Mandiant Consulting advised security teams that only applying the patch that was released to fix a recent Citrix NetScaler ADC and Gateway vulnerability was not enough — they need to close all active sessions to ensure that the vulnerable code is not resident in memory. The vulnerability — CVE-2023-4966, which is rated a critical 9.4 by Citrix — lets attackers steal the token of recently connected users, allowing the attacker to gain access to whatever resources the user has permissions to access in Citrix.
Source: SC Magazine