RealVNC 4.1.1, and other products that use RealVNC such...
High severity
Unreviewed
Published
May 1, 2022
to the GitHub Advisory Database
•
Updated Apr 3, 2025
Description
Published by the National Vulnerability Database
May 15, 2006
Published to the GitHub Advisory Database
May 1, 2022
Last updated
Apr 3, 2025
RealVNC 4.1.1, and other products that use RealVNC such as AdderLink IP and Cisco CallManager, allows remote attackers to bypass authentication via a request in which the client specifies an insecure security type such as "Type 1 - None", which is accepted even if it is not offered by the server, as originally demonstrated using a long password.
References