CVE-2024-42049

9.1 CRITICAL

📋 TL;DR

TightVNC Server for Windows before version 2.8.84 exposes its control pipe to network connections, allowing attackers to potentially execute unauthorized commands or access sensitive information. This affects all Windows systems running vulnerable TightVNC Server versions with default configurations.

💻 Affected Systems

Products:
  • TightVNC Server for Windows
Versions: All versions before 2.8.84
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the server component; TightVNC clients are not vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Unauthorized access to VNC sessions, credential harvesting, or lateral movement within the network.

🟢

If Mitigated

Limited impact if network segmentation and access controls prevent external access to the control pipe.

🌐 Internet-Facing: HIGH - Directly exposed control pipe allows remote attackers to exploit without authentication.
🏢 Internal Only: HIGH - Even internally, the vulnerability allows unauthorized access to the control pipe.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows network connections to the control pipe, which typically requires only local access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.8.84

Vendor Advisory: https://www.tightvnc.com/whatsnew.php

Restart Required: Yes

Instructions:

1. Download TightVNC 2.8.84 or later from the official website. 2. Uninstall the current version. 3. Install the updated version. 4. Restart the system or TightVNC service.

🔧 Temporary Workarounds

Network Segmentation

windows

Restrict network access to TightVNC control pipe using firewall rules.

netsh advfirewall firewall add rule name="Block TightVNC Control Pipe" dir=in action=block protocol=TCP localport=5900-5905,5800-5805

Disable TightVNC Service

windows

Temporarily disable TightVNC Server if not required.

sc stop "TightVNC Server"
sc config "TightVNC Server" start= disabled

🧯 If You Can't Patch

  • Implement strict network access controls to block all external and unnecessary internal access to TightVNC ports.
  • Use application allowlisting to prevent unauthorized execution of TightVNC components.

🔍 How to Verify

Check if Vulnerable:

Check TightVNC Server version in About dialog or via registry: HKEY_LOCAL_MACHINE\SOFTWARE\TightVNC\Server\Version

Check Version:

reg query "HKLM\SOFTWARE\TightVNC\Server" /v Version

Verify Fix Applied:

Confirm version is 2.8.84 or higher and verify control pipe is not accessible from network.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected network connections to TightVNC control pipe
  • Failed authentication attempts to TightVNC

Network Indicators:

  • Network traffic on TightVNC ports (5900-5905, 5800-5805) from unauthorized sources

SIEM Query:

source="TightVNC" AND (event="Connection" OR event="Authentication") AND dest_port IN (5900, 5901, 5902, 5903, 5904, 5905, 5800, 5801, 5802, 5803, 5804, 5805)

🔗 References

📤 Share & Export