CRITICALCVE-2021-47891CVSS 9.8

Unified Remote 3.9.0.2463 - Exécution de Code à Distance

Plateforme

windows

Composant

unified-remote

Corrigé dans

3.9.1

AI Confidence: highNVDEPSS 0.2%Révisé: mai 2026
Traduction vers votre langue…

CVE-2021-47891 describes a critical Remote Code Execution (RCE) vulnerability discovered in Unified Remote, a Windows application for controlling computers remotely. This vulnerability allows attackers to execute arbitrary commands on a target system by sending specially crafted network packets. The vulnerability affects versions 3.9.0.2463 through 3.9.0.2463, and a patch is expected from the vendor.

Impact et Scénarios d'Attaquetraduction en cours…

The impact of CVE-2021-47891 is severe. An attacker exploiting this vulnerability can gain complete control over the affected system. This includes the ability to install malware, steal sensitive data, modify system configurations, and potentially pivot to other systems on the network. The attack vector involves sending crafted network packets to port 9512, which is used by Unified Remote for communication. Successful exploitation requires network access to the target machine and knowledge of the protocol. The ease of exploitation, coupled with the potential for complete system compromise, makes this a high-priority vulnerability.

Contexte d'Exploitationtraduction en cours…

CVE-2021-47891 was published on 2026-01-23. The vulnerability's ease of exploitation and the potential for complete system compromise suggest a medium to high probability of exploitation. Public proof-of-concept (PoC) code may emerge, further increasing the risk. Check CISA and NVD for updates on exploitation activity and vendor advisories.

Qui Est à Risquetraduction en cours…

Users of Unified Remote, particularly those with systems exposed to external networks or those running the vulnerable versions (3.9.0.2463–3.9.0.2463), are at significant risk. Shared hosting environments where Unified Remote is installed could also be vulnerable, potentially impacting multiple users.

Étapes de Détectiontraduction en cours…

• windows / supply-chain:

Get-Process -Name UnifiedRemote | Select-Object ProcessId, CommandLine

• windows / supply-chain:

Get-WinEvent -LogName Application -FilterXPath "EventID=1000 and ProviderName='Unified Remote'" -MaxEvents 10

• windows / supply-chain:

reg query "HKCU\Software\UnifiedRemote" /v Version

Chronologie de l'Attaque

  1. Disclosure

    disclosure

Renseignement sur les Menaces

Statut de l'Exploit

Preuve de ConceptInconnu
CISA KEVNO
Exposition InternetÉlevée

EPSS

0.24% (percentile 47%)

CISA SSVC

Exploitationpoc
Automatisableyes
Impact Techniquetotal

Vecteur CVSS

RENSEIGNEMENT SUR LES MENACES· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H9.8CRITICALAttack VectorNetworkComment l'attaquant atteint la cibleAttack ComplexityLowConditions requises pour exploiterPrivileges RequiredNoneNiveau d'authentification requisUser InteractionNoneSi une action de la victime est requiseScopeUnchangedImpact au-delà du composant affectéConfidentialityHighRisque d'exposition de données sensiblesIntegrityHighRisque de modification non autorisée de donnéesAvailabilityHighRisque d'interruption de servicenextguardhq.com · Score de base CVSS v3.1
Que signifient ces métriques?
Attack Vector
Réseau — exploitable à distance via internet. Aucun accès physique ou local requis.
Attack Complexity
Faible — aucune condition spéciale requise. Exploitable de manière fiable.
Privileges Required
Aucun — sans authentification. Aucune identifiant requis pour exploiter.
User Interaction
Aucune — attaque automatique et silencieuse. La victime ne fait rien.
Scope
Inchangé — impact limité au composant vulnérable.
Confidentiality
Élevé — perte totale de confidentialité. L'attaquant peut lire toutes les données.
Integrity
Élevé — l'attaquant peut écrire, modifier ou supprimer toutes les données.
Availability
Élevé — panne complète ou épuisement des ressources. Déni de service total.

Logiciel Affecté

Composantunified-remote
FournisseurUnified Intents AB
Plage affectéeCorrigé dans
3.9.0.2463 – 3.9.0.24633.9.1

Classification de Faiblesse (CWE)

Chronologie

  1. Réservé
  2. Publiée
  3. Modifiée
  4. EPSS mis à jour
Sans correctif — 121 jours depuis la divulgation

Mitigation et Contournementstraduction en cours…

The primary mitigation for CVE-2021-47891 is to upgrade to a patched version of Unified Remote as soon as it becomes available. Until a patch is released, consider isolating affected systems from external networks to prevent potential exploitation. Network segmentation can limit the blast radius if a system is compromised. Firewall rules can be implemented to block inbound traffic to port 9512, preventing external attackers from exploiting the vulnerability. Monitor network traffic for suspicious connections to port 9512. After upgrading, confirm the vulnerability is resolved by attempting to connect to the system with a known malicious packet (if available) and verifying that the connection is rejected.

Comment corriger

Mettez à jour vers une version corrigée de Unified Remote. La vulnérabilité permet l'exécution de code à distance via des paquets réseau malveillants envoyés au port 9512. Vérifiez la page de téléchargement officielle pour obtenir la dernière version sécurisée.

Newsletter Sécurité CVE

Analyses de vulnérabilités et alertes critiques directement dans votre boîte mail.

Questions fréquentestraduction en cours…

What is CVE-2021-47891 — RCE in Unified Remote?

CVE-2021-47891 is a critical Remote Code Execution vulnerability affecting Unified Remote versions 3.9.0.2463–3.9.0.2463, allowing attackers to execute commands via crafted network packets.

Am I affected by CVE-2021-47891 in Unified Remote?

You are affected if you are using Unified Remote versions 3.9.0.2463 through 3.9.0.2463. Check your installed version and upgrade as soon as a patch is available.

How do I fix CVE-2021-47891 in Unified Remote?

The recommended fix is to upgrade to a patched version of Unified Remote. Until a patch is released, isolate affected systems and block port 9512.

Is CVE-2021-47891 being actively exploited?

While active exploitation is not yet confirmed, the vulnerability's severity and ease of exploitation suggest a potential for exploitation. Monitor for updates from CISA and NVD.

Where can I find the official Unified Remote advisory for CVE-2021-47891?

Refer to the vendor's website and security advisories for the latest information and patch releases regarding CVE-2021-47891.

Ton projet est-il affecté ?

Téléverse ton fichier de dépendances et découvre instantanément si cette CVE et d'autres te touchent.