CVE Vulnerabilities

CVE-2023-27830

Improper Privilege Management

Published: Apr 12, 2023 | Modified: Feb 08, 2025
CVSS 3.x
9
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

TightVNC before v2.8.75 allows attackers to escalate privileges on the host operating system via replacing legitimate files with crafted files when executing a file transfer. This is due to the fact that TightVNC runs in the backend as a high-privileges account.

Weakness

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.

Affected Software

NameVendorStart VersionEnd Version
TightvncTightvnc*2.8.75 (excluding)
TightvncUbuntutrusty*
TightvncUbuntuxenial*

Potential Mitigations

References