CVE-2023-4966
CRITICAL KEV RANSOMWARE NUCLEICitrix Netscaler Application Delivery Controller - Memory Corruption
Title source: ruleDescription
Sensitive information disclosure in NetScaler ADC and NetScaler Gateway when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server.
Exploits (19)
nomisec
WORKING POC
10 stars
by RevoltSecurities · infoleak
https://github.com/RevoltSecurities/CVE-2023-4966
nomisec
WORKING POC
8 stars
by mlynchcogent · infoleak
https://github.com/mlynchcogent/CVE-2023-4966-POC
github
WORKING POC
2 stars
by Pr0t0c01 · pythonpoc
https://github.com/Pr0t0c01/CVEs/tree/main/Citrix_CVE-2023-4966
nomisec
WORKING POC
1 stars
by IceBreakerCode · infoleak
https://github.com/IceBreakerCode/CVE-2023-4966
metasploit
SCANNER
by Dylan Pindur, Spencer McIntyre · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/citrix_bleed_cve_2023_4966.rb
Nuclei Templates (1)
Citrix Bleed - Leaking Session Tokens
HIGHVERIFIEDby DhiyaneshDK
Shodan:
title:"Citrix Gateway" || title:"Netscaler Gateway" || http.title:"citrix gateway" || title:"netscaler gateway"
FOFA:
title="citrix gateway" || title:"netscaler gateway"
References (3)
Scores
CVSS v3
9.4
EPSS
0.9435
EPSS Percentile
100.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
Exploitation Intel
CISA KEV
2023-10-18
VulnCheck KEV
2023-10-17
InTheWild.io
2023-10-18
ENISA EUVD
EUVD-2023-54802
Ransomware Use
Confirmed
Classification
CWE
CWE-119
Status
published
Affected Products (4)
citrix/netscaler_application_delivery_controller
< 12.1-55.300
citrix/netscaler_application_delivery_controller
< 12.1-55.300
citrix/netscaler_application_delivery_controller
< 13.0-92.19
citrix/netscaler_gateway
< 13.0-92.19
Timeline
Published
Oct 10, 2023
KEV Added
Oct 18, 2023
Tracked Since
Feb 18, 2026