Description
VideoLAN VLC for Android prior to version 3.7.0 contains an authentication bypass in the Remote Access Server feature due to missing or insufficient rate limiting on one-time password (OTP) verification. The Remote Access Server uses a 4-digit OTP and does not enforce effective throttling or lockout within the OTP validity window, allowing an attacker with network reachability to the server to repeatedly attempt OTP verification until a valid user_session cookie is issued. Successful exploitation results in unauthorized access to the Remote Access interface, limited to media files explicitly shared by the VLC for Android user.
Published: 2026-02-26
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Remote Access
Action: Patch Now
AI Analysis

Impact

VideoLAN VLC for Android versions before 3.7.0 have a flaw in the Remote Access Server that allows an attacker to bypass one‑time password authentication. The server accepts a 4‑digit OTP but does not enforce rate limiting or lockout, letting an attacker repeatedly try OTP values until a valid user_session cookie is issued. Successful exploitation grants the attacker unauthorized access to the Remote Access interface, exposing only those media files the VLC user has explicitly shared. This flaw is an authentication bypass (CWE‑307), leading to confidential data exposure and potential further attacks on the device.

Affected Systems

VideoLAN VLC for Android versions earlier than 3.7.0 are affected. The exact version range is all releases before 3.7.0, as the issue is documented only for those older builds.

Risk and Exploitability

The vulnerability carries a CVSS score of 6.3, indicating moderate to high severity. The EPSS score is below 1 %, implying that exploitation is considered unlikely at this time, and the issue is not listed in the CISA KEV catalog. However, because the attack vector relies on network reachability to the VLC Remote Access Server, any publicly exposed or poorly secured instance could be targeted. Once an OTP brute‑force succeeds, the attacker gains an authenticated session for all shared media without additional privileges.

Generated by OpenCVE AI on April 16, 2026 at 16:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade VLC for Android to version 3.7.0 or later to eliminate the authentication bypass flaw.
  • If an update is not immediately possible, disable the Remote Access Server feature within VLC to prevent external OTP attempts.
  • Restrict network access to the VLC Remote Access port using firewalls or network segmentation to limit the attack surface.

Generated by OpenCVE AI on April 16, 2026 at 16:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 05 Mar 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Videolan vlc
CPEs cpe:2.3:a:videolan:vlc:*:*:*:*:*:*:*:*
Vendors & Products Videolan vlc

Wed, 04 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Feb 2026 18:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 3.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Fri, 27 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Videolan
Videolan vlc For Android
Vendors & Products Videolan
Videolan vlc For Android

Thu, 26 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Description VideoLAN VLC for Android prior to version 3.7.0 contain an authentication bypass in the Remote Access Server feature due to missing or insufficient rate limiting on one-time password (OTP) verification. The Remote Access Server uses a 4-digit OTP and does not enforce effective throttling or lockout within the OTP validity window, allowing an attacker with network reachability to the server to repeatedly attempt OTP verification until a valid user_session cookie is issued. Successful exploitation results in unauthorized access to the Remote Access interface, limited to media files explicitly shared by the VLC for Android user. VideoLAN VLC for Android prior to version 3.7.0 contains an authentication bypass in the Remote Access Server feature due to missing or insufficient rate limiting on one-time password (OTP) verification. The Remote Access Server uses a 4-digit OTP and does not enforce effective throttling or lockout within the OTP validity window, allowing an attacker with network reachability to the server to repeatedly attempt OTP verification until a valid user_session cookie is issued. Successful exploitation results in unauthorized access to the Remote Access interface, limited to media files explicitly shared by the VLC for Android user.

Thu, 26 Feb 2026 18:00:00 +0000

Type Values Removed Values Added
Description VideoLAN VLC for Android prior to version 3.7.0 contain an authentication bypass in the Remote Access Server feature due to missing or insufficient rate limiting on one-time password (OTP) verification. The Remote Access Server uses a 4-digit OTP and does not enforce effective throttling or lockout within the OTP validity window, allowing an attacker with network reachability to the server to repeatedly attempt OTP verification until a valid user_session cookie is issued. Successful exploitation results in unauthorized access to the Remote Access interface, limited to media files explicitly shared by the VLC for Android user.
Title VLC for Android < 3.7.0 Remote Access OTP Authentication Bypass
Weaknesses CWE-307
References
Metrics cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Videolan Vlc Vlc For Android
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-05T01:31:01.159Z

Reserved: 2026-02-11T20:08:07.946Z

Link: CVE-2026-26227

cve-icon Vulnrichment

Updated: 2026-02-26T18:33:10.440Z

cve-icon NVD

Status : Deferred

Published: 2026-02-26T18:23:07.190

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-26227

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T16:15:08Z

Weaknesses