CVE-2023-4966 — CitrixBleed Session Hijacking in NetScaler ADC and NetScaler Gateway

Technical analysis of CVE-2023-4966 (CitrixBleed), the critical information disclosure vulnerability affecting Citrix NetScaler ADC and Gateway appliances that allowed attackers to hijack authenticated sessions.

CRITICAL CVSS: 9.4

CVE-2023-4966, widely known as CitrixBleed, is a critical information disclosure vulnerability affecting Citrix NetScaler ADC and NetScaler Gateway appliances. The flaw allows attackers to retrieve authentication session tokens from memory, which can then be reused to impersonate authenticated users.

Because NetScaler devices commonly act as remote access gateways, the vulnerability can allow attackers to gain unauthorized access to internal enterprise resources. In many environments these appliances protect VPN services, web applications, and identity authentication portals, placing them directly on the organization’s external attack surface.

The vulnerability became particularly significant because security authorities confirmed it was exploited in real-world attacks shortly after disclosure.


Vulnerability Overview

Field Value
CVE CVE-2023-4966
Common Name CitrixBleed
Severity Critical
CVSS 9.4
Vendor Citrix Systems
Products NetScaler ADC, NetScaler Gateway
Vulnerability Type Sensitive information disclosure
Attack Vector Network
Exploitation Status Known exploited in the wild
Disclosure Date 2023-10-10

What the Vulnerability Allows

The vulnerability exposes session-related information stored in appliance memory. Attackers can retrieve authentication tokens belonging to legitimate users and reuse them to access protected services.

This form of attack is known as session hijacking, where an attacker impersonates an authenticated session instead of stealing credentials directly.

Once a valid session token is obtained, the attacker may gain access to corporate systems behind the gateway, depending on the privileges associated with the compromised session.


Why CitrixBleed Was High Impact

Several characteristics made CitrixBleed particularly dangerous.

First, NetScaler appliances frequently operate as internet-facing remote access gateways. Any vulnerability affecting them immediately increases exposure across the external attack surface.

Second, session hijacking allows attackers to bypass authentication mechanisms, including some multi-factor authentication workflows.

Finally, once access is obtained, attackers may move deeper into the environment using techniques such as lateral movement or credential abuse.

Because of these factors, CitrixBleed quickly became one of the most critical enterprise infrastructure vulnerabilities disclosed in recent years.


Affected Products

The following NetScaler versions were reported as vulnerable prior to vendor patches.

Product Affected Versions Fixed Versions
NetScaler ADC / NetScaler Gateway 14.1 before 14.1-8.50 14.1-8.50 and later
NetScaler ADC / NetScaler Gateway 13.1 before 13.1-49.15 13.1-49.15 and later
NetScaler ADC / NetScaler Gateway 13.0 before 13.0-92.19 13.0-92.19 and later
NetScaler ADC 13.1-FIPS before 13.1-37.164 13.1-37.164 and later
NetScaler ADC 12.1-FIPS / 12.1-NDcPP before 12.1-55.300 12.1-55.300 and later

Organizations running vulnerable versions were advised to apply vendor patches immediately.


Exploitation in the Wild

Government agencies and security vendors confirmed active exploitation shortly after disclosure. Attackers targeted exposed NetScaler appliances to obtain valid authentication sessions.

Because the vulnerability does not require credential theft, malicious access may initially appear similar to legitimate user activity.

Security teams investigating potential compromise should analyze authentication logs, session activity, and remote access records for anomalies.


Detection Considerations

Security teams reviewing NetScaler infrastructure should examine logs and network activity for suspicious authentication patterns.

Indicators may include:

  • unexpected session reuse from unfamiliar IP addresses
  • abnormal authentication activity through NetScaler gateways
  • access to internal systems immediately following remote session activity
  • suspicious privilege changes after remote access

Monitoring platforms such as Security Information and Event Management and behavioral detection tools like User and Entity Behavior Analytics can help identify these patterns.


Mitigation Guidance

Organizations should take the following defensive steps.

  1. identify all NetScaler ADC and Gateway appliances exposed to the internet
  2. update affected systems to patched vendor versions
  3. terminate existing authentication sessions after patching
  4. review authentication logs for suspicious activity
  5. investigate potential compromise if appliances were exposed prior to patching

Where exploitation is suspected, incident response teams should review authentication systems and internal access logs to determine whether unauthorized activity occurred.


Security Implications

CitrixBleed demonstrated how vulnerabilities affecting edge authentication infrastructure can rapidly escalate into enterprise compromise. Even without remote code execution, the ability to hijack authenticated sessions provides attackers with powerful access capabilities.

Organizations that maintain strong vulnerability management, continuous monitoring, and proactive threat hunting are better positioned to detect and respond to vulnerabilities affecting critical remote access infrastructure.