10
CVSSv2

CVE-2000-0244

Published: 29/03/2000 Updated: 07/11/2023
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication.

Vulnerable Product Search on Vulmon Subscribe to Product

citrix metaframe 1.0

citrix metaframe

citrix winframe 3.5_1.8_for_windows_nt

Exploits

source: wwwsecurityfocuscom/bid/1077/info The ICA protocol uses a simple XOR-based encryption algorthm to protect user credentials while stored or in transit This encryption can be easily broken, meaning that anyone sniffing the connection can obtain user access to the server The ICA protocol, developed by Citrix, is used in Citrix ser ...