CVE-2006-2369

Realvnc - Authentication Bypass

Title source: rule

Description

RealVNC 4.1.1, and other products that use RealVNC such as AdderLink IP and Cisco CallManager, allows remote attackers to bypass authentication via a request in which the client specifies an insecure security type such as "Type 1 - None", which is accepted even if it is not offered by the server, as originally demonstrated using a long password.

Exploits (7)

nomisec WORKING POC
by hacker1337itme · poc
https://github.com/hacker1337itme/CVE-2006-2369
metasploit SCANNER
rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/vnc/vnc_none_auth.rb
exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/17719
exploitdb WORKING POC VERIFIED
by redsand · remotemultiple
https://www.exploit-db.com/exploits/1791
exploitdb WORKING POC VERIFIED
by H D Moore · remotemultiple
https://www.exploit-db.com/exploits/1794
exploitdb WORKING POC VERIFIED
by fdiskyou · pythonremotewindows
https://www.exploit-db.com/exploits/36932
metasploit WORKING POC
by hdm, theLightCosine · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/vnc/realvnc_41_bypass.rb

Scores

EPSS 0.9114
EPSS Percentile 99.6%

Classification

CWE
CWE-287
Status draft

Affected Products (1)

vnc/realvnc

Timeline

Published May 15, 2006
Tracked Since Feb 18, 2026