{"uuid": "72f06fca-9243-4fa7-8d20-6cd2c6fe7b9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26326", "type": "seen", "source": "https://t.me/cvedetector/19156", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26326 - NVDA Remote Password Guessing Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-26326 \nPublished : Feb. 28, 2025, 3:15 p.m. | 1\u00a0hour, 5\u00a0minutes ago \nDescription : A vulnerability in the remote connection complements of the NVDA (Nonvisual Desktop Access) 2024.4.1 and 2024.4.2 was identified, which allows an attacker to obtain total control of the remote system when guessing a weak password. The problem occurs because the complements accept any password typed by the user and do not have an additional authentication or checking mechanism by the computer that will be accessed. Tests indicate that over 1,000 systems use easy to guess passwords, many with less than 4 to 6 characters, including common sequences. This enables brute strength or attempt and error attacks on the part of malicious invaders. Vulnerability can be explored by a remote striker who knows or can guess the password used in the connection. As a result, the invader gets complete access to the affected system and can run commands, modify files and compromise user security. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-28T17:51:53.000000Z"}