CVE Vulnerabilities

CVE-2023-27830

Improper Privilege Management

Published: Apr 12, 2023 | Modified: Apr 24, 2023
CVSS 3.x
9
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM

TightVNC before v2.8.75 allows attackers to escalate privileges on the host operating system via replacing legitimate files with crafted files when executing a file transfer. This is due to the fact that TightVNC runs in the backend as a high-privileges account.

Weakness

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.

Affected Software

Name Vendor Start Version End Version
Tightvnc Tightvnc * 2.8.75 (excluding)
Tightvnc Ubuntu trusty *
Tightvnc Ubuntu xenial *

Potential Mitigations

References