Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-42049: n/a

0
Critical
VulnerabilityCVE-2024-42049cvecve-2024-42049
Published: Sun Jul 28 2024 (07/28/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

TightVNC (Server for Windows) before 2.8.84 allows attackers to connect to the control pipe via a network connection.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 05:54:27 UTC

Technical Analysis

CVE-2024-42049 is a critical security vulnerability affecting TightVNC Server for Windows versions prior to 2.8.84. The vulnerability arises because the server allows attackers to connect directly to the control pipe via a network connection without requiring authentication or user interaction. The control pipe is a communication channel used internally by the TightVNC server to manage remote desktop sessions and commands. By exploiting this flaw, an attacker can gain unauthorized access to the control interface, potentially allowing them to manipulate the remote desktop session, execute commands, or intercept sensitive information. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information) due to the unauthorized access it permits. The CVSS v3.1 base score is 9.1, reflecting a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality and integrity (C:H/I:H), but no impact on availability (A:N). No patches or fixes are currently linked, and no known exploits have been observed in the wild as of the publication date. This vulnerability poses a significant risk to any organization using vulnerable TightVNC Server versions, especially those exposing the service to untrusted networks.

Potential Impact

The impact of CVE-2024-42049 is severe for organizations worldwide that utilize TightVNC Server on Windows systems. Exploitation can lead to unauthorized remote access to control functions, compromising the confidentiality and integrity of data and systems. Attackers could potentially intercept or manipulate remote desktop sessions, execute arbitrary commands, or gain further footholds within the network. This could lead to data breaches, unauthorized data modification, and lateral movement within enterprise environments. Since the vulnerability requires no authentication or user interaction, it can be exploited remotely and stealthily, increasing the risk of widespread compromise. Critical infrastructure, government agencies, and enterprises relying on remote desktop solutions for administration or support are particularly vulnerable. The absence of known exploits currently provides a window for proactive mitigation, but the high CVSS score signals urgent attention is needed to prevent future attacks.

Mitigation Recommendations

To mitigate CVE-2024-42049, organizations should take the following specific actions: 1) Immediately upgrade TightVNC Server to version 2.8.84 or later once available, as this will contain the official fix. 2) Until patches are applied, restrict network access to TightVNC services by implementing firewall rules that limit connections to trusted IP addresses and internal networks only. 3) Employ network-level authentication mechanisms such as VPNs or SSH tunnels to protect remote desktop traffic from unauthorized access. 4) Disable TightVNC Server on systems where it is not essential to reduce the attack surface. 5) Monitor network traffic and system logs for unusual or unauthorized connections to the TightVNC control port. 6) Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect anomalous TightVNC activity. 7) Educate IT staff about the vulnerability and ensure rapid response procedures are in place for any suspicious activity. These targeted steps go beyond generic advice by focusing on access control, network segmentation, and active monitoring specific to TightVNC environments.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-07-28T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cc0b7ef31ef0b568c63

Added to database: 2/25/2026, 9:42:24 PM

Last enriched: 2/28/2026, 5:54:27 AM

Last updated: 4/12/2026, 5:07:41 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses