An issue was discovered in Emote Remote Mouse through 4.0.0.0. Authentication Bypass can occur via Packet Replay. Remote unauthenticated users can execute arbitrary code via crafted UDP packets even when passwords are set.
References
Link | Resource |
---|---|
https://axelp.io/MouseTrap | Exploit Third Party Advisory |
https://remotemouse.net/blog/ | Product |
Configurations
History
17 May 2021, 17:38
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 8.1 |
CPE | cpe:2.3:a:remotemouse:emote_remote_mouse:*:*:*:*:*:*:*:* | |
CWE | CWE-294 | |
References | (MISC) https://axelp.io/MouseTrap - Exploit, Third Party Advisory | |
References | (MISC) https://remotemouse.net/blog/ - Product |
07 May 2021, 19:31
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-05-07 19:31
Updated : 2023-12-10 13:55
NVD link : CVE-2021-27572
Mitre link : CVE-2021-27572
CVE.ORG link : CVE-2021-27572
JSON object : View
Products Affected
remotemouse
- emote_remote_mouse
CWE
CWE-294
Authentication Bypass by Capture-replay