CVE-2022-27502

RealVNC VNC Server 6.9.0 through 5.1.0 for Windows allows local privilege escalation because an installer repair operation executes %TEMP% files as SYSTEM.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:realvnc:vnc_server:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

17 Jun 2022, 16:22

Type Values Removed Values Added
References (MISC) https://realvnc.com - (MISC) https://realvnc.com - Vendor Advisory
References (MISC) https://help.realvnc.com/hc/en-us/articles/360002478311-Are-there-any-known-security-vulnerabilities-#cve-2008-4770-moderate-%E2%80%94-only-affects-vnc-viewer--0-1 - (MISC) https://help.realvnc.com/hc/en-us/articles/360002478311-Are-there-any-known-security-vulnerabilities-#cve-2008-4770-moderate-%E2%80%94-only-affects-vnc-viewer--0-1 - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 7.2
v3 : 7.8
CWE NVD-CWE-noinfo
CPE cpe:2.3:a:realvnc:vnc_server:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

10 Jun 2022, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-06-10 13:15

Updated : 2024-02-04 22:29


NVD link : CVE-2022-27502

Mitre link : CVE-2022-27502

CVE.ORG link : CVE-2022-27502


JSON object : View

Products Affected

microsoft

  • windows

realvnc

  • vnc_server