- Description
- The VNC authentication mechanism bases on a challenge-response system where both server and client use the same password for encryption. The challenge is sent from the server to the client, is encrypted by the client and sent back. The server does the same encryption locally and if the responses match it is prooven that the client knows the correct password. Since all VNC communication is unencrypted, an attacker can obtain the challenge and response and try to derive the password from this information.
- Source
- psirt@sick.de
- NVD status
- Awaiting Analysis
CVSS 3.1
- Type
- Secondary
- Base score
- 6.5
- Impact score
- 3.6
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
- Severity
- MEDIUM
- psirt@sick.de
- CWE-327
- Hype score
- Not currently trending
CVE-2025-27458 VNC Authentication Bypass via Challenge-Response Encryption Weakness https://t.co/K96Uw6jzKt
@VulmonFeeds
3 Jul 2025
23 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-27458 The VNC authentication mechanism bases on a challenge-response system where both server and client use the same password for encryption. The challenge is sent from th… https://t.co/adEubsgCAB
@CVEnew
3 Jul 2025
307 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes