CVE-2023-47250
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
22/11/2023
Last modified:
30/11/2023
Description
In mprivacy-tools before 2.0.406g in m-privacy TightGate-Pro Server, broken Access Control on X11 server sockets allows authenticated attackers (with access to a VNC session) to access the X11 desktops of other users by specifying their DISPLAY ID. This allows complete control of their desktop, including the ability to inject keystrokes and perform a keylogging attack.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:m-privacy:mprivacy-tools:*:*:*:*:*:*:*:* | 4.0.406g (excluding) | |
| cpe:2.3:a:m-privacy:rsbac-policy-tgpro:*:*:*:*:*:*:*:* | 2.0.159 (excluding) | |
| cpe:2.3:a:m-privacy:tightgatevnc:*:*:*:*:*:*:*:* | 4.1.2-1 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/175949/m-privacy-TightGate-Pro-Code-Execution-Insecure-Permissions.html
- http://seclists.org/fulldisclosure/2023/Nov/13
- https://sec-consult.com/en/vulnerability-lab/advisories/index.html
- https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-m-privacy-tightgate-pro/
- https://www.m-privacy.de/en/tightgate-pro-safe-surfing/



