CVE-2021-44425

An issue was discovered in AnyDesk before 6.2.6 and 6.3.x before 6.3.3. An unnecessarily open listening port on a machine in the LAN of an attacker, opened by the Anydesk Windows client when using the tunneling feature, allows the attacker unauthorized access to the local machine's AnyDesk tunneling protocol stack (and also to any remote destination machine software that is listening to the AnyDesk tunneled port).
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:anydesk:anydesk:*:*:*:*:*:windows:*:*
cpe:2.3:a:anydesk:anydesk:*:*:*:*:*:windows:*:*

History

16 Sep 2022, 15:01

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
References (MISC) https://anydesk.com/en/downloads/windows - (MISC) https://anydesk.com/en/downloads/windows - Product, Vendor Advisory
References (MISC) https://argus-sec.com/discovering-tunneling-service-security-flaws-in-anydesk-remote-application/ - (MISC) https://argus-sec.com/discovering-tunneling-service-security-flaws-in-anydesk-remote-application/ - Exploit, Third Party Advisory
CPE cpe:2.3:a:anydesk:anydesk:*:*:*:*:*:windows:*:*
First Time Anydesk
Anydesk anydesk
CWE NVD-CWE-noinfo

12 Sep 2022, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-09-12 21:15

Updated : 2023-12-10 14:35


NVD link : CVE-2021-44425

Mitre link : CVE-2021-44425

CVE.ORG link : CVE-2021-44425


JSON object : View

Products Affected

anydesk

  • anydesk