Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
7.8

NoMachine Privilege Escalation Risk: Executable Code as Admin

CVE-2026-5055
Summary

NoMachine software may allow a local attacker to gain administrator access, potentially taking control of the system. This is a concern for businesses that use NoMachine for remote access and collaboration. Ensure that all users run NoMachine with the lowest necessary permissions and consider upgrading to the latest version to address this vulnerability.

Original title
NoMachine Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of NoMachine. An att...
Original description
NoMachine Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of NoMachine. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

The specific flaw exists within the NoMachine Device Server. The product loads a library from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-28494.
nvd CVSS3.0 7.8
Vulnerability type
CWE-427 Uncontrolled Search Path Element
Published: 11 Apr 2026 · Updated: 11 Apr 2026 · First seen: 11 Apr 2026