Deskflow CVE-2026-41477

| EUVD-2026-25623 HIGH
Missing Authentication for Critical Function (CWE-306)
2026-04-24 GitHub_M
7.8
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

2
Re-analysis Queued
Apr 27, 2026 - 14:22 vuln.today
cvss_changed
Analysis Generated
Apr 24, 2026 - 20:31 vuln.today

DescriptionNVD

Deskflow is a keyboard and mouse sharing app. In 1.20.0, 1.26.0.134, and earlier, Deskflow daemon runs as SYSTEM and exposes an IPC named pipe with WorldAccessOption enabled. The daemon processes privileged commands without authentication, allowing any local unprivileged user to execute arbitrary commands as SYSTEM. Affects both stable v1.20.0 + and Continuous v1.26.0.134 prerelease.

AnalysisAI

Local privilege escalation in Deskflow (all versions up to 1.20.0 stable and 1.26.0.134 continuous) allows any low-privilege Windows user to execute arbitrary commands as SYSTEM by accessing an unauthenticated IPC named pipe. The daemon runs with SYSTEM privileges and processes commands without validating caller identity due to WorldAccessOption configuration. …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

Within 24 hours: Identify all Windows systems running Deskflow versions ≤1.20.0 stable or ≤1.26.0.134 continuous via asset inventory and disable Deskflow services until patching is possible. Within 7 days: Monitor vendor advisory channels (Deskflow GitHub releases and security advisories) for patch availability; test patch in isolated environment immediately upon release. …

Sign in for detailed remediation steps.

Vendor StatusVendor

Share

CVE-2026-41477 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy