Skip to main content
CVE-2023-4966 Critical Patch Available

CVE-2023-4966: Citrix NetScaler Bleed — Session Token Leak

CVE Details

CVE ID CVE-2023-4966
CVSS Score 9.4
Severity Critical
Vendor Citrix
Product NetScaler ADC / NetScaler Gateway
Patch Status Available
Published February 7, 2026

Background

Citrix NetScaler ADC (Application Delivery Controller) and NetScaler Gateway are enterprise application delivery and VPN solutions widely deployed across financial services, healthcare, government, and large enterprises. NetScaler Gateway provides SSL VPN and clientless VPN access, acting as an authentication gateway for thousands of users. Its central role in authentication and access makes it an extremely high-value target.

CVE-2023-4966, nicknamed “CitrixBleed” by security researchers, is a buffer over-read vulnerability that allows unauthenticated attackers to extract memory from the NetScaler appliance — specifically, authenticated session tokens stored in memory. Disclosed by Citrix on October 10, 2023, with a CVSS score of 9.4, the vulnerability was already being exploited in the wild before the advisory. The attack bypasses all authentication controls because stolen session tokens represent already-authenticated sessions — no credentials needed.

Technical Mechanism

CVE-2023-4966 is a buffer over-read (CWE-125) vulnerability in the HTTP/S request handling component of NetScaler ADC/Gateway. The vulnerability is reminiscent of the Heartbleed vulnerability (CVE-2014-0160) in its mechanism: a length parameter is not properly validated, allowing a read operation to return more data than intended.

The vulnerable code path is in the HTTP header processing for the NetScaler’s Gateway service. When a specially crafted HTTP GET request is sent to a system configured with NetScaler Gateway or certain AAA configurations, the request processing code:

  1. Allocates a buffer for response data
  2. Reads attacker-supplied data that specifies the length of data to return
  3. The length value is not validated against available data bounds
  4. The over-read returns memory beyond the intended buffer boundaries

The memory adjacent to the response buffer contains session tokens for other currently-active authenticated connections. The returned “over-read” data includes these tokens in plaintext:

# Simplified representation of over-read mechanism
GET /oauth/idp/.well-known/openid-configuration HTTP/1.1
Host: netscaler.target.com
[Crafted header with oversized length parameter]

# Response includes legitimate response data PLUS adjacent memory contents
# Adjacent memory may contain: session cookies, authentication tokens, credentials

Session tokens on NetScaler Gateway are long-lived (default session timeout can be hours or days) and directly usable. An attacker who extracts a valid session token can immediately use it to authenticate as the corresponding user — bypassing MFA, certificates, and all other authentication controls.

The extracted tokens are used in the NSC_AAAC cookie field:

Cookie: NSC_AAAC=<stolen_token>

Real-World Exploitation Evidence

CitrixBleed saw immediate and widespread exploitation following disclosure, with multiple high-profile organisations confirmed breached:

  • Boeing: The aerospace giant confirmed a breach in late October 2023, with LockBit ransomware claiming responsibility and attributing initial access to CitrixBleed exploitation.
  • Industrial and Commercial Bank of China (ICBC): A ransomware attack disrupting US Treasury bond settlement was attributed to CitrixBleed exploitation, demonstrating the vulnerability’s reach into systemically important financial infrastructure.
  • DP World Australia: Major port operator suffered a ransomware attack attributed to CitrixBleed, disrupting Australian port operations.

Multiple ransomware groups actively exploited CitrixBleed:

  • LockBit 3.0: Primary threat actor; used CitrixBleed extensively for initial access
  • Medusa: Documented exploitation for healthcare sector targets
  • Scattered Spider (UNC3944): Used CitrixBleed to gain initial access before pivoting within victim networks

CISA reported over 300 publicly exposed NetScaler systems had been compromised within weeks of advisory publication. The MFA-bypass characteristic — stolen session tokens represent post-authentication sessions — made this particularly difficult to defend against with standard security controls.

Impact Assessment

The session token theft mechanism creates a unique attack profile:

  • MFA bypass: Stolen tokens represent sessions already authenticated by MFA; replaying them bypasses all second-factor requirements.
  • Certificate bypass: Similarly bypasses certificate-based authentication requirements.
  • No credential exposure: Attackers don’t need to obtain username/password; they work directly with the session token.
  • Mass collection: A single scan can collect tokens for many simultaneously-active authenticated users.
  • Persistent access: Session tokens may remain valid for hours or days, providing extended access windows.
  • Internal network access: Citrix Gateway sessions grant access to the internal resources the authenticated user is authorised for.

Affected Versions

ProductAffected VersionsFixed Version
NetScaler ADC / Gateway 14.1Before 14.1-8.5014.1-8.50+
NetScaler ADC / Gateway 13.1Before 13.1-49.1513.1-49.15+
NetScaler ADC / Gateway 13.0Before 13.0-92.1913.0-92.19+
NetScaler ADC 13.1-FIPSBefore 13.1-37.16413.1-37.164+
NetScaler ADC 12.1-FIPSBefore 12.1-55.30012.1-55.300+

Systems must be configured as Gateway or AAA virtual server to be vulnerable.

Remediation Steps

  1. Apply patches immediately: Update to the fixed versions. This is the only complete fix.

  2. Kill all active sessions after patching: Patching alone is insufficient — existing stolen sessions remain valid. After patching, kill all active sessions:

    kill icaconnection -all
    kill rdp connection -all
    kill pcoip connection -all
    clear lb persistentSessions
  3. Terminate AAA sessions specifically:

    # Via Citrix GUI: Configuration > NetScaler Gateway > Current User Sessions
    # Terminate all sessions
    
    # Via CLI
    kill aaa session -all
  4. Check for compromise before patching: Review NetScaler logs for signs of exploitation (bulk token requests) that may indicate sessions have already been harvested.

  5. Reset all user passwords if extensive compromise suspected: If broad token harvesting is confirmed, prompt all users to reset passwords and re-authenticate after patching.

Detection Guidance

Log sources:

  • NetScaler ns.log: /var/log/ns.log
  • HTTP access logs: /var/nslog/
  • SNMP traps for unusual session counts

Suspicious patterns:

  • High volume of requests to /oauth/idp/.well-known/openid-configuration without matching authentication flows
  • Session token reuse from different source IPs (token theft indicator)
  • Unusual geographic or IP diversity in authenticated sessions

NSlog queries:

# Check for high-frequency requests to vulnerable endpoint
grep "idp/.well-known" /var/log/ns.log | tail -100

# Review session creation events
grep "Login_Succeeded" /var/log/ns.log

Suricata signature:

alert http $EXTERNAL_NET any -> $HOME_NET any (msg:"Citrix NetScaler CVE-2023-4966 CitrixBleed Exploit"; flow:established,to_server; http.uri; content:"/oauth/idp/.well-known/openid-configuration"; http.header_names; content:"Host"; pcre:"/Host:[^\r\n]{200,}/"; sid:9000496; rev:1;)

Timeline

DateEvent
August 2023Citrix internally discovers the vulnerability
October 10, 2023Citrix publishes advisory; patches released
October 10, 2023CISA adds CVE-2023-4966 to KEV catalogue
October 17, 2023Mandiant publishes exploitation analysis; coins “CitrixBleed”
October–November 2023LockBit ransomware campaigns using CitrixBleed documented
November 2023Boeing, ICBC, DP World breaches confirmed via CitrixBleed
November 21, 2023CISA advisory with extensive mitigations published