A vulnerability in the remote connection complements of the NVDA (Nonvisual Desktop Access) 2024.4.1 and 2024.4.2 was identified, which allows an attacker to obtain total control of the remote system when guessing a weak password. The problem occurs because the complements accept any password typed by the user and do not have an additional authentication or checking mechanism by the computer that will be accessed. Tests indicate that over 1,000 systems use easy to guess passwords, many with less than 4 to 6 characters, including common sequences. This enables brute strength or attempt and error attacks on the part of malicious invaders. Vulnerability can be explored by a remote striker who knows or can guess the password used in the connection. As a result, the invader gets complete access to the affected system and can run commands, modify files and compromise user security.
Metrics
Affected Vendors & Products
References
History
Thu, 06 Mar 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-287 | |
Metrics |
cvssV3_1
|
Fri, 28 Feb 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability in the remote connection complements of the NVDA (Nonvisual Desktop Access) 2024.4.1 and 2024.4.2 was identified, which allows an attacker to obtain total control of the remote system when guessing a weak password. The problem occurs because the complements accept any password typed by the user and do not have an additional authentication or checking mechanism by the computer that will be accessed. Tests indicate that over 1,000 systems use easy to guess passwords, many with less than 4 to 6 characters, including common sequences. This enables brute strength or attempt and error attacks on the part of malicious invaders. Vulnerability can be explored by a remote striker who knows or can guess the password used in the connection. As a result, the invader gets complete access to the affected system and can run commands, modify files and compromise user security. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-02-28T00:00:00.000Z
Updated: 2025-03-06T20:39:33.328Z
Reserved: 2025-02-07T00:00:00.000Z
Link: CVE-2025-26326

Updated: 2025-03-06T20:39:25.960Z

Status : Awaiting Analysis
Published: 2025-02-28T15:15:13.743
Modified: 2025-03-06T21:15:15.780
Link: CVE-2025-26326

No data.