
Cloud Vulnerability DB
A community-led vulnerabilities database
NoMachine contains an uncontrolled search path element vulnerability (CVE-2025-8614) that allows local privilege escalation. The vulnerability was discovered on April 25, 2025, and publicly disclosed on August 13, 2025. This security flaw affects NoMachine installations across multiple versions including versions up to 8.17.2 and versions from 9.0 up to 9.1.24 (Zero Day Initiative, NVD).
The vulnerability exists within the configuration of OpenSSL in NoMachine. Specifically, the product loads an OpenSSL configuration file from an unsecured location, creating a security weakness classified as CWE-427 (Uncontrolled Search Path Element). The vulnerability has been assigned a CVSS v3.0 score of 7.8 (High) with the following vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (Zero Day Initiative).
When successfully exploited, this vulnerability enables attackers to escalate privileges and execute arbitrary code in the context of the service account. The attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability (NVD).
NoMachine has released an update to address this vulnerability. Users are advised to upgrade to the patched version as detailed in the vendor's knowledge base article (NoMachine KB).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."