FKIE_CVE-2025-27458
Vulnerability from fkie_nvd - Published: 2025-07-03 12:15 - Updated: 2025-07-03 15:13
Severity ?
Summary
The VNC authentication mechanism bases on a challenge-response system where both server and client use the same password for encryption. The challenge is sent from the server to the client, is encrypted by the client and sent back. The server does the same encryption locally and if the responses match it is prooven that the client knows the correct password. Since all VNC communication is unencrypted, an attacker can obtain the challenge and response and try to derive the password from this information.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The VNC authentication mechanism bases on a challenge-response system where both server and client use the same password for encryption. The challenge is sent from the server to the client, is encrypted by the client and sent back. The server does the same encryption locally and if the responses match it is prooven that the client knows the correct password. Since all VNC communication is unencrypted, an attacker can obtain the challenge and response and try to derive the password from this information."
},
{
"lang": "es",
"value": "El mecanismo de autenticaci\u00f3n de VNC se basa en un sistema de desaf\u00edo-respuesta donde tanto el servidor como el cliente usan la misma contrase\u00f1a para el cifrado. El desaf\u00edo se env\u00eda del servidor al cliente, este lo cifra y lo devuelve. El servidor realiza el mismo cifrado localmente y, si las respuestas coinciden, se comprueba que el cliente conoce la contrase\u00f1a correcta. Dado que toda la comunicaci\u00f3n de VNC no est\u00e1 cifrada, un atacante puede obtener el desaf\u00edo y la respuesta e intentar obtener la contrase\u00f1a a partir de esta informaci\u00f3n."
}
],
"id": "CVE-2025-27458",
"lastModified": "2025-07-03T15:13:53.147",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "psirt@sick.de",
"type": "Secondary"
}
]
},
"published": "2025-07-03T12:15:23.917",
"references": [
{
"source": "psirt@sick.de",
"url": "https://sick.com/psirt"
},
{
"source": "psirt@sick.de",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"source": "psirt@sick.de",
"url": "https://www.endress.com"
},
{
"source": "psirt@sick.de",
"url": "https://www.first.org/cvss/calculator/3.1"
},
{
"source": "psirt@sick.de",
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.json"
},
{
"source": "psirt@sick.de",
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.pdf"
}
],
"sourceIdentifier": "psirt@sick.de",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-327"
}
],
"source": "psirt@sick.de",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…