CRITICALCVE-2021-47891CVSS 9.8

Unified Remote 3.9.0.2463 - Remote Code Execution

Platform

windows

Component

unified-remote

Opgelost in

3.9.1

AI Confidence: highNVDEPSS 0.2%Beoordeeld: mei 2026
Wordt vertaald naar uw taal…

CVE-2021-47891 describes a critical Remote Code Execution (RCE) vulnerability discovered in Unified Remote, a Windows application for controlling computers remotely. This vulnerability allows attackers to execute arbitrary commands on a target system by sending specially crafted network packets. The vulnerability affects versions 3.9.0.2463 through 3.9.0.2463, and a patch is expected from the vendor.

Impact en Aanvalsscenarioswordt vertaald…

The impact of CVE-2021-47891 is severe. An attacker exploiting this vulnerability can gain complete control over the affected system. This includes the ability to install malware, steal sensitive data, modify system configurations, and potentially pivot to other systems on the network. The attack vector involves sending crafted network packets to port 9512, which is used by Unified Remote for communication. Successful exploitation requires network access to the target machine and knowledge of the protocol. The ease of exploitation, coupled with the potential for complete system compromise, makes this a high-priority vulnerability.

Uitbuitingscontextwordt vertaald…

CVE-2021-47891 was published on 2026-01-23. The vulnerability's ease of exploitation and the potential for complete system compromise suggest a medium to high probability of exploitation. Public proof-of-concept (PoC) code may emerge, further increasing the risk. Check CISA and NVD for updates on exploitation activity and vendor advisories.

Wie Loopt Risicowordt vertaald…

Users of Unified Remote, particularly those with systems exposed to external networks or those running the vulnerable versions (3.9.0.2463–3.9.0.2463), are at significant risk. Shared hosting environments where Unified Remote is installed could also be vulnerable, potentially impacting multiple users.

Detectiestappenwordt vertaald…

• windows / supply-chain:

Get-Process -Name UnifiedRemote | Select-Object ProcessId, CommandLine

• windows / supply-chain:

Get-WinEvent -LogName Application -FilterXPath "EventID=1000 and ProviderName='Unified Remote'" -MaxEvents 10

• windows / supply-chain:

reg query "HKCU\Software\UnifiedRemote" /v Version

Aanvalstijdlijn

  1. Disclosure

    disclosure

Dreigingsinformatie

Exploit Status

Proof of ConceptOnbekend
CISA KEVNO
InternetblootstellingHoog

EPSS

0.24% (47% percentiel)

CISA SSVC

Exploitatiepoc
Automatiseerbaaryes
Technische Impacttotal

CVSS-vector

DREIGINGSINFORMATIE· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H9.8CRITICALAttack VectorNetworkHoe de aanvaller het doel bereiktAttack ComplexityLowVereiste omstandigheden om te exploiterenPrivileges RequiredNoneVereist authenticatieniveau voor aanvalUser InteractionNoneOf het slachtoffer actie moet ondernemenScopeUnchangedImpact buiten het getroffen onderdeelConfidentialityHighRisico op blootstelling van gevoelige dataIntegrityHighRisico op ongeautoriseerde gegevenswijzigingAvailabilityHighRisico op verstoring van dienstennextguardhq.com · CVSS v3.1 Basisscore
Wat betekenen deze metrics?
Attack Vector
Netwerk — op afstand uitbuitbaar via internet. Geen fysieke of lokale toegang vereist.
Attack Complexity
Laag — geen speciale voorwaarden vereist. Betrouwbaar uitbuitbaar.
Privileges Required
Geen — geen authenticatie vereist om te exploiteren.
User Interaction
Geen — automatische en stille aanval. Slachtoffer doet niets.
Scope
Ongewijzigd — impact beperkt tot het kwetsbare component.
Confidentiality
Hoog — volledig verlies van vertrouwelijkheid. Aanvaller kan alle gegevens lezen.
Integrity
Hoog — aanvaller kan alle gegevens schrijven, aanpassen of verwijderen.
Availability
Hoog — volledige crash of uitputting van resources. Totale denial of service.

Getroffen Software

Componentunified-remote
LeverancierUnified Intents AB
Getroffen bereikOpgelost in
3.9.0.2463 – 3.9.0.24633.9.1

Zwakheidsclassificatie (CWE)

Tijdlijn

  1. Gereserveerd
  2. Gepubliceerd
  3. Gewijzigd
  4. EPSS bijgewerkt
Geen patch — 121 dagen na openbaarmaking

Mitigatie en Workaroundswordt vertaald…

The primary mitigation for CVE-2021-47891 is to upgrade to a patched version of Unified Remote as soon as it becomes available. Until a patch is released, consider isolating affected systems from external networks to prevent potential exploitation. Network segmentation can limit the blast radius if a system is compromised. Firewall rules can be implemented to block inbound traffic to port 9512, preventing external attackers from exploiting the vulnerability. Monitor network traffic for suspicious connections to port 9512. After upgrading, confirm the vulnerability is resolved by attempting to connect to the system with a known malicious packet (if available) and verifying that the connection is rejected.

Hoe te verhelpen

Werk bij naar een gecorrigeerde versie van Unified Remote. De kwetsbaarheid maakt remote code execution mogelijk via kwaadaardige netwerkpakketten die naar poort 9512 worden verzonden. Controleer de officiële downloadpagina voor de laatste veilige versie.

CVE Beveiligingsnieuwsbrief

Kwetsbaarheidsanalyses en kritieke waarschuwingen direct in uw inbox.

Veelgestelde vragenwordt vertaald…

What is CVE-2021-47891 — RCE in Unified Remote?

CVE-2021-47891 is a critical Remote Code Execution vulnerability affecting Unified Remote versions 3.9.0.2463–3.9.0.2463, allowing attackers to execute commands via crafted network packets.

Am I affected by CVE-2021-47891 in Unified Remote?

You are affected if you are using Unified Remote versions 3.9.0.2463 through 3.9.0.2463. Check your installed version and upgrade as soon as a patch is available.

How do I fix CVE-2021-47891 in Unified Remote?

The recommended fix is to upgrade to a patched version of Unified Remote. Until a patch is released, isolate affected systems and block port 9512.

Is CVE-2021-47891 being actively exploited?

While active exploitation is not yet confirmed, the vulnerability's severity and ease of exploitation suggest a potential for exploitation. Monitor for updates from CISA and NVD.

Where can I find the official Unified Remote advisory for CVE-2021-47891?

Refer to the vendor's website and security advisories for the latest information and patch releases regarding CVE-2021-47891.

Is jouw project getroffen?

Upload je dependency-bestand en kom direct te weten of deze en andere CVEs jou raken.