Critical Access Control Vulnerability in tigervnc (CVE-2026-34352) Patched
Severity: High (Score: 72.0)
Sources: Linuxsecurity
Summary
A significant vulnerability (CVE-2026-34352) affecting tigervnc has been identified and patched across various SUSE Linux distributions. The flaw allows unauthorized users to observe screens and manipulate data sent to clients, posing a serious security risk. Affected systems include openSUSE Leap 15.4, Leap 15.5, and several versions of SUSE Linux Enterprise Server and High Performance Computing. The vulnerability was published on March 26, 2026, and has been assigned a CVSS score indicating a high severity level. Users are urged to apply the patches immediately using recommended installation methods like YaST or 'zypper patch'. The updates are crucial for maintaining screen privacy and preventing unauthorized access. Multiple articles have reported on this issue, emphasizing the need for prompt action by system administrators. Key Points: • CVE-2026-34352 allows unauthorized screen observation and data manipulation. • Patches are available for multiple SUSE Linux distributions, including openSUSE Leap 15.4 and 15.5. • Immediate patching is recommended to mitigate the risk of unauthorized access.
Key Entities
- CVE-2026-34352 (cve)
- OpenSUSE (company)
- OpenSUSE Leap 15.4 (platform)
- OpenSUSE Leap 15.5 (platform)
- SUSE Linux Enterprise High Performance Computing 12 SP5 (platform)
- SUSE Linux Enterprise High Performance Computing Espos (platform)
- SUSE Linux Enterprise High Performance Computing Espos 15 SP5 (platform)