CVE-2006-2369

Realvnc - Authentication Bypass

Title source: rule

Description

RealVNC 4.1.1, and other products that use RealVNC such as AdderLink IP and Cisco CallManager, allows remote attackers to bypass authentication via a request in which the client specifies an insecure security type such as "Type 1 - None", which is accepted even if it is not offered by the server, as originally demonstrated using a long password.

Exploits (7)

exploitdb WORKING POC VERIFIED
by fdiskyou · pythonremotewindows
https://www.exploit-db.com/exploits/36932
exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/17719
exploitdb WORKING POC VERIFIED
by redsand · remotemultiple
https://www.exploit-db.com/exploits/1791
exploitdb WORKING POC VERIFIED
by H D Moore · remotemultiple
https://www.exploit-db.com/exploits/1794
nomisec WORKING POC
by hacker1337itme · poc
https://github.com/hacker1337itme/CVE-2006-2369
metasploit WORKING POC
by hdm, theLightCosine · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/vnc/realvnc_41_bypass.rb
metasploit SCANNER
rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/vnc/vnc_none_auth.rb

Scores

EPSS 0.9250
EPSS Percentile 99.7%

Details

CWE
CWE-287
Status published
Products (1)
vnc/realvnc 4.1.1
Published May 15, 2006
Tracked Since Feb 18, 2026