Vulnerability Details : CVE-2021-27572
An issue was discovered in Emote Remote Mouse through 4.0.0.0. Authentication Bypass can occur via Packet Replay. Remote unauthenticated users can execute arbitrary code via crafted UDP packets even when passwords are set.
Vulnerability category: Execute code
Products affected by CVE-2021-27572
- cpe:2.3:a:remotemouse:emote_remote_mouse:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-27572
1.23%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 85 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-27572
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST | |
8.1
|
HIGH | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
2.2
|
5.9
|
NIST |
CWE ids for CVE-2021-27572
-
A capture-replay flaw exists when the design of the product makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes).Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-27572
-
https://remotemouse.net/blog/
Remote Mouse – News & Tips – Turn your mobile phone or tablet into a set of wireless mouse, keyboard and trackpad.Product
-
https://axelp.io/MouseTrap
Mouse Trap | Axel Persinger’s BlogExploit;Third Party Advisory
Jump to