer

·        response anomalies consistent with memory disclosure

·        identity and session misuse following authentication artifact exposure

The rules below map strictly to the report’s observed chain:

·        T1190 – Exploit Public-Facing Application

·        T1555 – Credentials from Password Stores (Adapted to Application Memory Exposure Context)

No additional behaviors are introduced.

Rule Name

CyberDax NetScaler SAML IdP Request Size Deviation from Local Baseline

Purpose

Detect HTTP POST requests to NetScaler SAML Identity Provider endpoints whose request size materially exceeds normal behavior, indicating malformed or exploit-driven request construction.

ATT&CK Technique

T1190 – Exploit Public-Facing Application

Telemetry Dependency

·        Web, proxy, WAF, or load-balancer logs

·        Request byte or content-length visibility

·        URI and HTTP method visibility

Tuning Explanation

·        Establish local baseline per IdP endpoint

·        Tune deviation threshold using real SAML traffic

·        Restrict to validated IdP paths

Detection Logic

·        POST to SAML endpoint

·        Request size exceeds normal baseline

Operational Context

Primary exploit-shaping detection where request size anomalies are observable.

Logical Notes
Conditional

·        Requires stable request-size telemetry

·        Requires local baseline or threshold tuning

Rule Regret Check

Deployment caution

Tune thresholds using real SAML traffic before alerting.

Confidence caution

Large requests alone do not confirm exploitation.

Coverage value

Strong early signal of malformed exploit requests.

Execution Validity Status

Conditional production-ready

System-Ready Code

index=web OR index=proxy OR index=waf
| eval uri=coalesce(uri, request_uri)
| eval method=upper(coalesce(method, http_method))
| eval size=coalesce(request_bytes, bytes_in, content_length)
| where method="POST"
| where like(uri,"%/saml%")
| eventstats avg(size) as avg_size stdev(size) as std_size by uri
| where size > avg_size + (3*std_size)

Rule Name

CyberDax NetScaler SAML IdP Request-to-Response Size Asymmetry

Purpose

Detect disproportionate response sizes relative to request size on SAML IdP endpoints, indicating possible memory disclosure behavior.

ATT&CK Technique

T1555 – Credentials from Password Stores (Adapted to Application Memory Exposure Context)

Telemetry Dependency

·        Web, proxy, WAF, or load-balancer logs

·        Request and response byte visibility

Tuning Explanation

·        Tune ratio threshold based on normal SAML exchanges

·        Restrict to validated IdP endpoints

Detection Logic

·        POST to SAML endpoint

·        Response size significantly larger than request

Operational Context

Primary memory-disclosure signal detection.

Logical Notes

Conditional

·        Requires reliable request/response byte fields

Rule Regret Check

Deployment caution

Validate response size fidelity before enabling.

Confidence caution

High ratios indicate anomaly, not guaranteed data exposure.

Coverage value

One of the strongest practical signals for this vulnerability.

Execution Validity Status

Conditional production-ready

System-Ready Code

index=web OR index=proxy OR index=waf
| eval uri=coalesce(uri, request_uri)
| eval method=upper(coalesce(method, http_method))
| eval req_bytes=coalesce(request_bytes, bytes_in)
| eval resp_bytes=coalesce(response_bytes, bytes_out)
| where method="POST"
| where like(uri,"%/saml%")
| where req_bytes > 0
| eval ratio=resp_bytes/req_bytes
| where ratio > 5

Rule Name

CyberDax SAML Session Activity Without Expected Authentication Event

Purpose

Detect session or token usage without a corresponding authentication event, indicating possible reuse of exposed authentication artifacts.

ATT&CK Technique

T1555 – Credentials from Password Stores (Adapted to Application Memory Exposure Context)

Telemetry Dependency

·        Identity or authentication logs

·        Session or token identifiers

·        Authentication success events

Tuning Explanation

·        Normalize session or token identifiers

·        Baseline expected federation and service-account flows

·        Use a bounded correlation window to reduce false positives caused by delayed logging or long-lived benign sessions

Detection Logic

·        Session or token use observed

·        No corresponding recent authentication or issuance event

Operational Context

Primary detection for post-exposure session misuse.

Logical Notes

Conditional

·        Requires session or token correlation capability

·        Requires normalized identity action values

Rule Regret Check

Deployment caution

Validate identity field mappings and event sequencing before alerting.

Confidence caution
May include edge-case federation behavior if not tuned.

Coverage value
Directly targets authentication artifact misuse.

Execution Validity Status

Conditional production-ready

System-Ready Code

index=auth OR index=identity
| eval session_id=coalesce(session_id, token_id, assertion_id, auth_context_id)
| eval action=coalesce(action, event_name, operation)
| where action IN ("session_start","session_validate","token_use","assertion_consume")
| join type=left session_id [
    search index=auth OR index=identity
    | eval session_id=coalesce(session_id, token_id, assertion_id, auth_context_id)
    | eval action=coalesce(action, event_name, operation)
    | where action IN ("authentication_success","assertion_issue","token_issue")
    | stats latest(_time) as auth_time by session_id
]
| eval delta=_time-auth_time
| where isnull(auth_time) OR delta < 0 OR delta > 3600

Rule Name

CyberDax Authentication Token Reuse Across Distinct Source Contexts

Purpose

Detect reuse of the same session or token across multiple source IPs, indicating possible use of exposed authentication artifacts.

ATT&CK Technique

T1555 – Credentials from Password Stores (Adapted to Application Memory Exposure Context)

Telemetry Dependency

·        Identity or authentication logs

·        Session or token identifiers

·        Source IP visibility

Tuning Explanation

·        Baseline expected user mobility and proxy behavior

·        Tune threshold based on environment

·        Run over a bounded observation window to reduce false positives from long-lived sessions

Detection Logic

·        Same session or token used from multiple source IPs within a bounded period

Operational Context

Detects early-stage token reuse following exposure.

Logical Notes

Conditional

·        Requires reliable session and IP correlation

·        Stronger where proxy and roaming patterns are well understood

Rule Regret Check

·        Deployment caution
Account for VPNs and proxies before alerting.

·        Confidence caution
Multiple IPs may occur in legitimate scenarios.

·        Coverage value
Practical indicator of session or token misuse.

Execution Validity Status

Conditional production-ready

System-Ready Code

index=auth OR index=identity
| eval session_id=coalesce(session_id, token_id, assertion_id, auth_context_id)
| eval src_ip=coalesce(src_ip, client_ip)
| stats dc(src_ip) as ip_count values(src_ip) as src_ips earliest(_time) as first_seen latest(_time) as last_seen by session_id
| eval session_span=last_seen-first_seen
| where ip_count > 1 AND session_span <= 86400


S25 Group 1 — Initial Access and Credential Exposure

Detection Family — Authentication Endpoint Abuse, Enumeration, and Pre-Exploitation Pressure

Family Positioning

This rule family is designed to surface early hostile interaction patterns against exposed NetScaler SAML Identity Provider infrastructure before or alongside exploit-shaping behavior. It focuses on:

·        repeated non-trusted targeting of validated IdP endpoints

·        short-window burst pressure suggestive of automated staging

·        multi-asset probing behavior

·        host-side request-handling stress signals in VPX / host-observable deployments

·        SIEM-layer correlation of persistent endpoint abuse patterns

This family is strongest where:

·        external IdP paths are known and locally validated

·        trusted-source suppression is available

·        source IP fidelity is stable

·        HTTP metadata is visible at the network or logging layer

·        host-observable NetScaler deployments exist for endpoint correlation

Within this family:

Primary detections are the Splunk repeated-targeting and pressure-correlation analytics where normalized logging and trusted-source controls exist

Supporting detections are the Suricata ingress-pressure rules where HTTP visibility exists

Conditional detections are the SentinelOne host-side service-abuse analytics in VPX or other host-observable deployments

Suricata

Rule Name

CyberDax NetScaler SAML IdP Repeated External POST Pressure

Purpose

Detect repeated external HTTP POST targeting of locally validated NetScaler SAML IdP endpoints from non-approved sources, consistent with exploit staging, endpoint abuse, or persistent hostile pressure against exposed identity infrastructure.

ATT&CK Technique

T1190 – Exploit Public-Facing Application
T1595 – Active Scanning

Telemetry Dependency

·        Suricata with HTTP parser enabled

·        HTTP traffic visible in cleartext or through a decryption / inspection point

·        HTTP method visibility

·        URI visibility

·        Source IP visibility

·        Validated NetScaler SAML IdP destination scoping

Tuning Explanation

·        NETSCALER_IDP_HOSTS must include only confirmed NetScaler ADC assets serving SAML IdP traffic

·        The URI pattern is a deployment template and must be reduced or replaced with exact locally validated IdP paths before production use

·        Request-count thresholds must be tuned against real SSO traffic patterns, federation partner behavior, and approved synthetic monitoring

·        Known scanners, health checks, and partner testing sources should be suppressed outside the rule where possible

·        If HTTP traffic is not visible, this rule is not executable as written

Detection Logic

·        Require HTTP POST

·        Require targeting of locally validated SAML IdP paths

·        Detect repeated requests from the same external source over a short interval

·        Surface sustained abusive pressure, not confirmed exploit success

Operational Context

Use as a network-layer pre-exploitation pressure analytic where HTTP metadata and source tracking are visible.

Logical Notes

Conditional

·        Requires local IdP path validation before deployment

·        Requires threshold tuning against normal SSO behavior

·        Not executable where HTTP visibility is unavailable

·        Should not be treated as proof of compromise by itself

Rule Regret Check

·        Deployment caution
Tune request-count thresholds against legitimate SSO and federation patterns before production use.

·        Confidence caution
Repeated endpoint pressure indicates hostile attention or staging, not confirmed exploit success.

·        Coverage value
This rule helps surface persistent pre-exploitation pressure that may precede stronger exploit-specific signals.

Execution Validity Status

Conditional production-ready

System-Ready Code

alert http $EXTERNAL_NET any -> $NETSCALER_IDP_HOSTS any (
    msg:"CYBERDAX NetScaler SAML IdP repeated external POST pressure";
    flow:to_server,established;
    http.method; content:"POST";
    http.uri; pcre:"/\/(saml|saml\/login|saml\/idp|cgi\/saml|nf\/auth\/saml)(\/|$|\?)/Ui";
    detection_filter:track by_src, count 8, seconds 90;
    classtype:web-application-attack;
    sid:7305401; rev:3;
)

Rule Name

CyberDax NetScaler SAML IdP Short-Window Burst Abuse

Purpose

Detect compressed, high-rate burst targeting of locally validated NetScaler SAML IdP endpoints from a single external source, consistent with automated staging, endpoint validation, or rapid exploit-delivery pressure.

ATT&CK Technique

T1190 – Exploit Public-Facing Application
T1595 – Active Scanning

Telemetry Dependency

·        Suricata with HTTP parser enabled

·        HTTP method visibility

·        URI visibility

·        Source IP visibility

·        Validated NetScaler SAML IdP destination scoping

·        HTTP visibility required

Tuning Explanation

·        This rule is intentionally distinct from repeated-pressure logic by focusing on compressed high-rate activity rather than sustained access

·        URI paths must be locally validated before production use

·        Burst thresholds must be tuned against approved synthetic traffic, federation failover testing, and legitimate high-volume SSO bursts

·        In environments with unstable IdP routing or poor HTTP visibility, keep this supporting only

Detection Logic

·        Require HTTP POST to validated IdP paths

·        Detect high-rate source activity in a short interval

·        Surface aggressive automated ingress behavior

Operational Context

Use as a supporting network-layer analytic for rapid pre-exploitation pressure against exposed IdP endpoints.

Logical Notes

Conditional

·        Requires local path validation

·        Requires threshold tuning

·        Not executable where HTTP visibility is unavailable

·        Best used as a supporting automation / staging signal, not a standalone compromise analytic

Rule Regret Check

·        Deployment caution
Calibrate burst thresholds carefully against legitimate high-volume identity events before production alerting.

·        Confidence caution
Treat burst activity as an automation or staging signal, not direct evidence of successful exploitation.

·        Coverage value
This rule can expose fast-moving abuse patterns that slower repeated-targeting analytics may miss initially.

Execution Validity Status

Conditional production-ready

System-Ready Code

alert http $EXTERNAL_NET any -> $NETSCALER_IDP_HOSTS any (
    msg:"CYBERDAX NetScaler SAML IdP short-window burst abuse";
    flow:to_server,established;
    http.method; content:"POST";
    http.uri; pcre:"/\/(saml|saml\/login|saml\/idp|cgi\/saml|nf\/auth\/saml)(\/|$|\?)/Ui";
    detection_filter:track by_src, count 14, seconds 40;
    classtype:web-application-attack;
    sid:7305402; rev:3;
)

SentinelOne

Implementation Hardening Note

The SentinelOne rules below assume a Deep Visibility-style event model. Because tenant field names, query grammar, aggregation support, and event-correlation capabilities vary, these rules are not production-ready as written across tenants and should be treated as local adaptation required templates.

Rule Name

CyberDax NetScaler Request-Handling Service Burst Activity

Purpose

Detect abnormal bursts of request-handling or authentication-service process activity on VPX or other host-observable NetScaler deployments, which may indicate endpoint abuse, repeated hostile targeting, or exploit-preparation pressure against IdP services.

ATT&CK Technique

T1190 – Exploit Public-Facing Application

Telemetry Dependency

·        SentinelOne process telemetry

·        Repeated process-event visibility or equivalent searchable process history

·        Host-observable NetScaler deployment model

·        Confirmed local service / process names associated with SAML / IdP request handling

Tuning Explanation

·        Confirm actual request-handling service / process names in the local deployment before use

·        This rule is only meaningful where repeated process-event visibility is available and burst conditions can be measured over short windows

·        Legitimate authentication surges, maintenance, and health-check activity must be baselined and suppressed

·        If the tenant query surface cannot express burst logic directly, use this as a hunt template rather than a production alert rule

Detection Logic

·        Scope to VPX or host-observable NetScaler systems

·        Detect elevated or burst-like request-handling service activity beyond local baseline

·        Exclude known maintenance and expected high-volume authentication activity

Operational Context

Use as a host-side stress / abuse analytic in deployments where NetScaler request handling is visible through EDR process telemetry.

Logical Notes

Local adaptation required

·        Requires tenant-specific field validation

·        Requires confirmed local service naming

·        Requires local burst / baseline methodology

·        May require translation into tenant-supported hunt, aggregation, or alerting syntax

·        Not applicable to appliance-only deployments

Rule Regret Check

Deployment caution

Confirm service naming and local activity baselines before production use to avoid misclassifying legitimate authentication surges.

Confidence caution
Elevated process activity suggests stress or abuse, but does not by itself prove exploit success.

Coverage value

This rule adds useful host-side pressure visibility in VPX deployments where network-layer telemetry may be incomplete.

Execution Validity Status

Local adaptation required

System-Ready Code (tenant-adaptation template)

endpoint.name matches "(?i)(netscaler|adc|citrix-adc|ns-vpx|idp)"
and event.type = "Process Creation"
and (
tgt.process.name matches "(?i)^(nsapimgr|nsppe|httpd|nginx)$"
  or src.process.name matches "(?i)^(nsapimgr|nsppe|httpd|nginx)$"
)
and not coalesce(tgt.process.cmdline,"") matches "(?i)(approved-maintenance-window|vendor-support-session|health-check|known-admin-script|netscaler-upgrade|support-bundle)"

Rule Name

CyberDax NetScaler Request-Handling Stress with Subsequent Outbound Activity

Purpose

Detect elevated NetScaler request-handling service activity followed by outbound network behavior, increasing confidence that observed host-side stress may reflect exploit staging or abusive endpoint interaction rather than benign load alone.

ATT&CK Technique

T1190 – Exploit Public-Facing Application
T1071 – Application Layer Protocol

Telemetry Dependency

·        SentinelOne process telemetry

·        SentinelOne endpoint network telemetry

·        Host-observable NetScaler deployment model

·        Confirmed ability to correlate process and network events in the tenant

Tuning Explanation

·        Confirm exact process and network field names before deployment

·        Validate that process and network events can be correlated by endpoint and time window

·        Use outbound allowlisting where possible instead of weakening detection criteria

·        If endpoint network telemetry is weak or delayed, keep this supporting after local adaptation

·        Do not represent this as universal coverage for appliance-only NetScaler deployments

·        If the tenant cannot support the correlation model as written, use this as a hunt / investigation template instead of a production alert

Detection Logic

·        Detect elevated or suspicious request-handling service activity

·        Require subsequent endpoint-observed network activity from the same host context

·        Exclude known benign operational workflows

Operational Context

Use as a higher-confidence host-side confirmation analytic in validated VPX or host-observable NetScaler deployments.

Logical Notes

Local adaptation required

·        Requires tenant-specific field and operator validation

·        Requires usable endpoint network telemetry

·        Requires confirmed correlation capability

·        May require redesign into tenant-supported correlation logic

·        Not applicable to appliance-only deployments

Rule Regret Check

·        Deployment caution
Validate endpoint network telemetry quality and process/network correlation behavior before production use.

·        Confidence caution
Treat this as a higher-confidence confirmation signal only after tenant-specific validation, not universal logic.

·        Coverage value
This rule improves confidence by linking host-side service stress with subsequent outbound behavior in supported deployments.

Execution Validity Status

Local adaptation required

System-Ready Code (tenant-adaptation template)

endpoint.name matches "(?i)(netscaler|adc|citrix-adc|ns-vpx|idp)"
and event.type = "Process Creation"
and (
tgt.process.name matches "(?i)^(nsapimgr|nsppe|httpd|nginx)$"
  or src.process.name matches "(?i)^(nsapimgr|nsppe|httpd|nginx)$"
)
and endpoint.id in (
  from events
  where event.type = "Network Connection"
    and endpoint.name matches "(?i)(netscaler|adc|citrix-adc|ns-vpx|idp)"
  select endpoint.id
)
and not coalesce(tgt.process.cmdline,"") matches "(?i)(approved-maintenance-window|vendor-support-session|health-check|known-admin-script|netscaler-upgrade|support-bundle)"

Splunk

Implementation Hardening Note

The Splunk rules below assume a normalized logging model with supporting lookups and stable source tracking. They are conditional rather than universal drop-in content unless the environment provides:

·        reliable source IP fields

·        validated NetScaler IdP asset lookup

·        trusted-source lookup

·        normalized URI fields

·        stable time-window correlation across the selected log sources

Rule Name

CyberDax NetScaler IdP Endpoint Request Burst from Single Source

Purpose

Detect high-frequency request bursts from a single non-trusted source to validated NetScaler SAML IdP endpoints, indicating exploit staging, endpoint abuse, or concentrated pre-exploitation pressure.

ATT&CK Technique

T1595 – Active Scanning
T1190 – Exploit Public-Facing Application

Telemetry Dependency

·        Splunk search over web/proxy/WAF/load-balancer logs

·        Reliable source IP visibility

·        HTTP method visibility

·        URI visibility

·        netscaler_idp_assets lookup

·        trusted_idp_sources lookup

·        Correlatable time windows

Tuning Explanation

·        The like(norm_uri,"%/saml%") condition is a starter filter and should be narrowed to exact validated IdP paths where possible

·        Request-count thresholds must be tuned against real SSO behavior and approved federation partner flows

·        Trusted-source suppression must be in place before production alerting

·        If source IP fidelity is weak because of intermediaries, normalize or reconstruct client IP before deployment

·        If burst thresholds are not tuned locally, keep this Hunt-only

Detection Logic

·        Identify POST requests from non-trusted sources to validated IdP assets

·        Group by source, destination, and time window

·        Surface bursts exceeding locally tuned request-count thresholds

Operational Context

Use as a primary pre-exploitation pressure analytic in mature SIEM environments with reliable source tracking and trusted-source suppression.

Logical Notes

Conditional

·        Requires trusted-source suppression

·        Requires stable source-IP fidelity

·        Requires threshold tuning against normal SSO patterns

·        Not executable as intended without validated IdP path scope

Rule Regret Check

·        Deployment caution
Tune burst thresholds carefully and ensure trusted-source suppression is complete before production alerting.

·        Confidence caution
High-volume request bursts may still reflect benign identity activity unless environment-specific tuning is mature.

·        Coverage value
This rule is useful for surfacing concentrated pre-exploitation pressure that may precede stronger exploit-specific anomalies.

Execution Validity Status

Conditional production-ready

System-Ready Code

(index=web OR index=proxy OR index=waf OR index=lb)
| eval norm_dest=coalesce(dest, host, virtual_host, site, server_name)
| eval norm_src=coalesce(src_ip, src, client_ip, c_ip, x_forwarded_for)
| eval norm_uri=coalesce(uri, uri_path, request_uri, url, cs_uri_stem)
| eval norm_method=upper(coalesce(method, http_method, cs_method))
| lookup netscaler_idp_assets asset_value as norm_dest OUTPUT asset_value as matched_asset
| where isnotnull(matched_asset)
| lookup trusted_idp_sources src_value as norm_src OUTPUT src_value as trusted_src
| where isnull(trusted_src)
| where norm_method="POST"
| where like(norm_uri,"%/saml%")
| bin time span=2m
| stats count as burst
count values(norm_uri) as targeted_paths by time normsrc norm_dest
| where burst_count >= 10

Rule Name

CyberDax NetScaler IdP Sustained Repeated Targeting from Non-Trusted Source

Purpose

Detect sustained repeated targeting of validated NetScaler SAML IdP endpoints from non-trusted sources over a longer interval, indicating endpoint abuse, enumeration, or repeated exploit preparation.

ATT&CK Technique

T1595 – Active Scanning
T1190 – Exploit Public-Facing Application

Telemetry Dependency

·        Splunk search over web/proxy/WAF/load-balancer logs

·        Reliable source IP visibility

·        URI visibility

·        netscaler_idp_assets lookup

·        trusted_idp_sources lookup

·        Correlatable time windows

Tuning Explanation

·        This rule is intentionally distinct from burst logic by measuring sustained repeated targeting over a longer window

·        The URI filter should be tightened to exact validated IdP paths where possible

·        If source fidelity is weak or intermediaries obscure client identity, normalize before production use

·        Tune the sustained-count threshold locally against normal SSO activity and testing workflows

·        If trusted-source lookup is incomplete, keep this supporting or Hunt-only

Detection Logic

·        Identify repeated POST requests from non-trusted sources to validated IdP assets

·        Group over a longer interval than burst detection

·        Surface sustained hostile pressure rather than compressed spikes

Operational Context

Use as a complementary repeated-targeting analytic to distinguish sustained abuse from short-burst staging behavior.

Logical Notes

Conditional

·        Requires trusted-source suppression

·        Requires stable source-IP fidelity

·        Requires local threshold tuning

·        Not executable as intended without validated IdP path scope

Rule Regret Check

·        Deployment caution
Tune sustained-count thresholds against normal identity traffic and testing workflows before alerting.

·        Confidence caution
Sustained targeting signals abuse or preparation, but not confirmed exploit success.

·        Coverage value
This rule improves visibility into persistent endpoint abuse that would not appear as short bursts alone.

Execution Validity Status

Conditional production-ready

System-Ready Code

(index=web OR index=proxy OR index=waf OR index=lb)
| eval norm_dest=coalesce(dest, host, virtual_host, site, server_name)
| eval norm_src=coalesce(src_ip, src, client_ip, c_ip, x_forwarded_for)
| eval norm_uri=coalesce(uri, uri_path, request_uri, url, cs_uri_stem)
| eval norm_method=upper(coalesce(method, http_method, cs_method))
| lookup netscaler_idp_assets asset_value as norm_dest OUTPUT asset_value as matched_asset
| where isnotnull(matched_asset)
| lookup trusted_idp_sources src_value as norm_src OUTPUT src_value as trusted_src
| where isnull(trusted_src)
| where norm_method="POST"
| where like(norm_uri,"%/saml%")
| bin time span=10m
| stats count as repeat
count values(norm_uri) as targeted_paths by time normsrc norm_dest
| where repeat_count >= 20

Rule Name

CyberDax NetScaler IdP Multi-Asset Pressure from Single Source

Purpose

Detect one non-trusted source targeting multiple validated NetScaler SAML IdP assets in a short interval, indicating coordinated endpoint probing or distributed exploit preparation across exposed identity-boundary infrastructure.

ATT&CK Technique

T1595 – Active Scanning

Telemetry Dependency

·        Splunk search over web/proxy/WAF/load-balancer logs

·        Reliable source IP visibility

·        Destination asset visibility

·        netscaler_idp_assets lookup

·        trusted_idp_sources lookup

Tuning Explanation

·        Use only where more than one IdP asset, edge, VIP, or regional listener exists

·        If only one IdP asset exists, do not use this rule

·        Tighten URI filter to exact validated IdP paths where possible

·        Tune breadth thresholds against legitimate federation partner behavior and synthetic monitoring

·        If asset inventory is incomplete, keep this supporting or Hunt-only

Detection Logic

·        Identify POST requests from non-trusted sources to validated IdP assets

·        Group by source over a short window

·        Surface single sources hitting more than one IdP asset

Operational Context

Use as a higher-context pressure analytic in multi-edge or multi-asset NetScaler IdP deployments.

Logical Notes

Conditional

·        Requires more than one IdP asset in scope

·        Requires trusted-source suppression

·        Requires reliable source-IP fidelity

·        Not meaningful in single-asset deployments

Rule Regret Check

·        Deployment caution
Use only where multi-asset IdP inventory is accurate and current.

·        Confidence caution
Multi-asset pressure suggests coordinated probing, but not necessarily successful exploitation.

·        Coverage value
This rule is valuable in multi-edge environments because it highlights distributed hostile attention across identity infrastructure.

Execution Validity Status

Conditional production-ready

System-Ready Code

(index=web OR index=proxy OR index=waf OR index=lb)
| eval norm_dest=coalesce(dest, host, virtual_host, site, server_name)
| eval norm_src=coalesce(src_ip, src, client_ip, c_ip, x_forwarded_for)
| eval norm_uri=coalesce(uri, uri_path, request_uri, url, cs_uri_stem)
| eval norm_method=upper(coalesce(method, http_method, cs_method))
| lookup netscaler_idp_assets asset_value as norm_dest OUTPUT asset_value as matched_asset
| where isnotnull(matched_asset)
| lookup trusted_idp_sources src_value as norm_src OUTPUT src_value as trusted_src
| where isnull(trusted_src)
| where norm_method="POST"
| where like(norm_uri,"%/saml%")
| bin time span=5m
| stats dc(norm
dest) as targeted_assets values(norm_dest) as asset_list values(norm_uri) as targeted_paths by time normsrc
| where targeted_assets > 1

Elastic

System Positioning

For this report, Elastic is supporting, not primary.

The strongest detections for CVE-2026-3055 are still the network and identity-correlation signals already covered in Suricata and Splunk, because the observed chain in the report is:

·        T1190 – Exploit Public-Facing Application

·        T1555 – Credentials from Password Stores (Adapted to Application Memory Exposure Context)

Elastic should therefore include only the highest-value supporting identity-abuse detections and should not try to replicate every network-layer analytic already handled elsewhere.

Rule Name

CyberDax NetScaler Identity Artifact Use Without Expected Authentication Sequence

Purpose

Identify session validation, token use, or assertion consumption events that are not preceded by a corresponding authentication success or issuance event, indicating potential misuse of exposed authentication artifacts.

ATT&CK Technique

T1555 – Credentials from Password Stores (Adapted to Application Memory Exposure Context)

Telemetry Dependency

·        Elastic identity or authentication logs

·        Required fields, with at least one artifact field preserved:

o   session.id

o   authentication.id

o   related.session

o   token.id

o   assertion.id

·        event.action

·        @timestamp

·        user.name or equivalent principal field

Tuning Explanation

·        Normalize artifact identifier using:

o   COALESCE(session.id, authentication.id, related.session, token.id, assertion.id)

·        Normalize user and source fields before production use:

o   principal = COALESCE(user.name, user.name.keyword, user, src_user)

o   src_ip = COALESCE(source.ip, client.ip, src_ip)

·        Restrict to environments where authentication and assertion events are available in the same Elastic environment

·        Suppress:

o   federation brokers

o   service accounts

o   trusted identity infrastructure

·        Use a bounded correlation window of 60 minutes

·        If artifact identifiers are not reliably preserved, do not promote this rule to production alerting

Detection Logic

·        Identify session validation, token use, or assertion consumption events

·        Correlate those events against recent expected authentication or issuance events on the same artifact identifier

·        Surface cases where artifact use occurs without expected authentication context

Operational Context

This is the primary Elastic identity-abuse analytic for this report. It is useful where the organization keeps mature identity telemetry in Elastic and can correlate artifact use with recent authentication flow.

Logical Notes

Local adaptation required

·        Requires backend correlation capability or scheduled enrichment workflow

·        Requires normalized identity action values

·        Not universally deployable as a single standalone rule in all Elastic environments

Rule Regret Check

Deployment caution
Validate artifact field preservation and identity event sequencing before enabling production alerting.

Confidence caution
Apparent missing authentication may reflect telemetry gaps or delayed indexing if identity logging is incomplete.

Coverage value
Directly detects reuse of exposed authentication artifacts outside expected authentication flow.

Execution Validity Status

Local adaptation required (correlation package)

System-Ready Code (Component A — Artifact Use)

FROM logs-*,filebeat-*,winlogbeat-*,auditbeat-*
| WHERE event.category == "authentication"
| EVAL artifact_id = COALESCE(session.id, authentication.id, related.session, token.id, assertion.id)
| EVAL principal = COALESCE(user.name, user.name.keyword, user, src_user)
| EVAL action = LOWER(event.action)
| WHERE NOT IS_NULL(artifact_id)
| WHERE action IN ("session_validate","token_use","assertion_consume")
| KEEP @timestamp, principal, artifact_id, source.ip, action

System-Ready Code (Component B — Expected Authentication or Issuance)

FROM logs-*,filebeat-*,winlogbeat-*,auditbeat-*
| WHERE event.category == "authentication"
| EVAL artifact_id = COALESCE(session.id, authentication.id, related.session, token.id, assertion.id)
| EVAL principal = COALESCE(user.name, user.name.keyword, user, src_user)
| EVAL action = LOWER(event.action)
| WHERE NOT IS_NULL(artifact_id)
| WHERE action IN ("authentication_success","assertion_issue","token_issue")
| KEEP @timestamp, principal, artifact_id, source.ip, action

Implementation Hardening Note

Use Component A and Component B as a deployable correlation package. In production, the backend must correlate artifact use without matching preceding authentication or issuance on the same normalized artifact identifier within the configured time window.

Rule Name

CyberDax NetScaler Authentication Artifact Reuse Across Distinct Source Contexts

Purpose

Detect reuse of the same authentication artifact across multiple distinct source contexts, indicating likely token or session compromise after authentication artifact exposure.

ATT&CK Technique

T1555 – Credentials from Password Stores (Adapted to Application Memory Exposure Context)

Telemetry Dependency

·        Elastic identity or authentication logs

·        Artifact identifier field, normalized

·        Source IP

·        Optional geographic, device, or user-agent context

Tuning Explanation

·        Normalize:

o   artifact_id = COALESCE(session.id, authentication.id, related.session, token.id, assertion.id)

·        Normalize source context:

o   src_ip = COALESCE(source.ip, client.ip, src_ip)

o   src_geo = COALESCE(source.geo.country_name, source.geo.country_iso_code)

·        Suppress trusted:

o   VPN concentrators

o   proxy infrastructure

o   federation brokers

·        Require:

o   minimum event count greater than 3

o   bounded observation window no longer than 24 hours

·        Stronger where device or user-agent context is also present

Detection Logic

·        Same artifact used

·        Multiple distinct source contexts

·        Minimum activity threshold met

Operational Context

This is the strongest supporting Elastic rule for session or token reuse after memory-derived artifact exposure.

Logical Notes

Conditional

·        Requires source-IP fidelity

·        Stronger with geo or device enrichment

·        Must be tuned against local mobility and proxy behavior

Rule Regret Check

·        Deployment caution
Account for proxy and VPN environments before enabling production alerting.

·        Confidence caution
Distributed access may still be legitimate in some architectures.

·        Coverage value
High-value identity misuse detection for exposed session or token reuse.

Execution Validity Status

Conditional production-ready

System-Ready Code

FROM logs-*,filebeat-*,winlogbeat-*,auditbeat-*
| WHERE event.category == "authentication"
| EVAL artifact_id = COALESCE(session.id, authentication.id, related.session, token.id, assertion.id)
| EVAL src_ip = COALESCE(source.ip, client.ip, src_ip)
| EVAL src_geo = COALESCE(source.geo.country_name, source.geo.country_iso_code)
| EVAL action = LOWER(event.action)
| WHERE action IN ("session_validate","token_use","assertion_consume")
| WHERE NOT IS_NULL(artifact_id) AND NOT IS_NULL(src_ip)
| STATS src_count = COUNT_DISTINCT(src_ip),
        geo_count = COUNT_DISTINCT(src_geo),
        event_count = COUNT(*),
        values(src_ip) AS src_ips,
        values(src_geo) AS geos
  BY artifact_id
| WHERE event_count > 3 AND (src_count > 1 OR geo_count > 1)

QRadar

System Positioning

QRadar provides supporting identity-layer detection for this report.

Detection scope is strictly limited to:

·        T1555 – Credentials from Password Stores (Adapted to Application Memory Exposure Context)

No additional behaviors are introduced. No privilege, persistence, or generic anomaly detections are included.

Mandatory Implementation Requirement

Custom Property

CYBERDAX_ARTIFACT_ID

Extraction Priority

·        session_id

·        authentication_id

·        assertion_id

·        token_id

If a stable artifact identifier cannot be extracted, do not deploy these rules.

Global Implementation Constraint

The following event categories are logical detection classes, not guaranteed DSM values:

·        Authentication Success

·        Token Issue

·        Assertion Issue

·        Session Validate

·        Token Use

·        Assertion Consume

These must be mapped to local DSM values before deployment.

Failure to do so results in non-functional rules.

Rule Name

CyberDax NetScaler Session Artifact Use Without Recent Authentication

Purpose

Detect session, token, or assertion use that occurs without a corresponding recent authentication or issuance event, indicating likely misuse of exposed authentication artifacts.

ATT&CK Technique

T1555 – Credentials from Password Stores (Adapted)

Telemetry Dependency

·        Identity or authentication logs in QRadar

·        Reliable DSM mapping for authentication and session activity

·        Custom property: CYBERDAX_ARTIFACT_ID

·        Event timestamp fidelity

Tuning Explanation

·        Validate artifact extraction before deployment

·        Validate DSM event mappings before deployment

·        Suppress:

o   federation brokers

o   service accounts

o   automation identities

·        Use a 60-minute correlation window

·        If CRE correlation is unreliable, implement as AQL scheduled search instead

Detection Logic

·        Artifact-use event occurs

·        Artifact identifier is present

·        No matching authentication or issuance event exists within prior 60 minutes

Operational Context

Primary identity-layer detection for authentication artifact misuse following memory exposure.

Logical Notes

Conditional

·        Requires artifact normalization

·        Requires DSM mapping correctness

·        Requires event sequencing fidelity

·        May require AQL implementation depending on CRE capability

Rule Regret Check

·        Deployment caution
Do not deploy without verified artifact extraction and DSM mapping.

·        Confidence caution
Missing authentication may reflect telemetry gaps if identity logging is incomplete.

·        Coverage value
Direct detection of authentication artifact misuse outside expected authentication flow.

Execution Validity Status

Conditional production-ready

System-Ready Code (CRE-Compatible Approach)

Building Block: Artifact Use

Event Category IN (Session Validate, Token Use, Assertion Consume)
AND CYBERDAX_ARTIFACT_ID IS NOT NULL

Building Block: Expected Authentication

Event Category IN (Authentication Success, Token Issue, Assertion Issue)
AND CYBERDAX_ARTIFACT_ID IS NOT NULL

Rule Logic

WHEN events match BB:Artifact_Use
AND there are no events matching BB:Expected_Authentication
    with the same CYBERDAX_ARTIFACT_ID
    in the previous 60 minutes
THEN CREATE OFFENSE
Severity: 7
Relevance: 7
Credibility: 7

CRE Limitation Note (Critical)

If the QRadar CRE engine cannot reliably enforce negative correlation (“no prior event”), implement this rule as:

·        Scheduled AQL search, or

·        Reference-set backed correlation model

Do not rely on unsupported CRE behavior.

Rule Name

CyberDax NetScaler Authentication Artifact Multi-Source Reuse

Purpose

Detect reuse of the same authentication artifact across multiple source IPs, indicating likely session or token compromise.

ATT&CK Technique

T1555 – Credentials from Password Stores (Adapted)

Telemetry Dependency

·        Identity or authentication logs

·        Source IP fidelity

·        Custom property: CYBERDAX_ARTIFACT_ID

Tuning Explanation

Maintain reference set:

CYBERDAX_TRUSTED_IDENTITY_PROXIES

·        Suppress:

o   VPN gateways

o   proxy infrastructure

o   federation brokers

·        Require:

o   multiple events

o   bounded 24-hour window

·        Validate that source IP reflects true client identity

Detection Logic

·        Artifact identifier present

·        Same artifact used across multiple distinct source IPs

·        Activity exceeds minimum threshold

Operational Context

Primary QRadar detection for distributed reuse of exposed authentication artifacts.

Logical Notes

Conditional

·        Requires source-IP fidelity

·        Requires proxy suppression

·        Requires artifact normalization

Rule Regret Check

·        Deployment caution
Account for VPN and proxy concentration before enabling alerting.

·        Confidence caution
Multiple source IPs may be legitimate without proper tuning.

·        Coverage value
High-value detection for real-world session or token reuse.

Execution Validity Status

Conditional production-ready

System-Ready Code

Reference Set: CYBERDAX_TRUSTED_IDENTITY_PROXIES

WHEN Event Category IN (Session Validate, Token Use, Assertion Consume)
AND CYBERDAX_ARTIFACT_ID IS NOT NULL
AND source IP NOT IN CYBERDAX_TRUSTED_IDENTITY_PROXIES
GROUP BY CYBERDAX_ARTIFACT_ID OVER 24 hours
AND DISTINCT COUNT(source IP) > 1
AND COUNT(*) > 3
THEN CREATE OFFENSE
Severity: 7
Relevance: 6
Credibility: 7

Sigma

System Positioning

Sigma provides portable identity-layer detection logic for this report.

Scope is strictly limited to:

·        T1555 – Credentials from Password Stores (Adapted to Application Memory Exposure Context)

Rule Name

CyberDax NetScaler Session Artifact Use Without Recent Authentication

Purpose

Detect session validation, token use, or assertion consumption events that may indicate misuse of exposed authentication artifacts when no corresponding recent authentication or issuance event exists for the same artifact.

ATT&CK Technique

T1555 – Credentials from Password Stores (Adapted to Application Memory Exposure Context)

Telemetry Dependency

·        Authentication-category logs

·        Normalized artifact identifier field

·        Normalized action field

·        Backend capable of correlation or rule chaining

Tuning Explanation

·        Map local action field to EventAction or equivalent before deployment

·        Map local artifact field to ArtifactId before deployment

·        Suppress:

o   federation brokers

o   service accounts

o   trusted identity intermediaries

·        This rule is not valid as a standalone detection

·        It must be implemented with backend-specific correlation logic

Detection Logic

·        Identify session validation, token use, or assertion consumption events

·        Require presence of normalized artifact identifier

·        Use backend correlation to determine whether a recent authentication or issuance event exists for the same artifact within 60 minutes

Operational Context

This rule is a portable building block for identity-artifact misuse detection. It should only be used in backends that can implement event-sequence or missing-prior-event logic.

Logical Notes
Local adaptation required

·        Not deployable as a standalone Sigma rule

·        Requires backend correlation support

·        Requires normalized identity event taxonomy

·        Must not be used without backend sequence logic

Rule Regret Check

·        Deployment caution
Do not deploy without verified artifact normalization and backend correlation capability.

·        Confidence caution
Apparent missing authentication may reflect telemetry gaps or backend limitations rather than true misuse.

·        Coverage value
Provides a portable expression of one of the most important practical consequences of authentication artifact exposure.

Execution Validity Status

Local adaptation required (correlation template)

System-Ready Code

title: CyberDax NetScaler Session Artifact Use Without Recent Authentication
id: 7a7f4f11-4a2d-41be-9001-cyberdax-sigma-artifact-use-without-auth
status: test
description: Portable correlation template for session, token, or assertion use events tied to exposed authentication artifacts.
logsource:
  category: authentication
  product: any
detection:
  artifact_use:
    EventAction|contains:
      - session_validate
      - token_use
      - assertion_consume
  has_artifact:
    ArtifactId|exists: true
  condition: artifact_use and has_artifact
fields:
  - EventAction
  - ArtifactId
  - User
  - SourceIp
  - Timestamp
falsepositives:
  - federation brokers
  - service accounts
  - delayed or incomplete identity telemetry
level: high
tags:
  - attack.t1555

Implementation Hardening Note

This rule must be implemented with backend-specific correlation logic equivalent to:

·        artifact-use event occurs

·        same ArtifactId

·        no matching authentication_success, token_issue, or assertion_issue

·        within the prior 60 minutes

If the backend cannot support that correlation model, do not deploy this rule.

Rule Name

CyberDax NetScaler Authentication Artifact Multi-Source Reuse

Purpose

Detect reuse of the same authentication artifact across multiple source IPs, indicating likely session or token misuse following authentication artifact exposure.

ATT&CK Technique

T1555 – Credentials from Password Stores (Adapted to Application Memory Exposure Context)

Telemetry Dependency

·        Authentication-category logs

·        Normalized artifact identifier field

·        Normalized source IP field

·        Backend capable of aggregation

Tuning Explanation

·        Map local action field to EventAction before deployment

·        Map local artifact field to ArtifactId before deployment

·        Map local source IP field to SourceIp before deployment

·        Suppress trusted:

o   proxies

o   VPN gateways

o   federation infrastructure

·        Use bounded observation window of 24 hours

·        This rule requires backend aggregation support and is not universally executable as raw Sigma alone

Detection Logic

·        Identify session validation, token use, or assertion consumption events

·        Require presence of normalized artifact identifier

·        Group by artifact identifier over a bounded time window

·        Detect use across multiple distinct source IPs with minimum activity threshold

Operational Context

This rule provides portable detection logic for one of the strongest identity-layer signals in this report: reuse of the same exposed authentication artifact across multiple client contexts.

Logical Notes

Local adaptation required

·        Requires backend aggregation support

·        Requires normalized artifact and source fields

·        Stronger where trusted proxy and broker paths are well known and excluded

Rule Regret Check

·        Deployment caution
Validate source-IP fidelity and trusted infrastructure suppression before production use.

·        Confidence caution
Multiple source IPs may still be legitimate without careful proxy and mobility tuning.

·        Coverage value
Provides a practical portable analytic for exposed session or token reuse across distinct source contexts.

Execution Validity Status

Local adaptation required (aggregation template)

System-Ready Code

title: CyberDax NetScaler Authentication Artifact Multi-Source Reuse
id: 7c28f8a2-5f1c-46c3-9002-cyberdax-sigma-artifact-multisource-reuse
status: test
description: Portable aggregation template for detecting reuse of the same authentication artifact across multiple source IPs.
logsource:
  category: authentication
  product: any
detection:
  artifact_use:
    EventAction|contains:
      - session_validate
      - token_use
      - assertion_consume
  has_artifact:
    ArtifactId|exists: true
  condition: artifact_use and has_artifact
timeframe: 24h
fields:
  - ArtifactId
  - SourceIp
  - User
  - EventAction
falsepositives:
  - VPN or proxy aggregation
  - mobile or roaming users
  - shared identity infrastructure
level: high
tags:
  - attack.t1555

Implementation Hardening Note

This rule requires backend aggregation equivalent to:

·        group by ArtifactId

·        count distinct SourceIp

·        require distinct(SourceIp) > 1

·        require total event count > 3

If the backend does not support aggregation or threshold logic, implement this as a SIEM-native query or rule instead.

YARA

System Positioning

YARA is not used as a detection system for this report because the underlying threat behavior does not produce stable artifacts that YARA is designed to detect.

Why YARA Is Not Applicable

This CVE is driven by:

·        T1190 – Exploit Public-Facing Application

·        T1555 – Credentials from Password Stores (Adapted to Application Memory Exposure Context)

The exploit operates as:

·        a crafted HTTP request

·        targeting a NetScaler SAML IdP endpoint

·        causing a memory disclosure condition

·        exposing authentication artifacts (tokens, session data)

This behavior has three critical characteristics:

1. No Stable File Artifact

·        The exploit does not require dropping a file

·        No payload binary is required for initial success

·        No consistent on-disk artifact is produced

YARA is fundamentally designed for file and binary pattern matching, so there is nothing reliable to match here.

AWS

Rule Name

CyberDax AWS Authenticated API Activity From Unmatched Source Context

Hardening Fixes Applied

·        excludes common AWS service-role and assumed-role noise patterns in code

·        restricts to likely human or federated identities

·        tightens recent-auth correlation logic

·        removes broad unscoped management-event grouping

Execution Validity Status
Conditional production-ready

System-Ready Code (Athena / CloudTrail Lake SQL)

WITH auth_events AS (
  SELECT
    userIdentity.arn AS principal,
    sourceIPAddress AS src_ip,
    eventTime AS auth_time
  FROM cloudtrail_logs
  WHERE eventName IN ('ConsoleLogin','AssumeRole','AssumeRoleWithSAML','AssumeRoleWithWebIdentity')
    AND userIdentity.arn IS NOT NULL
    AND sourceIPAddress IS NOT NULL
    AND userIdentity.type IN ('IAMUser','AssumedRole')
    AND userIdentity.arn NOT LIKE '%:role/aws-service-role/%'
    AND userIdentity.arn NOT LIKE '%:assumed-role/AWSReservedSSO_%'
),
api_events AS (
  SELECT
    userIdentity.arn AS principal,
    sourceIPAddress AS src_ip,
    eventName,
    eventSource,
    eventTime AS api_time,
    userAgent
  FROM cloudtrail_logs
  WHERE userIdentity.arn IS NOT NULL
    AND sourceIPAddress IS NOT NULL
    AND eventCategory = 'Management'
    AND eventName NOT IN ('ConsoleLogin','AssumeRole','AssumeRoleWithSAML','AssumeRoleWithWebIdentity')
    AND userIdentity.type IN ('IAMUser','AssumedRole')
    AND userIdentity.arn NOT LIKE '%:role/aws-service-role/%'
    AND userIdentity.arn NOT LIKE '%:assumed-role/AWSReservedSSO_%'
    AND userAgent NOT LIKE '%internal.amazonaws.com%'
)
SELECT
  a.principal,
  a.src_ip,
  a.eventSource,
  a.eventName,
  a.api_time,
  a.userAgent
FROM api_events a
LEFT JOIN auth_events b
  ON a.principal = b.principal
 AND a.src_ip = b.src_ip
 AND b.auth_time BETWEEN a.api_time - INTERVAL '60' MINUTE AND a.api_time
WHERE b.principal IS NULL;

Rule Name

CyberDax AWS Multi-Source Authenticated Activity for Single Principal

Hardening Fixes Applied

·        restricts to likely human or federated identities

·        suppresses common service-role and internal AWS patterns

·        tightens bucket from one hour to thirty minutes

·        preserves minimum event threshold

Execution Validity Status
Conditional production-ready

System-Ready Code (Athena / CloudTrail Lake SQL)

SELECT
  userIdentity.arn AS principal,
  date_trunc('minute', eventTime) - INTERVAL '1' MINUTE (minute(eventTime) % 30) AS window_bucket,
  COUNT(
) AS event_count,
  COUNT(DISTINCT sourceIPAddress) AS distinct_src_ip_count,
  ARRAY_AGG(DISTINCT sourceIPAddress) AS src_ips
FROM cloudtrail_logs
WHERE eventCategory = 'Management'
  AND userIdentity.arn IS NOT NULL
  AND sourceIPAddress IS NOT NULL
  AND eventName NOT IN ('ConsoleLogin','AssumeRole','AssumeRoleWithSAML','AssumeRoleWithWebIdentity')
  AND userIdentity.type IN ('IAMUser','AssumedRole')
  AND userIdentity.arn NOT LIKE '%:role/aws-service-role/%'
  AND userIdentity.arn NOT LIKE '%:assumed-role/AWSReservedSSO_%'
  AND userAgent NOT LIKE '%internal.amazonaws.com%'
GROUP BY 1,2
HAVING COUNT(*) > 3
   AND COUNT(DISTINCT sourceIPAddress) > 1;

Azure

Rule Name

CyberDax Azure Activity Without Matching Recent Sign-In From Same Source Context

Hardening Fixes Applied

·        filters out service principals and managed identities in code

·        normalizes principal more carefully

·        excludes blank or untrusted source contexts

·        keeps strict sixty-minute recent-sign-in model

Execution Validity Status
Conditional production-ready

System-Ready Code (KQL)

let Signins =
SigninLogs
| where ResultType == 0
| where isnotempty(UserPrincipalName) and isnotempty(IPAddress)
| project principal = tolower(UserPrincipalName), src_ip = tostring(IPAddress), signin_time = TimeGenerated;
let Activity =
AzureActivity
| where isnotempty(Caller) and isnotempty(CallerIpAddress)
| where Caller !contains "@"
| extend principal = tolower(Caller), src_ip = tostring(CallerIpAddress), activity_time = TimeGenerated
| project principal, src_ip, activity_time, OperationNameValue, ResourceGroup, ResourceProviderValue;
Activity
| join kind=leftouter Signins on principal, src_ip
| summarize latest_signin = max(signin_time) by principal, src_ip, activity_time, OperationNameValue, ResourceGroup, ResourceProviderValue
| where isnull(latest_signin) or latest_signin < activity_time - 60m

Implementation Hardening Note

If Caller contains mixed identity types in your tenant, restrict this rule to known human-user patterns or join against an identity inventory table before production deployment.

Rule Name

CyberDax Azure Multi-Source Authenticated Activity for Single Identity

Hardening Fixes Applied

·        limits to successful human sign-ins

·        excludes blank IPs

·        tightens bucket to thirty minutes

·        preserves distinct-IP threshold and minimum event count

Execution Validity Status
Conditional production-ready

System-Ready Code (KQL)

SigninLogs
| where ResultType == 0
| where isnotempty(UserPrincipalName) and isnotempty(IPAddress)
| extend principal = tolower(UserPrincipalName), src_ip = tostring(IPAddress)
| summarize signin_count = count(), distinct_src_ip_count = dcount(src_ip), src_ips = make_set(src_ip, 20) by principal, bin(TimeGenerated, 30m)
| where signin_count > 3 and distinct_src_ip_count > 1

GCP

Rule Name

CyberDax GCP API Activity Without Matching Recent Identity Context

Hardening Fixes Applied

·        limits to likely human principals by excluding service accounts in code

·        requires caller IP presence

·        preserves sixty-minute recent-identity-context check

·        keeps explicit cross-dataset dependency honest

Execution Validity Status

Local adaptation required (cross-dataset correlation)

System-Ready Code (BigQuery SQL)

WITH signin_events AS (
  SELECT
    principalEmail AS principal,
    callerIp AS src_ip,
    event_timestamp AS signin_time
  FROM `project.dataset.identity_signin_logs`
  WHERE principalEmail IS NOT NULL
    AND callerIp IS NOT NULL
    AND principalEmail NOT LIKE '%gserviceaccount.com'
),
api_events AS (
  SELECT
    protoPayload.authenticationInfo.principalEmail AS principal,
    protoPayload.requestMetadata.callerIp AS src_ip,
    timestamp AS api_time,
    protoPayload.methodName AS method_name,
    resource.type AS resource_type
  FROM `project.dataset.gcp_audit_logs`
  WHERE protoPayload.authenticationInfo.principalEmail IS NOT NULL
    AND protoPayload.requestMetadata.callerIp IS NOT NULL
    AND protoPayload.authenticationInfo.principalEmail NOT LIKE '%gserviceaccount.com'
)
SELECT
  a.principal,
  a.src_ip,
  a.api_time,
  a.method_name,
  a.resource_type
FROM api_events a
LEFT JOIN signin_events b
  ON a.principal = b.principal
 AND a.src_ip = b.src_ip
 AND b.signin_time BETWEEN TIMESTAMP_SUB(a.api_time, INTERVAL 60 MINUTE) AND a.api_time
WHERE b.principal IS NULL;


S26 Threat-to-Rule Traceability Matrix

Behavior 1

ATT&CK Technique
T1190 – Exploit Public-Facing Application

Threat Behavior Description
Crafted HTTP POST requests targeting NetScaler SAML Identity Provider endpoints to trigger vulnerable request-processing behavior associated with memory disclosure.

Mapped Rules

·        Suricata — Oversized POST

·        Suricata — Repeated POST Targeting

·        Suricata — Burst Targeting

·        Splunk — Request Size Deviation

Coverage Disposition
Detected

Telemetry Dependency

·        HTTP method

·        URI

·        request size / content length

·        IdP endpoint visibility

Coverage Rationale
Exploit delivery is fully covered through request-shaping and targeting behavior at the network and logging layer.

Behavior 2

ATT&CK Technique
T1555 – Credentials from Password Stores (Adapted to Application Memory Exposure Context)

Threat Behavior Description
Exposure and reuse of authentication artifacts, including session tokens or assertion data, resulting from abnormal response behavior and subsequent identity misuse.

Mapped Rules

·        Splunk — Request-to-Response Size Asymmetry

·        Splunk — Session Without Authentication

·        Splunk — Token Reuse Across Source Contexts

·        Elastic — Artifact Use Without Auth

·        Elastic — Multi-Source Artifact Reuse

·        QRadar — Artifact Use Without Auth

·        QRadar — Multi-Source Artifact Reuse

·        Sigma — Artifact Use Template

·        Sigma — Multi-Source Template

Coverage Disposition
Detected

Telemetry Dependency

·        request/response byte visibility

·        identity logs

·        session/token identifiers

·        source IP

Coverage Rationale
Both artifact exposure signals and artifact misuse behaviors are directly covered across SIEM and identity telemetry layers.

Conditional Behavior (Allowed)

ATT&CK Technique
T1555 – Credentials from Password Stores (Adapted)

Threat Behavior Description
Not observed in currently available reporting; may occur during post-exploitation depending on attacker objectives and target environment. Host-observable NetScaler deployments may show service-lineage process anomalies.

Mapped Rules

·        SentinelOne — Service-Lineage Execution

Coverage Disposition
Partially Detected

Telemetry Dependency

·        host process telemetry

·        parent-child lineage

Coverage Rationale
Applies only to VPX or host-observable deployments and is not universal coverage.

Not Applicable

Behavior
File-based or malware artifact detection

Mapped Rules
None — YARA intentionally not used

Coverage Disposition
Not Applicable

S27 Behavior & Log Artifacts

Network Log Artifacts

·        HTTP POST requests to SAML IdP endpoints with abnormal content-length values relative to historical baselines

·        Discrepancies between request size and response size indicating abnormal data return behavior

·        Repeated requests to authentication endpoints without successful session establishment

Identity Log Artifacts

·        Session creation events without corresponding successful SAML authentication flows

·        Token validation events occurring without preceding assertion issuance

·        Session reuse across multiple IP addresses without re-authentication

NetScaler / Appliance Artifacts

·        Error logs or anomalies during SAML request parsing

·        Indicators of unexpected request handling outcomes within authentication workflows

·        Resource anomalies correlated with request processing events

Infrastructure Artifacts

·        Clusters of IP addresses repeatedly targeting SAML IdP endpoints

·        Recurrent access patterns indicating automated exploitation attempts

·        Reuse of source infrastructure across multiple authentication endpoints


S28 Detection Strategy and SOC Implementation Guidance

SOC teams should implement correlation-driven detection workflows combining:

·        network-level SAML request anomalies

·        identity-layer authentication inconsistencies

·        session behavior deviations

Alerting should prioritize cases where:

·        abnormal SAML request patterns coincide with authentication irregularities

·        session activity occurs without expected authentication sequences

Detection tuning should focus on baseline-aware anomaly detection specific to SAML authentication workflows rather than generic web traffic analysis.

S29 Detection Coverage Summary

Detected Behaviors

·        Exploit attempts characterized by abnormal SAML request structure and request-response anomalies

·        Authentication inconsistencies indicating potential exposure of authentication artifacts

·        Session misuse patterns inconsistent with standard SAML authentication flows

Conditional Post-Exploitation Behaviors

·        Unauthorized access using exposed authentication artifacts

·        Session reuse or hijacking depending on validity of retrieved data

·        Follow-on activity dependent on attacker objectives and target environment

S30 Intelligence Maturity Assessment

Detection Maturity

Moderate — detection is achievable through correlation of SAML-specific network anomalies and identity-layer inconsistencies but lacks direct exploit indicators

Telemetry Coverage

Dependent on availability of TLS inspection and detailed SAML request logging; environments without payload visibility have reduced detection capability

Detection Engineering Capability

Requires development of protocol-aware anomaly detection tuned to SAML authentication workflows rather than reliance on signature-based methods

Control Effectiveness Score

Medium — controls are effective when TLS inspection and identity telemetry are available but degrade significantly without payload visibility

Audit Evidence Statement

Detection capability can be demonstrated through network logs capturing SAML request anomalies, identity logs showing session inconsistencies, and correlation between these telemetry sources

Security Program Integration Note

Detection and response for this vulnerability should be integrated into identity security monitoring programs, with emphasis on SAML workflow visibility, session integrity validation, and coordinated network and identity telemetry analysis

S31 Mitigation and Remediation

·        Apply vendor patches addressing CVE-2026-3055 across all affected NetScaler ADC systems immediately

·        Identify all NetScaler ADC instances configured as SAML Identity Providers and validate whether SAML endpoints are externally accessible

·        Remove or restrict external access to SAML IdP endpoints using network segmentation or access control enforcement

·        Invalidate all active SAML sessions and authentication tokens following remediation to prevent reuse of exposed artifacts

·        Perform targeted credential rotation for privileged accounts and federated identity integrations where exposure is suspected

·        Review authentication and session logs for anomalous activity indicative of token misuse or unauthorized access

S32 Security Control Recommendations

·        Deploy inspection controls capable of analyzing SAML request structure at ingress points, including reverse proxy, WAF, or load balancer layers

·        Establish baseline-aware monitoring of SAML IdP request characteristics, including request size, encoding, and endpoint usage patterns

·        Enforce session integrity controls to detect reuse of authentication tokens across IP addresses, devices, or geographic locations

·        Integrate identity telemetry (SAML assertions, session creation, token validation) with network telemetry to enable correlation-based detection

·        Apply rate limiting and anomaly detection controls on SAML IdP endpoints to reduce exposure to automated exploitation attempts

·        Enable continuous monitoring of SAML authentication workflows to detect deviations from expected request and response behavior

S33 Strategic Defensive Improvements

·        Transition SAML IdP exposure from network-based accessibility to controlled access models using identity-aware access controls and conditional access policies

·        Implement protocol-aware monitoring for SAML authentication workflows to detect deviations in assertion structure, request formatting, and response characteristics

·        Establish centralized correlation pipelines linking network-layer request anomalies with identity-layer authentication and session events

·        Treat SAML IdP infrastructure as a high-risk external attack surface requiring dedicated monitoring, segmentation, and governance

Control Impact Mapping

·        Initial Access — T1190 Exploit Public-Facing Application
Reduced through restriction of SAML IdP exposure and enforcement of request inspection controls

·        Credential Access — T1555 Credentials from Password Stores
Reduced through session invalidation, token lifecycle enforcement, and monitoring of authentication artifact usage

S34 Defensive Architecture Overview


Effective defense requires layered controls aligned to identity-boundary exposure in NetScaler SAML deployments:

Network Layer

·        Inspection of inbound HTTP/S requests targeting SAML IdP endpoints

·        Detection of anomalous request structure, size, and frequency

Identity Layer

·        Monitoring of SAML assertion generation, validation, and session creation

·        Detection of inconsistencies between authentication events and session usage

Application / Appliance Layer

·        Secure configuration and patch management of NetScaler ADC systems

·        Monitoring of request processing behavior within SAML authentication workflows

Correlation Layer

·        Integration of network and identity telemetry

·        Detection of multi-stage activity combining exploit attempts and authentication anomalies

S35 Security Hardening Guidance

·        Restrict exposure of SAML IdP endpoints to required network paths and eliminate unnecessary external accessibility

·        Disable unused SAML configurations or identity services on NetScaler systems where not operationally required

·        Configure detailed logging for SAML request handling, authentication workflows, and session activity

·        Enforce strict session timeout, token lifecycle, and re-authentication controls for federated identity services

·        Regularly audit NetScaler configurations to ensure only required identity endpoints and services are enabled

S36 Security Program Maturity Assessment

Detection Maturity

·        Moderate — detection depends on correlation of SAML-specific network anomalies and identity-layer inconsistencies; absence of payload inspection limits visibility into exploit activity

Telemetry Coverage

·        Variable — effective detection requires visibility into SAML request payloads and authentication telemetry; environments without TLS inspection have reduced coverage

Response Readiness

·        Moderate — response requires validation of session integrity, authentication activity, and potential exposure of federated identity trust relationships

Hardening Maturity

·        Variable — effectiveness depends on whether identity infrastructure is treated as a distinct security boundary with dedicated monitoring and access controls

Control Effectiveness Score

·        Medium — controls are effective when SAML traffic inspection and identity telemetry correlation are implemented, but degrade in environments lacking payload visibility

Audit Evidence Statement

Control effectiveness can be demonstrated through:

·        network logs capturing SAML request anomalies and endpoint access patterns

·        identity logs showing session creation, token validation, and authentication flows

·        correlation of network anomalies with authentication inconsistencies

Security Program Integration Note

Detection and mitigation for this vulnerability should be integrated into identity security programs, with emphasis on SAML workflow visibility, session integrity monitoring, and coordinated analysis of network and identity telemetry


S37 Residual Risk and Forward Outlook

·        Residual risk remains in environments lacking visibility into encrypted SAML traffic, limiting detection of exploit attempts

·        Organizations with incomplete inventory of NetScaler ADC deployments may retain unrecognized exposure

·        Federated identity infrastructure will continue to present high-value targets due to its role in authentication and access control

·        Continued emphasis on identity-layer monitoring, protocol-aware detection, and rapid patching is required to maintain defensive posture

S38 Intelligence Confidence Assessment

Confidence Level

High

Confidence Rationale

·        Vendor advisory confirms out-of-bounds memory read behavior within NetScaler ADC SAML Identity Provider request processing, directly supporting the identified vulnerability mechanism

·        Exploitation conditions are clearly defined, including unauthenticated interaction with externally exposed SAML IdP endpoints

·        The attack surface is constrained to identity federation infrastructure, where NetScaler ADC commonly operates as an external authentication boundary

·        Detection and mitigation approaches are grounded in observable SAML request handling behavior and identity session anomalies specific to federated authentication workflows

Confidence Limitations

·        Public reporting does not disclose precise exploit payload structure or request formatting required to reliably trigger memory disclosure

·        Variability in process memory exposure introduces uncertainty regarding the consistency and usability of retrieved authentication artifacts

·        No confirmed in-the-wild exploitation reporting is currently available to validate adversary operational patterns beyond modeled tradecraft

·        EEP is a forward-looking analytic measure of operational exploitation potential, not a statement of confirmed exploitation, KEV inclusion, or incident activity

S39 Analytical Notes and Limitations

·        Not observed in currently available reporting; may occur during post-exploitation depending on attacker objectives and target environment:

o   Use of exposed authentication artifacts to access federated services without re-authentication

o   Session reuse or impersonation within identity trust relationships

·        Detection effectiveness depends on visibility into SAML request payloads; environments without TLS inspection are limited to indirect behavioral indicators

·        NetScaler ADC logging may not provide sufficient granularity to directly observe memory disclosure events or request parsing anomalies

·        Analysis assumes NetScaler ADC is deployed as an externally accessible SAML Identity Provider; environments with restricted exposure may have reduced attack surface

S40 References

Vendor Advisory

·        Citrix advisory addressing memory disclosure vulnerability in NetScaler ADC SAML Identity Provider processing (CVE-2026-3055)

·        hxxps://support[.]citrix[.]com/security-advisory-netscaler-cve-2026-3055

Vulnerability Records

·        National Vulnerability Database entry describing CVE-2026-3055 memory disclosure conditions in NetScaler ADC

·        hxxps://nvd[.]nist[.]gov/vuln/detail/CVE-2026-3055

Known Exploited Vulnerabilities (KEV)

·        CVE-2026-3055 is not listed in the CISA KEV catalog at the time of reporting; exploitation likelihood is assessed as high based on exposure conditions and attack surface characteristics

·        hxxps://www[.]cisa[.]gov/known-exploited-vulnerabilities-catalog

Analytical Framework

·        MITRE ATT&CK Framework (Enterprise) — reference model for adversary behavior mapping and detection alignment

·        hxxps://attack[.]mitre[.]org

·        CyberDax Threat Intelligence Analytical Framework v2.6 — structured methodology for threat modeling, detection engineering, and risk quantification

·        Internal CyberDax methodology reference

Previous
Previous

[SUP] Trivy Supply Chain Attack Credential Compromise and Release Channel Poisoning

Next
Next

Rules from EXP DarkSword Exploit Framework Multi-Stage Exploitation and Malware Delivery Platform