cve/2006/CVE-2006-2369.md

23 lines
1.1 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2006-2369](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2369)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20n%2Fa%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
RealVNC 4.1.1, and other products that use RealVNC such as AdderLink IP and Cisco CallManager, allows remote attackers to bypass authentication via a request in which the client specifies an insecure security type such as "Type 1 - None", which is accepted even if it is not offered by the server, as originally demonstrated using a long password.
### POC
#### Reference
- http://seclists.org/fulldisclosure/2022/May/29
- http://securityreason.com/securityalert/8355
2024-07-25 21:25:12 +00:00
- http://www.cisco.com/warp/public/707/cisco-sr-20060622-cmm.shtml
2024-05-26 14:27:05 +02:00
- http://www.intelliadmin.com/blog/2006/05/vnc-flaw-proof-of-concept.html
#### Github
- https://github.com/RootUp/AutoSploit
- https://github.com/hackerhouse-opensource/exploits
- https://github.com/krishpranav/autosploit