Impact
The vulnerability lies in an unknown function within cryptbase.dll exposed by the UltraVNC Windows Service. The flaw permits an attacker with local access to manipulate the DLL search path, potentially causing the service to load a malicious DLL and execute arbitrary code. This weakness corresponds to CWE‑426 and CWE‑427, illustrating an untrusted or uncontrolled search path that can lead to DLL hijacking. The description indicates that the attack requires high complexity and is considered difficult to exploit, which limits immediate threat but still permits a serious compromise if achieved.
Affected Systems
This problem affects UltraVNC 1.6.4.0 running on Windows platforms. The vulnerable component is part of the UltraVNC service bundle; users with Windows operating systems that host this specific version of UltraVNC are susceptible.
Risk and Exploitability
The CVSS score of 7.3 marks it as high severity. However, the EPSS score is less than 1%, indicating a low probability of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. The limited attacker capability (local access only) and the stated difficulty in exploitation suggest that while the risk to organizational security is significant, active attacks are currently few.
OpenCVE Enrichment