Published: 2000-03-29
The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication.
Overall Severity: N/A
| Type | Score | Severity | Vector |
|---|
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions: