CVE-2018-16550

TeamViewer 10.x through 13.x allows remote attackers to bypass the brute-force authentication protection mechanism by skipping the "Cancel" step, which makes it easier to determine the correct value of the default 4-digit PIN.
References
Link Resource
https://twitter.com/vah_13/status/1036894081350291457 Issue Tracking Third Party Advisory
https://twitter.com/vah_13/status/1036894081350291457 Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:teamviewer:teamviewer:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:52

Type Values Removed Values Added
References () https://twitter.com/vah_13/status/1036894081350291457 - Issue Tracking, Third Party Advisory () https://twitter.com/vah_13/status/1036894081350291457 - Issue Tracking, Third Party Advisory

Information

Published : 2018-09-05 22:29

Updated : 2024-11-21 03:52


NVD link : CVE-2018-16550

Mitre link : CVE-2018-16550

CVE.ORG link : CVE-2018-16550


JSON object : View

Products Affected

teamviewer

  • teamviewer