Permalink
CVE-2026-41477
7.8 HIGH
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
by @LeSuisse Activity log
- Created suggestion
- @LeSuisse dismissed
Deskflow: Local privilege escalation via unauthenticated IPC
Deskflow is a keyboard and mouse sharing app. In 1.20.0, 1.26.0.134, and earlier, Deskflow daemon runs as SYSTEM and exposes an IPC named pipe with WorldAccessOption enabled. The daemon processes privileged commands without authentication, allowing any local unprivileged user to execute arbitrary commands as SYSTEM. Affects both stable v1.20.0 + and Continuous v1.26.0.134 prerelease.
References
-
https://github.com/deskflow/deskflow/security/advisories/GHSA-6rx5-g478-775c x_refsource_CONFIRM
Affected products
deskflow
- ==<= 1.20.0
- ==<= 1.26.0.134
Package maintainers
-
@flacks Jean Lucas <jean@4ray.co>