CVE-2023-27830

TightVNC before v2.8.75 allows attackers to escalate privileges on the host operating system via replacing legitimate files with crafted files when executing a file transfer. This is due to the fact that TightVNC runs in the backend as a high-privileges account.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9 CRITICAL
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
CISA-ADPADP
9 CRITICAL
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 28%
VendorProductVersion
tightvnctightvnc
𝑥
< 2.8.75
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
tightvnc
bullseye
1:1.3.10-3
fixed
bookworm
1:1.3.10-7
fixed
trixie
1:1.3.10-9
fixed
sid
1:1.3.10-9
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
tightvnc
lunar
not-affected
kinetic
not-affected
jammy
not-affected
focal
not-affected
bionic
not-affected
xenial
not-affected
trusty
not-affected