Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2000-0244 — Citrix Metaframe vulnerability
4 documents4 sources
Severity
10.0CRITICALNVD
EPSS
2.7%
top 14.02%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedMar 29
Latest updateApr 30
Description
The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication.
CVSS vector
AV:N/AC:L/C:C/I:C/A:CExploitability: 10.0 | Impact: 10.0
Affected Packages2 packages
Patches
🔴Vulnerability Details
1GHSA▶
GHSA-c2cj-5326-gh33: The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication↗2022-04-30
💥Exploits & PoCs
1📋Vendor Advisories
1Citrix▶
CVE-2000-0244: The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication.↗2000-03-29