CVE-2021-33436

NoMachine for Windows prior to version 6.15.1 and 7.5.2 suffer from local privilege escalation due to the lack of safe DLL loading. This vulnerability allows local non-privileged users to perform DLL Hijacking via any writable directory listed under the system path and ultimately execute code as NT AUTHORITY\SYSTEM.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:nomachine:nomachine:*:*:*:*:*:*:*:*
cpe:2.3:a:nomachine:nomachine:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Nov 2024, 06:08

Type Values Removed Values Added
References () https://github.com/active-labs/Advisories/blob/master/2021/ACTIVE-2021-001.md - Third Party Advisory () https://github.com/active-labs/Advisories/blob/master/2021/ACTIVE-2021-001.md - Third Party Advisory
References () https://knowledgebase.nomachine.com/SU05S00223 - Release Notes, Vendor Advisory () https://knowledgebase.nomachine.com/SU05S00223 - Release Notes, Vendor Advisory
References () https://knowledgebase.nomachine.com/SU05S00224 - Release Notes, Vendor Advisory () https://knowledgebase.nomachine.com/SU05S00224 - Release Notes, Vendor Advisory
References () https://knowledgebase.nomachine.com/TR05S10236 - Vendor Advisory () https://knowledgebase.nomachine.com/TR05S10236 - Vendor Advisory

Information

Published : 2022-04-28 11:15

Updated : 2024-11-21 06:08


NVD link : CVE-2021-33436

Mitre link : CVE-2021-33436

CVE.ORG link : CVE-2021-33436


JSON object : View

Products Affected

nomachine

  • nomachine

microsoft

  • windows