Unauthenticated Remote Code Execution in Steppschuh Remote Control Server
CVE-2022-4978
What is CVE-2022-4978?
The Steppschuh Remote Control Server version 3.1.1.12 is vulnerable to unauthenticated remote code execution due to a lack of verification for incoming commands. When authentication is disabled, which is its default setting, the server accepts keyboard input events over a custom UDP-based control protocol. This flaw enables attackers on the same network to send arbitrary keystroke commands, potentially allowing them to gain a system shell and execute malicious commands, resulting in a complete compromise of the affected system.
Affected Version(s)
Remote Control Collection Server 3.1.1.12
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved