Description
The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Dug Song · clocalmultiple
https://www.exploit-db.com/exploits/19821
Scores
EPSS
0.0273
EPSS Percentile
86.0%
Details
Status
published
Products (3)
citrix/metaframe
1.0
citrix/metaframe
< 1.8 (2 CPE variants)
citrix/winframe
3.5_1.8_for_windows_nt
Published
Mar 29, 2000
Tracked Since
Feb 18, 2026