CVE-2006-2369
Realvnc - Authentication Bypass
Title source: ruleDescription
RealVNC 4.1.1, and other products that use RealVNC such as AdderLink IP and Cisco CallManager, allows remote attackers to bypass authentication via a request in which the client specifies an insecure security type such as "Type 1 - None", which is accepted even if it is not offered by the server, as originally demonstrated using a long password.
Exploits (7)
metasploit
SCANNER
rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/vnc/vnc_none_auth.rb
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/17719
exploitdb
WORKING POC
VERIFIED
by H D Moore · remotemultiple
https://www.exploit-db.com/exploits/1794
exploitdb
WORKING POC
VERIFIED
by fdiskyou · pythonremotewindows
https://www.exploit-db.com/exploits/36932
metasploit
WORKING POC
by hdm, theLightCosine · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/vnc/realvnc_41_bypass.rb
References (27)
... and 7 more
Scores
EPSS
0.9114
EPSS Percentile
99.6%
Classification
CWE
CWE-287
Status
draft
Affected Products (1)
vnc/realvnc
Timeline
Published
May 15, 2006
Tracked Since
Feb 18, 2026