NoMachine for Windows prior to version 6.15.1 and 7.5.2 suffer from local privilege escalation due to the lack of safe DLL loading. This vulnerability allows local non-privileged users to perform DLL Hijacking via any writable directory listed under the system path and ultimately execute code as NT AUTHORITY\SYSTEM.
References
Link | Resource |
---|---|
https://knowledgebase.nomachine.com/SU05S00223 | Release Notes Vendor Advisory |
https://knowledgebase.nomachine.com/SU05S00224 | Release Notes Vendor Advisory |
https://github.com/active-labs/Advisories/blob/master/2021/ACTIVE-2021-001.md | Third Party Advisory |
https://knowledgebase.nomachine.com/TR05S10236 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2022-04-28 04:15
Updated : 2022-05-06 19:15
NVD link : CVE-2021-33436
Mitre link : CVE-2021-33436
JSON object : View
CWE
Products Affected
nomachine
- nomachine
microsoft
- windows