7.2
CVSSv2

CVE-2022-27502

Published: 10/06/2022 Updated: 17/06/2022
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

RealVNC VNC Server 6.9.0 up to and including 5.1.0 for Windows allows local privilege escalation because an installer repair operation executes %TEMP% files as SYSTEM.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

realvnc vnc_server

Github Repositories

Exploit of RealVNC VNC Server

RealVNC server up to 690 DLL Hijacking Exploit (CVE-2022-27502) You can use pre-compiled version (64-bit) of it from HERE Copy it to %TEMP% and initiate a repair of RealVNC Server from add or remove programs It will write the output of whoami command in %TEMP%\outputtxt If you want to change the executed command, change line 191 of dllmaincpp and recompile it