AI Score
Confidence
Low
EPSS
Percentile
73.8%
The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication.
www.securityfocus.com/bid/1077
www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.BSO.4.20.0003290949280.2640-100000%40naughty.monkey.org