Description |
This article describes the Citrix Bleed Attack coverage with FortiNDR Cloud. CVE-2023-4966 (also known as Citrix Bleed) |
||||||
CVE ID |
CVE-2023-4966 (https://nvd.nist.gov/vuln/detail/CVE-2023-4966) |
||||||
NDR Cloud Detection Rule |
|
||||||
Playbook |
Playbook: Citrix Bleed Attack (CVE-2023-4966) This playbook identifies activity related to the Citrix Bleed (CVE-2023-4966) exploitation. Citrix Bleed is being widely exploited, with multiple threat actors, including ransomware groups, targeting internet-accessible NetScaler ADC and Gateway instances. After exploiting CVE-2023-4966, the attackers may engage in network reconnaissance, stealing account credentials and moving laterally via RDP. The exploit is done by sending an HTTP request with a very large hostname set. |
||||||
Threat hunting |
FortiNDR Cloud users can use the following IOCs from Fortinet to hunt for “Citrix Bleed” related activities |
||||||
Suricata Coverage |
Customers can create custom investigation/detections using the Suricata signatures below |
||||||
Other Fortinet Products |
For more details regarding mitigating the vulnerability by utilizing Fortinet products, please refer to |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.