Description
An issue was discovered in Emote Remote Mouse through 4.0.0.0. It uses cleartext HTTP to check, and request, updates. Thus, attackers can machine-in-the-middle a victim to download a malicious binary in place of the real update, with no SSL errors or warnings.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-14324 | An issue was discovered in Emote Remote Mouse through 4.0.0.0. It uses cleartext HTTP to check, and request, updates. Thus, attackers can machine-in-the-middle a victim to download a malicious binary in place of the real update, with no SSL errors or warnings. |
References
| Link | Providers |
|---|---|
| https://axelp.io/MouseTrap |
|
| https://remotemouse.net/blog/ |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T21:26:09.710Z
Reserved: 2021-02-23T00:00:00.000Z
Link: CVE-2021-27574
No data.
Status : Modified
Published: 2021-05-07T19:31:07.210
Modified: 2024-11-21T05:58:13.260
Link: CVE-2021-27574
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD