Description
RealVNC 4.1.1, and other products that use RealVNC such as AdderLink IP and Cisco CallManager, allows remote attackers to bypass authentication via a request in which the client specifies an insecure security type such as "Type 1 - None", which is accepted even if it is not offered by the server, as originally demonstrated using a long password.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
Fri, 22 Nov 2024 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T17:51:03.610Z
Reserved: 2006-05-15T00:00:00.000Z
Link: CVE-2006-2369
No data.
Status : Modified
Published: 2006-05-15T16:06:00.000
Modified: 2026-04-16T00:27:16.627
Link: CVE-2006-2369
No data.
OpenCVE Enrichment
No data.
Weaknesses