INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Multiple sectors CRITICAL 24m Global vulnerability Information Technology / Software Infrastructure CRITICAL 26m Global data_breach Healthcare CRITICAL 41m Global data_breach Mobile Technology / Consumer Electronics HIGH 1h Global ransomware Cybersecurity Services / Multiple Sectors CRITICAL 1h Global apt Cryptocurrency and Blockchain CRITICAL 1h Global malware Financial Services, Mobile Payments HIGH 2h Global vulnerability Government and Critical Infrastructure CRITICAL 5h Global apt Cryptocurrency and Blockchain CRITICAL 13h Global malware Financial Services / Cryptocurrency CRITICAL 13h Global vulnerability Multiple sectors CRITICAL 24m Global vulnerability Information Technology / Software Infrastructure CRITICAL 26m Global data_breach Healthcare CRITICAL 41m Global data_breach Mobile Technology / Consumer Electronics HIGH 1h Global ransomware Cybersecurity Services / Multiple Sectors CRITICAL 1h Global apt Cryptocurrency and Blockchain CRITICAL 1h Global malware Financial Services, Mobile Payments HIGH 2h Global vulnerability Government and Critical Infrastructure CRITICAL 5h Global apt Cryptocurrency and Blockchain CRITICAL 13h Global malware Financial Services / Cryptocurrency CRITICAL 13h Global vulnerability Multiple sectors CRITICAL 24m Global vulnerability Information Technology / Software Infrastructure CRITICAL 26m Global data_breach Healthcare CRITICAL 41m Global data_breach Mobile Technology / Consumer Electronics HIGH 1h Global ransomware Cybersecurity Services / Multiple Sectors CRITICAL 1h Global apt Cryptocurrency and Blockchain CRITICAL 1h Global malware Financial Services, Mobile Payments HIGH 2h Global vulnerability Government and Critical Infrastructure CRITICAL 5h Global apt Cryptocurrency and Blockchain CRITICAL 13h Global malware Financial Services / Cryptocurrency CRITICAL 13h
Vulnerabilities

CVE-2026-39860

Critical
CWE-61 — Weakness Type
Published: Apr 8, 2026  ·  Modified: Apr 15, 2026  ·  Source: NVD
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Nix is a package manager for Linux and other Unix systems. A bug in the fix for CVE-2024-27297 allowed for arbitrary overwrites of files writable by the Nix process orchestrating the builds (typically the Nix daemon running as root in multi-user installations) by following symlinks during fixed-output derivation output registration. This affects sandboxed Linux builds - sandboxed macOS builds are unaffected. The location of the temporary output used for the output copy was located inside the build chroot. A symlink, pointing to an arbitrary location in the filesystem, could be created by the derivation builder at that path. During output registration, the Nix process (running in the host mount namespace) would follow that symlink and overwrite the destination with the derivation's output contents. In multi-user installations, this allows all users able to submit builds to the Nix daemon (allowed-users - defaulting to all users) to gain root privileges by modifying sensitive files. This vulnerability is fixed in 2.34.5, 2.33.4, 2.32.7, 2.31.4, 2.30.4, 2.29.3, and 2.28.6.

🤖 AI Executive Summary

CVE-2026-39860 is a critical vulnerability in Nix package manager affecting Linux systems where a symlink-following flaw allows arbitrary file overwrites by users submitting builds to the Nix daemon running as root. This vulnerability bypasses the previous fix for CVE-2024-27297 and impacts multi-user Nix installations on sandboxed Linux builds.

📄 Description (Arabic)

تؤثر هذه الثغرة على نظام إدارة الحزم Nix في بيئات Linux المحصورة حيث يمكن لمستخدمي البناء إنشاء روابط رمزية في مسارات مؤقتة. عندما يقوم عملية Nix (التي تعمل عادة كـ root) بتسجيل مخرجات البناء، فإنها تتابع هذه الروابط الرمزية وتكتب محتويات البناء إلى مواقع تعسفية في نظام الملفات.

🤖 ملخص تنفيذي (AI)

ثغرة حرجة في مدير حزم Nix على أنظمة Linux تسمح بالكتابة التعسفية للملفات من خلال متابعة الروابط الرمزية أثناء تسجيل مخرجات المشتقات ذات المخرجات الثابتة. يؤثر هذا على عمليات البناء المحصورة في Linux حيث يمكن لأي مستخدم يقدم عمليات بناء إلى خادم Nix تنفيذ هجمات الكتابة التعسفية.

🤖 AI Intelligence Analysis Analyzed: Apr 15, 2026 21:16
🇸🇦 Saudi Arabia Impact Assessment
Saudi Relevance: high
🏢 Affected Saudi Sectors
government telecom energy
⚖️ Saudi Risk Score (AI)
9.0
/ 10.0
🔧 Remediation Steps (English)
Update Nix to the patched version immediately. Restrict build submission permissions to trusted users only in multi-user installations. Implement strict access controls on the Nix daemon and monitor for suspicious build submissions. Disable sandboxed builds temporarily if patching is delayed and implement additional file system monitoring.
🔧 خطوات المعالجة (العربية)
قم بتحديث Nix إلى الإصدار المصحح فوراً. قيد صلاحيات تقديم البناء للمستخدمين الموثوقين فقط في التثبيتات متعددة المستخدمين. طبق عناصر تحكم وصول صارمة على خادم Nix ومراقبة تقديمات البناء المريبة. عطل عمليات البناء المحصورة مؤقتاً إذا تأخر التصحيح وطبق مراقبة نظام ملفات إضافية.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
A.7.1.1 A.7.1.2 A.9.1.1 A.12.4.1
🔵 SAMA CSF
ID.AM-2 PR.AC-1 PR.AC-4 DE.CM-1
🟡 ISO 27001:2022
A.5.1.1 A.6.1.1 A.9.1.1 A.12.4.1 A.14.2.1
📦 Affected Products / CPE 10 entries
nixos:nix
nixos:nix
nixos:nix
nixos:nix
nixos:nix
nixos:nix
nixos:nix
nixos:nix
nixos:nix
nixos:nix
📊 CVSS Score
9.0
/ 10.0 — Critical
📊 CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
Attack VectorL — Low / Local
Attack ComplexityL — Low / Local
Privileges RequiredN — None / Network
User InteractionN — None / Network
ScopeC — Changed
ConfidentialityH — High
IntegrityH — High
AvailabilityN — None / Network
📋 Quick Facts
Severity Critical
CVSS Score9.0
CWECWE-61
EPSS0.02%
Exploit No
Patch ✓ Yes
Published 2026-04-08
Source Feed nvd
🇸🇦 Saudi Risk Score
9.0
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
patch-available CWE-61
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.