First published: Mon Sep 12 2022(Updated: )
An issue was discovered in AnyDesk before 6.2.6 and 6.3.x before 6.3.3. An unnecessarily open listening port on a machine in the LAN of an attacker, opened by the Anydesk Windows client when using the tunneling feature, allows the attacker unauthorized access to the local machine's AnyDesk tunneling protocol stack (and also to any remote destination machine software that is listening to the AnyDesk tunneled port).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
AnyDesk AnyDesk | <6.2.6 | |
AnyDesk AnyDesk | >=6.3.0<6.3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-44425 is an issue discovered in AnyDesk before 6.2.6 and 6.3.x before 6.3.3, which allows unauthorized access to a local machine's AnyDesk tunneling.
CVE-2021-44425 affects AnyDesk versions before 6.2.6 and 6.3.x before 6.3.3 by exposing an unnecessarily open listening port on a machine, allowing unauthorized access to the local machine's AnyDesk tunneling.
CVE-2021-44425 has a severity level of medium, with a severity value of 6.5.
To fix CVE-2021-44425, update AnyDesk to version 6.2.6 or later, or version 6.3.3 or later for the 6.3.x series.
More information about CVE-2021-44425 can be found on the official AnyDesk website (https://anydesk.com/en/downloads/windows) or the Argus Security website (https://argus-sec.com/discovering-tunneling-service-security-flaws-in-anydesk-remote-application/).