CVE-2021-41380
RealVNC Viewer vulnerability analysis and mitigation

Overview

RealVNC Viewer 6.21.406 contains a denial of service vulnerability that allows remote VNC servers to cause an application crash via crafted RFB protocol data. The vulnerability was discovered and disclosed in September 2021. This issue has been disputed as it requires social engineering to trick a user into connecting to a malicious VNC server (MITRE).

Technical details

When a user connects to a malicious VNC server, specially crafted RFB (Remote Framebuffer) protocol data can cause the VNC Viewer application to hang until terminated. The application will remain in a hung state but no memory leak occurs - the resources are freed once the hung process is terminated and resource usage remains constant during the hang. Only the specific process connected to the malicious server is affected (NVD).

Impact

The impact is limited to a denial of service condition affecting only the specific VNC Viewer process connected to the malicious server. When exploited, it causes the application to hang and become unresponsive, requiring manual termination of the process. No permanent system damage or memory leaks occur (NVD).

Mitigation and workarounds

Since this is considered an application bug rather than a security vulnerability, no official patches have been released. Users should be cautious when connecting to untrusted VNC servers. If the application becomes unresponsive, the affected process can be terminated manually without any lasting impact (NVD).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management