CVE-2026-23751

Kofax Capture, now referred to as Tungsten Capture, version 6.0.0.0 (other versions may be affected) exposes a deprecated .NET Remoting HTTP channel on port 2424 via the Ascent Capture Service that is accessible without authentication and uses a default, publicly known endpoint identifier. An unauthenticated remote attacker can exploit .NET Remoting object unmarshalling techniques to instantiate a remote System.Net.WebClient object and read arbitrary files from the server filesystem, write attacker-controlled files to the server, or coerce NTLMv2 authentication to an attacker-controlled host, enabling sensitive credential disclosure, denial of service, remote code execution, or lateral movement depending on service account privileges and network environment.
Configurations

No configuration.

History

23 Apr 2026, 16:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-23 16:16

Updated : 2026-04-24 14:50


NVD link : CVE-2026-23751

Mitre link : CVE-2026-23751

CVE.ORG link : CVE-2026-23751


JSON object : View

Products Affected

No product.

CWE
CWE-306

Missing Authentication for Critical Function

CWE-441

Unintended Proxy or Intermediary ('Confused Deputy')