Skip to main content

CVE-2000-0244

Severity High
Score 10/10

Summary

The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication.

  • LOW
  • NETWORK
  • NONE
  • COMPLETE
  • COMPLETE
  • COMPLETE

References

Advisory Timeline

  • Published