Buffer Overrun, System Undone: The Technical Anatomy of Boeing’s Cyber Breach
In October 2023, the U.S. Department of Justice unsealed an indictment linked to the LockBit ransomware group, revealing charges against individuals who had infiltrated the reputable aeronautical company Boeing. LockBit claimed a ransom demand of $200 million to decrypt sensitive company data and prevent the release of the organization's private information.
The attackers are believed to have exploited vulnerabilities in Boeing’s Citrix infrastructure—specifically CVE-2023-4966, also known as Citrix Bleed. This buffer-related flaw was found in several of Citrix’s products, including NetScaler ADC and NetScaler Gateway. The vulnerability functioned like a broken door hinge— allowing attackers to slip past authentication mechanisms and into restricted systems.
Although Boeing has not publicly shared exact details of the breach, here’s one plausible scenario. An attacker could have triggered an HTTP GET request to an OpenID Connect endpoint (an authentication protocol), supplying an overly long Host header. This may have caused a memory over-read, leaking session cookies, credentials, and internal state data.
These credentials let attackers impersonate users or admins without passwords. Since Citrix Gateway is often used for VPN access, hijacked sessions could enable lateral movement into Boeing's internal systems — accessing emails, databases, and applications.
LockBit claimed responsibility and reportedly exfiltrated 43GB of data, leaking it after Boeing allegedly refused to pay. Citrix later released security patches, and agencies like CISA and NIST issued public advisories.