The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication.
Get an AI-powered plain-language explanation of this vulnerability and remediation steps.
Login to generate AI explanation4 reference(s) from NVD