Zero-Day Exploits

Citrix Bleed CVE-2023-4966: Session Token Theft That Bypassed Every Authentication Control

Citrix Bleed allowed attackers to steal session tokens from NetScaler ADC, bypassing MFA and all authentication controls. LockBit ransomware used it to devastating effect.

James
Threat Intelligence Lead
6 min read

In October 2023, Citrix patched CVE-2023-4966, an information disclosure vulnerability in NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway. The vulnerability, quickly dubbed "Citrix Bleed," allowed unauthenticated attackers to extract session tokens from the memory of vulnerable devices. With a stolen session token, attackers could hijack authenticated sessions, completely bypassing passwords, multi-factor authentication, and every other authentication control. The LockBit ransomware gang exploited it aggressively, and the fallout was severe.

The Vulnerability

CVE-2023-4966 is a buffer over-read vulnerability in the HTTP/S handling of NetScaler ADC and NetScaler Gateway. When processing certain HTTP requests, the vulnerable code reads beyond the intended buffer boundary, potentially exposing sensitive data from the device's memory.

The critical data exposed through this vulnerability: valid session tokens for authenticated users.

The exploit was elegant in its simplicity. An attacker sends a specially crafted HTTP request to a vulnerable NetScaler device. The response includes data leaked from memory, which can contain valid session cookies. The attacker extracts the session cookie and uses it to authenticate to the NetScaler — as the session's original user, with all their permissions.

No password needed. No MFA prompt to bypass. No credential phishing required. The attacker simply steals an active session and inherits all of its access.

Why Citrix Bleed Was So Dangerous

Several factors made CVE-2023-4966 exceptionally dangerous:

MFA Bypass

Organizations invest heavily in multi-factor authentication to protect remote access. Citrix Bleed rendered all of that investment meaningless. Because the attacker hijacks a session that has already completed authentication (including MFA), the authentication controls are not re-triggered. The attacker appears as a legitimate, fully authenticated user.

Session Persistence

NetScaler sessions can persist for hours or even days, depending on the organization's timeout configuration. A single stolen token could provide extended access without any need to re-authenticate.

Privileged Access

NetScaler ADC and Gateway are remote access infrastructure. The sessions being stolen typically provided VPN or application access to internal corporate networks. Hijacking these sessions gave attackers the same internal network access as the legitimate user.

Difficult Detection

From the NetScaler's perspective, the hijacked session looks identical to the legitimate session. The same session token is being used, just from a different IP address. While some organizations monitor for session IP changes, many don't — and NetScaler's default configuration doesn't enforce IP binding for sessions.

The LockBit Campaign

The LockBit ransomware group was among the most aggressive exploiters of Citrix Bleed. Their campaign was notable for its breadth and impact:

Boeing: In late October 2023, Boeing confirmed it was investigating a cyber incident after LockBit listed the aerospace giant on its leak site. The initial access was attributed to exploitation of Citrix Bleed against Boeing's NetScaler infrastructure.

ICBC (Industrial and Commercial Bank of China): The US arm of the world's largest bank was hit by LockBit in November 2023, disrupting Treasury securities trading. Citrix Bleed was identified as the entry vector.

Allen & Overy: One of the world's largest law firms confirmed a LockBit attack in November 2023, attributed to Citrix Bleed.

DP World Australia: The port operator experienced a significant cyber incident in November 2023, disrupting freight operations across multiple Australian ports.

CISA, FBI, and MS-ISAC issued a joint advisory specifically about LockBit's exploitation of Citrix Bleed, providing detailed indicators of compromise and mitigation guidance. The advisory noted that the vulnerability was being exploited at scale.

The Patching Problem

Citrix released patches on October 10, 2023. But patching alone was not sufficient:

Active sessions survived patching. Applying the patch did not invalidate existing session tokens. Attackers who had already stolen tokens could continue using them even after the vulnerable device was patched. Organizations had to both patch and force termination of all active sessions.

Token theft was silent. The exploitation left minimal forensic evidence on the NetScaler device. Organizations couldn't easily determine whether tokens had been stolen before patching. This meant every organization with a vulnerable NetScaler had to assume tokens were compromised.

Delayed awareness. Mandiant reported that exploitation had been occurring since at least late August 2023 — more than a month before the patch was available. Organizations that patched promptly in October had already been exposed for weeks.

The recommended remediation was:

  1. Patch to the fixed version immediately
  2. Kill all active sessions (forcing all users to re-authenticate)
  3. Rotate all credentials that may have been accessible through compromised sessions
  4. Review access logs for indicators of session hijacking
  5. Hunt for post-exploitation artifacts in the internal network

The Persistent Problem of Network Edge Devices

Citrix Bleed fits the pattern of critical vulnerabilities in network edge devices that has defined cybersecurity since 2019:

  • Pulse Secure CVE-2019-11510 / CVE-2021-22893
  • Citrix ADC CVE-2019-19781 / CVE-2023-3519 / CVE-2023-4966
  • Fortinet CVE-2022-42475 / CVE-2023-27997
  • Cisco IOS XE CVE-2023-20198
  • Ivanti CVE-2023-46805 / CVE-2024-21887

These devices are internet-facing by necessity, they handle authentication and access control, they have access to internal networks, and they're difficult to monitor with traditional security tools. They represent the most dangerous and least-protected component of most enterprise networks.

Defensive Takeaways

Session Management Must Be a Security Control

Session tokens are authentication tokens. They should be treated with the same security rigor as passwords and MFA tokens. This means short session lifetimes, IP-bound sessions where possible, and the ability to rapidly invalidate all sessions in response to a security event.

Patching Edge Devices Isn't Enough

When an edge device vulnerability is disclosed, patching prevents future exploitation but doesn't address past exposure. Organizations need to assume compromise until proven otherwise and act accordingly — invalidating sessions, rotating credentials, and hunting for post-exploitation activity.

Credential Rotation After Edge Device Compromise

If an attacker had VPN access through a stolen session, they potentially accessed internal resources with the session user's credentials. Those credentials — and anything they provided access to — should be rotated.

How Safeguard.sh Helps

Safeguard.sh addresses the visibility and response challenges exposed by Citrix Bleed:

  • Edge Device Vulnerability Tracking: Safeguard.sh monitors CVEs affecting network edge devices with the highest priority, ensuring critical vulnerabilities like Citrix Bleed are flagged immediately.
  • Exposure Assessment: Safeguard.sh identifies which devices are internet-facing and their current patch status, enabling rapid response when zero-days are disclosed.
  • Post-Patch Remediation Guidance: Safeguard.sh provides context-aware remediation guidance, alerting you when patching alone is insufficient and additional steps (session invalidation, credential rotation) are required.
  • Supply Chain Context: Safeguard.sh tracks the security history of infrastructure vendors, helping you assess the long-term risk of depending on products with repeated critical vulnerabilities.

Citrix Bleed demonstrated that a single vulnerability in network edge infrastructure can cascade into ransomware attacks against the world's largest organizations. Safeguard.sh helps you stay ahead of these threats.

Never miss an update

Weekly insights on software supply chain security, delivered to your inbox.