CVE-2026-44028: Nix/Lix Unbounded Recursion Leads to RCE as Root
The National Vulnerability Database (NVD) has detailed CVE-2026-44028, a critical vulnerability impacting Nix before version 2.34.7 and Lix before 2.95.2. This flaw stems from unbounded recursion within the NAR (Nix Archive) parser, which can trigger a stack-to-heap overflow. Crucially, the stack is allocated without a guard page, creating a direct path for memory corruption on the heap.
Attackers can leverage this to achieve arbitrary code execution as the Nix daemon, which commonly runs with root privileges in multi-user installations. This is a local privilege escalation scenario, exploitable by any user capable of connecting to the daemon, a setting often defaulting to all users in Nix environments. Bypassing ASLR hardening is a prerequisite for successful exploitation, but that’s a hurdle, not a blocker, for determined adversaries.
The NVD notes that Nix versions 2.24.4 through 2.34.6 are affected, with specific fixes available in 2.34.7, 2.33.6, 2.32.8, 2.31.5, 2.30.5, 2.29.4, and 2.28.7. For Lix, versions 2.93.0 through 2.95.1 are vulnerable, with fixes in 2.95.2, 2.94.2, and 2.93.4. The CVSSv3.1 score is a high 7.5, reflecting the significant impact on confidentiality and integrity, with a low attack complexity once local access is achieved.
What This Means For You
- If your organization uses Nix or Lix in multi-user configurations, this vulnerability is a direct path to root-level compromise for any local user. You need to immediately identify all instances running affected versions. Prioritize patching to the specified fixed versions to prevent local privilege escalation. This isn't theoretical; it's a critical architectural weakness that an attacker will exploit once they gain a foothold.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-44028: Nix/Lix Unbounded Recursion in NAR Parser
title: CVE-2026-44028: Nix/Lix Unbounded Recursion in NAR Parser
id: scw-2026-05-05-ai-1
status: experimental
level: critical
description: |
Detects the execution of Nix or Lix daemons with command-line arguments that suggest processing a NAR file, which is the vector for CVE-2026-44028. This vulnerability exploits unbounded recursion in the NAR parser, potentially leading to RCE as root.
author: SCW Feed Engine (AI-generated)
date: 2026-05-05
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-44028/
tags:
- attack.privilege_escalation
- attack.t1059.004
logsource:
category: process_creation
detection:
selection:
Image|endswith:
- 'nix-daemon'
- 'lix-daemon'
CommandLine|contains:
- '--nar'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-44028 | RCE | Nix before 2.34.7 (introduced in 2.24.4) |
| CVE-2026-44028 | RCE | Lix before 2.95.2 (introduced in 2.93.0) |
| CVE-2026-44028 | Privilege Escalation | Unbounded recursion in NAR (Nix Archive) parser leading to stack-to-heap overflow |
| CVE-2026-44028 | Memory Corruption | Stack overflow overwriting memory on the heap due to lack of guard page |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 05, 2026 at 04:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.