CVE-2000-0244

Citrix ICA - Info Disclosure

Title source: llm
STIX 2.1

Description

The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Dug Song · clocalmultiple
https://www.exploit-db.com/exploits/19821

Scores

EPSS 0.0273
EPSS Percentile 86.0%

Details

Status published
Products (3)
citrix/metaframe 1.0
citrix/metaframe < 1.8 (2 CPE variants)
citrix/winframe 3.5_1.8_for_windows_nt
Published Mar 29, 2000
Tracked Since Feb 18, 2026