This script is Copyright (C) 2006-2016 Tenable Network Security, Inc.
The remote VNC server is prone to an authentication bypass issue.
The VNC server installed on the remote host allows an attacker
to bypass authentication by simply requesting 'Type 1 - None' as the
authentication type even though it is not explicitly configured to
See also :
If using RealVNC, upgrade to RealVNC Free Edition 4.1.2 / Personal Edition 4.2.3 /
Enterprise Edition 4.2.3 or later.
If using LibVNCServer, upgrade to version 0.8.2 or later.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 7.1
Public Exploit Available : true
Nessus Plugin ID: 21564 ()
Bugtraq ID: 1797818977
CVE ID: CVE-2006-2369CVE-2006-2450
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.