You are CISO of a 2,400-employee Canadian bank — Tuesday 09:14 ET. CISA publishes a new Known Exploited Vulnerability (CVE-2026-13947, Citrix NetScaler ADC, CVSS 9.8). Your SOC analyst asks: "Are we exposed, who's targeting it, and what's the blast radius if we get hit before patch window?"
Live mesh panels (synthetic data)
ThreatPulse — CVE intelligence
CVE-2026-13947
CVSS 9.8
RCE, pre-auth
CISA KEV
Added 09:01
exploited in wild
Active campaigns
3 known
ransom + APT-Asia + commodity
Exploit availability
PoC public
Metasploit module exists
Patch SLA
<72h
regulatory + insurance
EndpointPulse — your exposure
Citrix ADC instances
12
all production
Internet-facing
4
highest priority
Patch level
6 unpatched
v13.1-49.15
Compensating controls
WAF + GeoIP
partial mitigation
Time-to-patch est.
~36h
needs change board
AdversarialAI — attack-path simulation
Initial access
RCE on ADC
no auth required
Lateral movement
AD trust
domain admin in 4-6h
Crown jewels reach
Core banking
12 hops max
Data exfil capacity
~80 GB/h
via legit DNS
Confidence
82%
ResiliencePulse drill data
Mesh query
Are we exposed to CVE-2026-13947, and what's the blast radius before patch?
Mesh composite answer
Exposed: 4 internet-facing ADCs unpatched. Blast radius: full domain compromise within 6h. Patch the 4 by EOD.
ThreatPulse confirms CVE-2026-13947 is a pre-auth RCE on Citrix NetScaler with active wild exploitation (3 campaigns, including APT-Asia which has previously hit Canadian banking). EndpointPulse shows you have 12 ADC instances; 6 are unpatched, of which 4 are internet-facing — those are the real risk. AdversarialAI ran the attack-path: an attacker landing on any of the 4 internet-facing ADCs reaches domain admin within 4-6h via existing AD trust paths, and crown-jewel banking systems within 12 hops. Your WAF + GeoIP provide partial mitigation but PoC bypasses are already public. ResiliencePulse playbook says patch within 24h or temporarily disable the 4 internet-facing ADCs; the other 8 (internal-only) can wait for next change window.
Provenance — which flagship contributed what
ThreatPulse
CISA KEV ingest 09:01 → CVE + 3 campaigns + PoC
EndpointPulse
asset graph → 12 ADCs, 6 unpatched, 4 exposed
AdversarialAI
graph-based attack-path → 4-6h to DA, 12 hops to core
This is a recorded demo. Numbers shown are synthetic and illustrative —
designed to show how the mesh fuses signals across flagships. The free trial runs the
same workflow on your own data with live FXWatch / SentimentDNA / CreditPulse / etc.
feeds. No live Claude calls were made on this page.