Our experts looked at four common open-source VNC implementations: The actual figure is likely to be far higher. It is difficult to put a precise figure on the number of devices that use VNC systems, but judging by data from the Shodan search engine, more than 600,000 VNC servers can be accessed online. These implementations were found to contain a total of 37 vulnerabilities, some of which had gone unnoticed since 1999. VNC is a common remote access system widely employed for technical support, equipment monitoring, distance learning, and other purposes. Our ICS CERT studied several VNC (Virtual Network Computing) implementations. The downside is that it can provide an entry point into your corporate infrastructure for intruders, especially if the remote access tools you use are vulnerable. Remote access is convenient and at times indispensable.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |