Weak Encryption Vulnerability in Citrix ICA Protocol
CVE-2000-0244

Currently unrated

Key Information:

Vendor
Citrix
Vendor
CVE Published:
29 March 2000

Summary

The Citrix ICA protocol is susceptible to vulnerabilities due to its reliance on weak XOR encryption for user authentication. This flawed encryption scheme compromises the security of transmitted data, making it easier for attackers to exploit user credentials. Organizations using this protocol should urgently review their security measures and consider adopting stronger encryption methods to protect sensitive information from unauthorized access.

References

Timeline

  • Vulnerability Reserved

  • Vulnerability published

.