CVE-2024-42049
📋 TL;DR
TightVNC Server for Windows before version 2.8.84 exposes its control pipe to network connections, allowing attackers to potentially execute unauthorized commands or access sensitive information. This affects all Windows systems running vulnerable TightVNC Server versions with default configurations.
💻 Affected Systems
- TightVNC Server for Windows
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete system compromise, data theft, or ransomware deployment.
Likely Case
Unauthorized access to VNC sessions, credential harvesting, or lateral movement within the network.
If Mitigated
Limited impact if network segmentation and access controls prevent external access to the control pipe.
🎯 Exploit Status
The vulnerability allows network connections to the control pipe, which typically requires only local access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.8.84
Vendor Advisory: https://www.tightvnc.com/whatsnew.php
Restart Required: Yes
Instructions:
1. Download TightVNC 2.8.84 or later from the official website. 2. Uninstall the current version. 3. Install the updated version. 4. Restart the system or TightVNC service.
🔧 Temporary Workarounds
Network Segmentation
windowsRestrict network access to TightVNC control pipe using firewall rules.
netsh advfirewall firewall add rule name="Block TightVNC Control Pipe" dir=in action=block protocol=TCP localport=5900-5905,5800-5805
Disable TightVNC Service
windowsTemporarily disable TightVNC Server if not required.
sc stop "TightVNC Server"
sc config "TightVNC Server" start= disabled
🧯 If You Can't Patch
- Implement strict network access controls to block all external and unnecessary internal access to TightVNC ports.
- Use application allowlisting to prevent unauthorized execution of TightVNC components.
🔍 How to Verify
Check if Vulnerable:
Check TightVNC Server version in About dialog or via registry: HKEY_LOCAL_MACHINE\SOFTWARE\TightVNC\Server\Version
Check Version:
reg query "HKLM\SOFTWARE\TightVNC\Server" /v Version
Verify Fix Applied:
Confirm version is 2.8.84 or higher and verify control pipe is not accessible from network.
📡 Detection & Monitoring
Log Indicators:
- Unexpected network connections to TightVNC control pipe
- Failed authentication attempts to TightVNC
Network Indicators:
- Network traffic on TightVNC ports (5900-5905, 5800-5805) from unauthorized sources
SIEM Query:
source="TightVNC" AND (event="Connection" OR event="Authentication") AND dest_port IN (5900, 5901, 5902, 5903, 5904, 5905, 5800, 5801, 5802, 5803, 5804, 5805)