ID |
CVE-2023-27830
|
Sažetak |
TightVNC before v2.8.75 allows attackers to escalate privileges on the host operating system via replacing legitimate files with crafted files when executing a file transfer. This is due to the fact that TightVNC runs in the backend as a high-privileges account. |
Reference |
|
CVSS |
Base: | 9.0 |
Impact: | 6.0 |
Exploitability: | 2.3 |
|
Pristup |
Vektor | Složenost | Autentikacija |
NETWORK |
LOW |
LOW |
|
Impact |
Povjerljivost | Cjelovitost | Dostupnost |
HIGH |
HIGH |
HIGH |
|
CVSS vektor |
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H |
Zadnje važnije ažuriranje |
08-02-2025 - 03:15 |
Objavljeno |
12-04-2023 - 15:15 |