// For flags

CVE-2021-41380

 

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

RealVNC Viewer 6.21.406 allows remote VNC servers to cause a denial of service (application crash) via crafted RFB protocol data. NOTE: It is asserted that this issue requires social engineering a user into connecting to a fake VNC Server. The VNC Viewer application they are using will then hang, until terminated, but no memory leak occurs - the resources are freed once the hung process is terminated and the resource usage is constant during the hang. Only the process that is connected to the fake Server is affected. This is an application bug, not a security issue

** EN DISPUTA ** RealVNC Viewer 6.21.406 permite que los servidores VNC remotos provoquen una denegación de servicio (caída de la aplicación) a través de datos de protocolo RFB manipulados. NOTA: Se afirma que este problema requiere ingeniería social para que un usuario se conecte a un servidor VNC falso. La aplicación VNC Viewer que están utilizando se colgará, hasta que se termine, pero no se produce ninguna fuga de memoria - los recursos se liberan una vez que el proceso colgado se termina y el uso de recursos es constante durante el cuelgue. Sólo el proceso que está conectado al falso servidor se ve afectado. Esto es un error de la aplicación, no un problema de seguridad

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-09-17 CVE Reserved
  • 2021-09-17 CVE Published
  • 2024-06-02 EPSS Updated
  • 2024-08-04 CVE Updated
  • 2024-08-04 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-20: Improper Input Validation
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Realvnc
Search vendor "Realvnc"
Vnc Viewer
Search vendor "Realvnc" for product "Vnc Viewer"
6.21.406
Search vendor "Realvnc" for product "Vnc Viewer" and version "6.21.406"
-
Affected