RealVNC VNC Server 6.9.0 through 5.1.0 for Windows allows local privilege escalation because an installer repair operation executes %TEMP% files as SYSTEM.
References
Link | Resource |
---|---|
https://help.realvnc.com/hc/en-us/articles/360002478311-Are-there-any-known-security-vulnerabilities-#cve-2008-4770-moderate-%E2%80%94-only-affects-vnc-viewer--0-1 | Vendor Advisory |
https://realvnc.com | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
17 Jun 2022, 16:22
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://realvnc.com - Vendor Advisory | |
References | (MISC) https://help.realvnc.com/hc/en-us/articles/360002478311-Are-there-any-known-security-vulnerabilities-#cve-2008-4770-moderate-%E2%80%94-only-affects-vnc-viewer--0-1 - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 7.2
v3 : 7.8 |
CWE | NVD-CWE-noinfo | |
CPE | cpe:2.3:a:realvnc:vnc_server:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
10 Jun 2022, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-06-10 13:15
Updated : 2024-02-04 22:29
NVD link : CVE-2022-27502
Mitre link : CVE-2022-27502
CVE.ORG link : CVE-2022-27502
JSON object : View
Products Affected
microsoft
- windows
realvnc
- vnc_server
CWE