7 results (0.002 seconds)

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 1

An issue was discovered in AnyDesk before 6.2.6 and 6.3.x before 6.3.3. An unnecessarily open listening port on a machine in the LAN of an attacker, opened by the Anydesk Windows client when using the tunneling feature, allows the attacker unauthorized access to the local machine's AnyDesk tunneling protocol stack (and also to any remote destination machine software that is listening to the AnyDesk tunneled port). Se ha detectado un problema en AnyDesk versiones anteriores a 6.2.6 y en versiones 6.3.x anteriores a 6.3.3. Un puerto de escucha innecesariamente abierto en una máquina en la LAN de un atacante, abierto por el cliente de Windows de AnyDesk cuando es usada la funcionalidad tunneling, permite al atacante acceder sin autorización a la pila de protocolos de tunelización de AnyDesk de la máquina local (y también a cualquier software de la máquina de destino remota que esté escuchando el puerto tunelizado de AnyDesk) • https://anydesk.com/en/downloads/windows https://argus-sec.com/discovering-tunneling-service-security-flaws-in-anydesk-remote-application •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 1

An issue was discovered in AnyDesk before 6.2.6 and 6.3.x before 6.3.5. An upload of an arbitrary file to a victim's local ~/Downloads/ directory is possible if the victim is using the AnyDesk Windows client to connect to a remote machine, if an attacker is also connected remotely with AnyDesk to the same remote machine. The upload is done without any approval or action taken by the victim. Se ha detectado un problema en AnyDesk versiones anteriores a 6.2.6 y versiones 6.3.x anteriores a 6.3.5. Es posible subir un archivo arbitrario al directorio local ~/Downloads/ de la víctima si ésta usa el cliente Windows de AnyDesk para conectarse a una máquina remota, si un atacante también es conectado remotamente con AnyDesk a la misma máquina remota. • https://anydesk.com/en/downloads/windows https://argus-sec.com/discovering-tunneling-service-security-flaws-in-anydesk-remote-application • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

AnyDesk before 6.2.6 and 6.3.x before 6.3.3 allows a local user to obtain administrator privileges by using the Open Chat Log feature to launch a privileged Notepad process that can launch other applications. AnyDesk versiones anteriores a 6.2.6 y versiones 6.3.x anteriores a 6.3.3, permite a un usuario local alcanzar privilegios de administrador al usar la función Open Chat Log para lanzar un proceso privilegiado del Bloc de notas que puede lanzar otras aplicaciones • https://anydesk.com/cve/2021-40854 • CWE-269: Improper Privilege Management •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

AnyDesk for macOS versions 6.0.2 and older have a vulnerability in the XPC interface that does not properly validate client requests and allows local privilege escalation. AnyDesk para macOS versiones 6.0.2 y anteriores, presentan una vulnerabilidad en la interfaz XPC que no comprueba apropiadamente unas peticiones de clientes y permite una escalada de privilegios locales • https://anydesk.com/cve/2020-27614 https://download.anydesk.com/changelog.txt • CWE-20: Improper Input Validation •

CVSS: 9.8EPSS: 87%CPEs: 3EXPL: 4

AnyDesk before 5.5.3 on Linux and FreeBSD has a format string vulnerability that can be exploited for remote code execution. AnyDesk versiones anteriores a 5.5.3 en Linux y FreeBSD presenta una vulnerabilidad de cadena de formato que puede ser explotada para una ejecución de código remota AnyDesk version 5.5.2 suffers from a remote code execution vulnerability. • https://www.exploit-db.com/exploits/49613 http://packetstormsecurity.com/files/158291/AnyDesk-GUI-Format-String-Write.html http://packetstormsecurity.com/files/161628/AnyDesk-5.5.2-Remote-Code-Execution.html https://devel0pment.de/?p=1881 https://download.anydesk.com/changelog.txt - • CWE-134: Use of Externally-Controlled Format String •