nomachine CVE Vulnerabilities & Metrics

Focus on nomachine vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About nomachine Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with nomachine. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total nomachine CVEs: 10
Earliest CVE date: 04 Oct 2011, 10:55 UTC
Latest CVE date: 22 Nov 2024, 22:15 UTC

Latest CVE reference: CVE-2024-7253

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 1

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical nomachine CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 5.0

Max CVSS: 9.0

Critical CVEs (≥9): 1

CVSS Range vs. Count

Range Count
0.0-3.9 3
4.0-6.9 5
7.0-8.9 3
9.0-10.0 1

CVSS Distribution Chart

Top 5 Highest CVSS nomachine CVEs

These are the five CVEs with the highest CVSS scores for nomachine, sorted by severity first and recency.

All CVEs for nomachine

CVE-2024-7253 nomachine vulnerability CVSS: 0 22 Nov 2024, 22:15 UTC

NoMachine Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of NoMachine. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within nxnode.exe. The process loads a library from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. . Was ZDI-CAN-24039.

CVE-2023-39107 nomachine vulnerability CVSS: 0 04 Aug 2023, 18:15 UTC

An arbitrary file overwrite vulnerability in NoMachine Free Edition and Enterprise Client for macOS before v8.8.1 allows attackers to overwrite root-owned files by using hardlinks.

CVE-2022-48074 nomachine vulnerability CVSS: 0 03 Feb 2023, 06:15 UTC

An issue in NoMachine before v8.2.3 allows attackers to execute arbitrary commands via a crafted .nxs file.

CVE-2022-34043 nomachine vulnerability CVSS: 4.4 29 Jun 2022, 13:15 UTC

Incorrect permissions for the folder C:\ProgramData\NoMachine\var\uninstall of Nomachine v7.9.2 allows attackers to perform a DLL hijacking attack and execute arbitrary code.

CVE-2021-33436 nomachine vulnerability CVSS: 6.2 28 Apr 2022, 11:15 UTC

NoMachine for Windows prior to version 6.15.1 and 7.5.2 suffer from local privilege escalation due to the lack of safe DLL loading. This vulnerability allows local non-privileged users to perform DLL Hijacking via any writable directory listed under the system path and ultimately execute code as NT AUTHORITY\SYSTEM.

CVE-2018-20029 nomachine vulnerability CVSS: 4.9 10 Dec 2018, 20:29 UTC

The nxfs.sys driver in the DokanFS library 0.6.0 in NoMachine before 6.4.6 on Windows 10 allows local users to cause a denial of service (BSOD) because uninitialized memory can be read.

CVE-2018-17980 nomachine vulnerability CVSS: 6.8 15 Oct 2018, 19:29 UTC

NoMachine before 5.3.27 and 6.x before 6.3.6 allows attackers to gain privileges via a Trojan horse wintab32.dll file located in the same directory as a .nxs file, as demonstrated by a scenario where the .nxs file and the DLL are in the current working directory, and the Trojan horse code is executed. (The directory could, in general, be on a local filesystem or a network share.).

CVE-2018-0664 nomachine vulnerability CVSS: 7.5 04 Sep 2018, 13:29 UTC

A vulnerability in NoMachine App for Android 5.0.63 and earlier allows attackers to alter environment variables via unspecified vectors.

CVE-2018-6947 nomachine vulnerability CVSS: 7.2 28 Feb 2018, 22:29 UTC

An uninitialised stack variable in the nxfuse component that is part of the Open Source DokanFS library shipped with NoMachine 6.0.66_2 and earlier allows a local low privileged user to gain elevation of privileges on Windows 7 (32 and 64bit), and denial of service for Windows 8 and 10.

CVE-2017-12763 nomachine vulnerability CVSS: 9.0 29 Aug 2017, 15:29 UTC

An unspecified server utility in NoMachine before 5.3.10 on Mac OS X and Linux allows authenticated users to gain privileges by gaining access to local files.

CVE-2012-5003 nomachine vulnerability CVSS: 6.8 19 Sep 2012, 21:55 UTC

nxapplet.jar in No Machine NX Web Companion 3.x and earlier does not properly verify the authenticity of updates, which allows user-assisted remote attackers to execute arbitrary code via a crafted (1) SiteUrl or (2) RedirectUrl parameter that points to a Trojan Horse client.zip update file.

CVE-2011-3977 nomachine vulnerability CVSS: 7.2 04 Oct 2011, 10:55 UTC

Unspecified vulnerability in nxconfigure.sh in NoMachine NX Node 3.x before 3.5.0-4 and NX Server 3.x before 3.5.0-5 allows local users to read arbitrary files via unknown vectors.