🤣
CybersecurityNote
  • Foreword
  • References.md
    • References
    • attackdefense
    • Domain Environment
    • HTB
    • Red Team Range
    • tryhackme
    • vulnhub
  • Security Certificates
    • CISSP
    • CRTO
      • Exam experience sharing
    • OSCP
      • Exam experience sharing
  • Security Testing
    • Lateral Movement
      • AS-REP Roasting Attack
      • Kerberoasting Attack
  • Security Vulnerability
    • application Vulnerability
    • Linux Privilege Escalation Vulnerability
    • Linux Vulnerability
    • unauthorized vulnerability
      • ActiveMQ Unauthorized Access Vulnerability
      • Apache Flink Unauthorized Access Vulnerability
      • Atlassian Crowd Unauthorized Access Vulnerability
      • CouchDB Unauthorized Access Vulnerability
      • Docker Unauthorized Access Vulnerability
      • Dubbo Unauthorized Access Vulnerability
      • Jenkins Unauthorized Access Vulnerability
      • Jupyter Notebook Unauthorized Access Vulnerability
      • MongoDB Unauthorized Access Vulnerability
      • RabbitMQ Unauthorized Access Vulnerability
      • Spring Cloud Gateway Server Unauthorized Access Vulnerability
      • SpringBoot Actuator Unauthorized Access Vulnerability
      • Unauthorized Access to Kubernetes API Server
      • Unauthorized Access Vulnerability in Clickhouse
      • Unauthorized Access Vulnerability in Druid Monitoring Page
      • Unauthorized Access Vulnerability in Hadoop YARN Resourcemanager
      • Unauthorized Access Vulnerability in Hadoop Yarn RPC
      • Unauthorized Access Vulnerability in InfluxDB API
      • Unauthorized Access Vulnerability in JBoss
      • Unauthorized Access Vulnerability in Kafka Manager
      • Unauthorized Access Vulnerability in Kibana
      • Unauthorized Access Vulnerability in Kong
      • Unauthorized Access Vulnerability in LDAP
      • Unauthorized Access Vulnerability in Memcached
      • Unauthorized Access Vulnerability in NFS
      • Unauthorized Access Vulnerability in Redis
      • Unauthorized Access Vulnerability in Rsync
      • Unauthorized Access Vulnerability in Spark
      • Unauthorized Access Vulnerability in VNC Server
      • Unauthorized Access Vulnerability in Weblogic
      • Unauthorized Access Vulnerability in ZooKeeper
      • Zabbix Unauthorized Access Vulnerability
    • Windows Privilege Escalation Vulnerability
    • Windows Vulnerability
Powered by GitBook
On this page
  • Vulnerability Description
  • Scope of Impact
  • Environment Setup
  • Vulnerability Exploitation
  • Defense Measures
  1. Security Vulnerability
  2. unauthorized vulnerability

Unauthorized Access Vulnerability in VNC Server

PreviousUnauthorized Access Vulnerability in SparkNextUnauthorized Access Vulnerability in Weblogic

Last updated 2 years ago

CVE-2006-2369

Vulnerability Description

RealVNC VNC Server is a VNC server software for remote access by UK company RealVNC.

There is an authorization issue vulnerability in RealVNC VNC Server, which stems from the adoption of the RFB (Remote Frame Buffer) protocol that allows the client and server to negotiate the appropriate authentication method. There is a design error in the implementation of the protocol, and a remote attacker can access the server without a password by bypassing authentication.

Scope of Impact

RealVNC <= 4.1.1

Environment Setup

win2003 system

Download address: https://www.filesoul.com/software/RealVNC/4-1-1/download/

Install (just keep clicking next)

Vulnerability Exploitation

vncviewer 192.168.32.252

Defense Measures

  • Configure VNC client login password authentication and configure a password that meets password strength requirements.

  • Run the operating system with the minimum common privilege.

image-20230130160457190
image-20230130160518234
image-20230130160622827