CVE-2020-26117

HIGH

Tigervnc < 1.11.0 - Improper Certificate Validation

Title source: rule
STIX 2.1

Description

In rfb/CSecurityTLS.cxx and rfb/CSecurityTLS.java in TigerVNC before 1.11.0, viewers mishandle TLS certificate exceptions. They store the certificates as authorities, meaning that the owner of a certificate could impersonate any server after a client had added an exception.

References (9)

Core 9
Core References
Release Notes, Third Party Advisory x_refsource_misc
https://github.com/TigerVNC/tigervnc/releases/tag/v1.11.0
Issue Tracking, Third Party Advisory x_refsource_misc
https://bugzilla.opensuse.org/show_bug.cgi?id=1176733
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2020/10/msg00007.html
Broken Link, Mailing List, Third Party Advisory vendor-advisory x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00025.html
Broken Link, Mailing List, Third Party Advisory vendor-advisory x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00024.html

Scores

CVSS v3 8.1
EPSS 0.0069
EPSS Percentile 71.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

Details

CWE
CWE-295
Status published
Products (3)
debian/debian_linux 9.0
opensuse/leap 15.2
tigervnc/tigervnc < 1.11.0
Published Sep 27, 2020
Tracked Since Feb 18, 2026