Vulnerability Details : CVE-2020-13160
Public exploit exists!
AnyDesk before 5.5.3 on Linux and FreeBSD has a format string vulnerability that can be exploited for remote code execution.
Vulnerability category: OverflowExecute code
Products affected by CVE-2020-13160
- cpe:2.3:a:anydesk:anydesk:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-13160
95.51%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2020-13160
-
AnyDesk GUI Format String Write
Disclosure Date: 2020-06-16First seen: 2020-07-01exploit/linux/misc/cve_2020_13160_anydeskThe AnyDesk GUI is vulnerable to a remotely exploitable format string vulnerability. By sending a specially crafted discovery packet, an attacker can corrupt the frontend process when it loads or refreshes. While the discovery service is always running, the GUI fronten
CVSS scores for CVE-2020-13160
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2020-13160
-
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-13160
-
http://packetstormsecurity.com/files/161628/AnyDesk-5.5.2-Remote-Code-Execution.html
AnyDesk 5.5.2 Remote Code Execution ≈ Packet StormExploit;Third Party Advisory;VDB Entry
-
https://download.anydesk.com/changelog.txt
Release Notes;Vendor Advisory
-
http://packetstormsecurity.com/files/158291/AnyDesk-GUI-Format-String-Write.html
AnyDesk GUI Format String Write ≈ Packet StormExploit;Third Party Advisory;VDB Entry
-
https://devel0pment.de/?p=1881
AnyDesk UDP Discovery Remote Code Execution (CVE-2020-13160) – devel0pment.deExploit;Third Party Advisory
Jump to