Hyland OnBase versions prior to 17.0.2.87 (other versions may be affected) are vulnerable to unauthenticated remote code execution via insecure deserialization on the .NET Remoting TCP channel. The service registers a listener on port 6031 with the URI endpoint TimerServer, implemented in Hyland.Core.Timers.dll. This endpoint deserializes untrusted input using the .NET BinaryFormatter, allowing attackers to execute arbitrary code under the context of NT AUTHORITY\SYSTEM.
Metrics
Affected Vendors & Products
References
History
Wed, 13 Aug 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 13 Aug 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Hyland OnBase versions prior to 17.0.2.87 (other versions may be affected) are vulnerable to unauthenticated remote code execution via insecure deserialization on the .NET Remoting TCP channel. The service registers a listener on port 6031 with the URI endpoint TimerServer, implemented in Hyland.Core.Timers.dll. This endpoint deserializes untrusted input using the .NET BinaryFormatter, allowing attackers to execute arbitrary code under the context of NT AUTHORITY\SYSTEM. | |
Title | Hyland OnBase .NET Remoting TCP Channel Unauthenticated RCE | |
Weaknesses | CWE-502 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-08-13T16:51:26.020Z
Updated: 2025-08-14T03:56:02.790Z
Reserved: 2025-04-15T19:15:22.565Z
Link: CVE-2025-34153

Updated: 2025-08-13T17:27:16.168Z

Status : Awaiting Analysis
Published: 2025-08-13T17:15:27.663
Modified: 2025-08-13T17:33:46.673
Link: CVE-2025-34153

No data.