CVE-2000-0244
Summary
The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication.
- LOW
- NETWORK
- NONE
- COMPLETE
- COMPLETE
- COMPLETE
References
Advisory Timeline
- Published
The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication.