vendor:
ICA Protocol
by:
Dug Song
7.5
CVSS
HIGH
XOR-based Encryption Algorithm Vulnerability
327
CWE
Product Name: ICA Protocol
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2001
ICA Protocol XOR-based Encryption Algorithm Vulnerability
The ICA protocol uses a simple XOR-based encryption algorithm to protect user credentials while stored or in transit. This encryption can be easily broken, meaning that anyone sniffing the connection can obtain user access to the server. The ICA protocol, developed by Citrix, is used in Citrix server products such as WinFrame and MetaFrame and possibly others, and in Citrix and third party clients for those products.
Mitigation:
Ensure that the ICA protocol is not used to protect user credentials while stored or in transit.