CVE-2025-26326

A vulnerability was identified in the NVDA Remote (version 2.6.4) and Tele NVDA Remote (version 2025.3.3) remote connection add-ons, which allows an attacker to obtain total control of the remote system by guessing a weak password. The problem occurs because these add-ons accept any password entered by the user and do not have an additional authentication or computer verification mechanism. Tests indicate that more than 1,000 systems use easy-to-guess passwords, many with less than 4 to 6 characters, including common sequences. This allows brute force attacks or trial-and-error attempts by malicious invaders. The vulnerability can be exploited by a remote attacker who knows or can guess the password used in the connection. As a result, the attacker gains complete access to the affected system and can execute commands, modify files, and compromise user security.
Configurations

No configuration.

History

13 Mar 2025, 16:15

Type Values Removed Values Added
References
  • () https://github.com/NVDARemote/NVDARemote -
  • () https://github.com/nvda-es/TeleNVDA -
  • () https://nvda-addons.org/addon.php?id=270 -
  • () https://nvdaremote.com/ -
Summary (en) A vulnerability in the remote connection complements of the NVDA (Nonvisual Desktop Access) 2024.4.1 and 2024.4.2 was identified, which allows an attacker to obtain total control of the remote system when guessing a weak password. The problem occurs because the complements accept any password typed by the user and do not have an additional authentication or checking mechanism by the computer that will be accessed. Tests indicate that over 1,000 systems use easy to guess passwords, many with less than 4 to 6 characters, including common sequences. This enables brute strength or attempt and error attacks on the part of malicious invaders. Vulnerability can be explored by a remote striker who knows or can guess the password used in the connection. As a result, the invader gets complete access to the affected system and can run commands, modify files and compromise user security. (en) A vulnerability was identified in the NVDA Remote (version 2.6.4) and Tele NVDA Remote (version 2025.3.3) remote connection add-ons, which allows an attacker to obtain total control of the remote system by guessing a weak password. The problem occurs because these add-ons accept any password entered by the user and do not have an additional authentication or computer verification mechanism. Tests indicate that more than 1,000 systems use easy-to-guess passwords, many with less than 4 to 6 characters, including common sequences. This allows brute force attacks or trial-and-error attempts by malicious invaders. The vulnerability can be exploited by a remote attacker who knows or can guess the password used in the connection. As a result, the attacker gains complete access to the affected system and can execute commands, modify files, and compromise user security.

06 Mar 2025, 21:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
CWE CWE-287
Summary
  • (es) Se ha identificado una vulnerabilidad en los complementos de conexión remota de NVDA (Nonvisual Desktop Access) 2024.4.1 y 2024.4.2, que permite a un atacante obtener el control total del sistema remoto al adivinar una contraseña débil. El problema se produce porque los complementos aceptan cualquier contraseña tecleada por el usuario y no cuentan con un mecanismo adicional de autenticación o comprobación por parte del equipo al que se va a acceder. Las pruebas indican que más de 1.000 sistemas utilizan contraseñas fáciles de adivinar, muchas de ellas con menos de 4 a 6 caracteres, incluidas secuencias comunes. Esto permite ataques de fuerza bruta o de intento y error por parte de invasores maliciosos. La vulnerabilidad puede ser explorada por un atacante remoto que conozca o pueda adivinar la contraseña utilizada en la conexión. Como resultado, el invasor obtiene acceso completo al sistema afectado y puede ejecutar comandos, modificar archivos y comprometer la seguridad del usuario.

28 Feb 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-28 15:15

Updated : 2025-03-13 16:15


NVD link : CVE-2025-26326

Mitre link : CVE-2025-26326

CVE.ORG link : CVE-2025-26326


JSON object : View

Products Affected

No product.

CWE
CWE-287

Improper Authentication