Home

Description

Hyland OnBase versions prior to 17.0.2.87 (other versions may be affected) are vulnerable to unauthenticated remote code execution via insecure deserialization on the .NET Remoting TCP channel. The service registers a listener on port 6031 with the URI endpoint TimerServer, implemented in Hyland.Core.Timers.dll. This endpoint deserializes untrusted input using the .NET BinaryFormatter, allowing attackers to execute arbitrary code under the context of NT AUTHORITY\SYSTEM.

PUBLISHED Reserved 2025-04-15 | Published 2025-08-13 | Updated 2025-08-14 | Assigner VulnCheck




CRITICAL: 10.0CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Problem types

CWE-502 Deserialization of Untrusted Data

Product status

Default status
unaffected

* before 17.0.2.87
affected

24.1
unaffected

Credits

Victor Morales of GM Sectec finder

References

gist.github.com/VAMorales/32794cccc2195a935623a12ef32760dc technical-description exploit

www.hyland.com/en/internal/onbase-unity-client product

support.hyland.com/...ding-to-OnBase-Version-Foundation-24.1 patch

cve.org (CVE-2025-34153)

nvd.nist.gov (CVE-2025-34153)

Download JSON