The VNC authentication mechanism bases on a challenge-response system where both server and client use the same password for encryption. The challenge is sent from the server to the client, is encrypted by the client and sent back. The server does the same encryption locally and if the responses match it is prooven that the client knows the correct password. Since all VNC communication is unencrypted, an attacker can obtain the challenge and response and try to derive the password from this information.
History

Thu, 03 Jul 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 03 Jul 2025 11:45:00 +0000

Type Values Removed Values Added
Description The VNC authentication mechanism bases on a challenge-response system where both server and client use the same password for encryption. The challenge is sent from the server to the client, is encrypted by the client and sent back. The server does the same encryption locally and if the responses match it is prooven that the client knows the correct password. Since all VNC communication is unencrypted, an attacker can obtain the challenge and response and try to derive the password from this information.
Title CVE-2025-27458
Weaknesses CWE-327
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: SICK AG

Published: 2025-07-03T11:33:30.605Z

Updated: 2025-07-03T13:15:43.013Z

Reserved: 2025-02-26T08:40:02.358Z

Link: CVE-2025-27458

cve-icon Vulnrichment

Updated: 2025-07-03T13:04:15.323Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-03T12:15:23.917

Modified: 2025-07-03T15:13:53.147

Link: CVE-2025-27458

cve-icon Redhat

No data.