CVE-2025-34153: CWE-502 Deserialization of Untrusted Data in Hyland Software OnBase
Hyland OnBase versions prior to 17.0.2.87 (other versions may be affected) are vulnerable to unauthenticated remote code execution via insecure deserialization on the .NET Remoting TCP channel. The service registers a listener on port 6031 with the URI endpoint TimerServer, implemented in Hyland.Core.Timers.dll. This endpoint deserializes untrusted input using the .NET BinaryFormatter, allowing attackers to execute arbitrary code under the context of NT AUTHORITY\SYSTEM.
AI Analysis
Technical Summary
CVE-2025-34153 is a critical vulnerability affecting Hyland Software's OnBase product, specifically versions prior to 17.0.2.87, though other versions may also be impacted. The vulnerability arises from insecure deserialization of untrusted data within the .NET Remoting TCP channel. OnBase registers a listener on port 6031 with the URI endpoint 'TimerServer', implemented in the Hyland.Core.Timers.dll assembly. This endpoint uses the .NET BinaryFormatter to deserialize incoming data without proper validation or sanitization. BinaryFormatter is known to be unsafe for deserializing untrusted input because it can instantiate arbitrary objects and invoke their methods during deserialization. An attacker can exploit this by sending specially crafted serialized payloads to the TimerServer endpoint, leading to remote code execution (RCE) under the NT AUTHORITY\SYSTEM context, which is the highest privilege level on Windows systems. This vulnerability requires no authentication or user interaction, making it highly exploitable remotely. The CVSS 4.0 score is 10.0 (critical), reflecting the vulnerability's ease of exploitation, lack of required privileges, and the severe impact on confidentiality, integrity, and availability. The vulnerability is classified under CWE-502 (Deserialization of Untrusted Data), a common and dangerous software weakness. No known exploits are currently reported in the wild, but the criticality and straightforward exploitation vector make it a prime target for attackers once publicized. The lack of available patches at the time of reporting further increases risk for affected organizations.
Potential Impact
For European organizations using Hyland OnBase, this vulnerability poses a severe risk. Successful exploitation leads to full system compromise with SYSTEM-level privileges, allowing attackers to execute arbitrary code, install malware, exfiltrate sensitive data, disrupt operations, or move laterally within networks. Given OnBase's role as an enterprise content management and document management system, attackers could access confidential business documents, personally identifiable information (PII), and other sensitive data protected under GDPR. The ability to execute code remotely without authentication means attackers can compromise systems at scale, potentially impacting multiple departments or subsidiaries. Disruption of OnBase services could halt critical business workflows, causing operational downtime and financial losses. Additionally, compromised systems could be used as footholds for further attacks against European infrastructure or supply chains. The criticality of this vulnerability demands immediate attention to prevent data breaches, regulatory penalties, and reputational damage.
Mitigation Recommendations
1. Immediate mitigation should include network-level controls to restrict access to port 6031, allowing only trusted internal hosts or VPN users to connect. 2. Employ host-based firewalls or network segmentation to isolate OnBase servers from untrusted networks. 3. Monitor network traffic for unusual or unexpected connections to the TimerServer endpoint, and implement intrusion detection/prevention systems (IDS/IPS) signatures targeting .NET deserialization attack patterns. 4. Disable or restrict .NET Remoting TCP channel usage if feasible, or configure OnBase to avoid using BinaryFormatter for deserialization. 5. Apply vendor patches as soon as they become available; if no official patch exists, consider temporary workarounds such as disabling the vulnerable service or endpoint. 6. Conduct thorough audits of OnBase server logs for signs of exploitation attempts. 7. Educate IT and security teams about this vulnerability and ensure incident response plans are updated to address potential exploitation. 8. Consider deploying application-layer firewalls or runtime application self-protection (RASP) solutions that can detect and block malicious deserialization payloads. These targeted measures go beyond generic advice and focus on the specific attack vector and environment.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Ireland
CVE-2025-34153: CWE-502 Deserialization of Untrusted Data in Hyland Software OnBase
Description
Hyland OnBase versions prior to 17.0.2.87 (other versions may be affected) are vulnerable to unauthenticated remote code execution via insecure deserialization on the .NET Remoting TCP channel. The service registers a listener on port 6031 with the URI endpoint TimerServer, implemented in Hyland.Core.Timers.dll. This endpoint deserializes untrusted input using the .NET BinaryFormatter, allowing attackers to execute arbitrary code under the context of NT AUTHORITY\SYSTEM.
AI-Powered Analysis
Technical Analysis
CVE-2025-34153 is a critical vulnerability affecting Hyland Software's OnBase product, specifically versions prior to 17.0.2.87, though other versions may also be impacted. The vulnerability arises from insecure deserialization of untrusted data within the .NET Remoting TCP channel. OnBase registers a listener on port 6031 with the URI endpoint 'TimerServer', implemented in the Hyland.Core.Timers.dll assembly. This endpoint uses the .NET BinaryFormatter to deserialize incoming data without proper validation or sanitization. BinaryFormatter is known to be unsafe for deserializing untrusted input because it can instantiate arbitrary objects and invoke their methods during deserialization. An attacker can exploit this by sending specially crafted serialized payloads to the TimerServer endpoint, leading to remote code execution (RCE) under the NT AUTHORITY\SYSTEM context, which is the highest privilege level on Windows systems. This vulnerability requires no authentication or user interaction, making it highly exploitable remotely. The CVSS 4.0 score is 10.0 (critical), reflecting the vulnerability's ease of exploitation, lack of required privileges, and the severe impact on confidentiality, integrity, and availability. The vulnerability is classified under CWE-502 (Deserialization of Untrusted Data), a common and dangerous software weakness. No known exploits are currently reported in the wild, but the criticality and straightforward exploitation vector make it a prime target for attackers once publicized. The lack of available patches at the time of reporting further increases risk for affected organizations.
Potential Impact
For European organizations using Hyland OnBase, this vulnerability poses a severe risk. Successful exploitation leads to full system compromise with SYSTEM-level privileges, allowing attackers to execute arbitrary code, install malware, exfiltrate sensitive data, disrupt operations, or move laterally within networks. Given OnBase's role as an enterprise content management and document management system, attackers could access confidential business documents, personally identifiable information (PII), and other sensitive data protected under GDPR. The ability to execute code remotely without authentication means attackers can compromise systems at scale, potentially impacting multiple departments or subsidiaries. Disruption of OnBase services could halt critical business workflows, causing operational downtime and financial losses. Additionally, compromised systems could be used as footholds for further attacks against European infrastructure or supply chains. The criticality of this vulnerability demands immediate attention to prevent data breaches, regulatory penalties, and reputational damage.
Mitigation Recommendations
1. Immediate mitigation should include network-level controls to restrict access to port 6031, allowing only trusted internal hosts or VPN users to connect. 2. Employ host-based firewalls or network segmentation to isolate OnBase servers from untrusted networks. 3. Monitor network traffic for unusual or unexpected connections to the TimerServer endpoint, and implement intrusion detection/prevention systems (IDS/IPS) signatures targeting .NET deserialization attack patterns. 4. Disable or restrict .NET Remoting TCP channel usage if feasible, or configure OnBase to avoid using BinaryFormatter for deserialization. 5. Apply vendor patches as soon as they become available; if no official patch exists, consider temporary workarounds such as disabling the vulnerable service or endpoint. 6. Conduct thorough audits of OnBase server logs for signs of exploitation attempts. 7. Educate IT and security teams about this vulnerability and ensure incident response plans are updated to address potential exploitation. 8. Consider deploying application-layer firewalls or runtime application self-protection (RASP) solutions that can detect and block malicious deserialization payloads. These targeted measures go beyond generic advice and focus on the specific attack vector and environment.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.565Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 689cc539ad5a09ad004e1a4e
Added to database: 8/13/2025, 5:02:49 PM
Last enriched: 8/21/2025, 1:19:05 AM
Last updated: 9/26/2025, 9:50:53 AM
Views: 75
Related Threats
CVE-2025-55847: n/a
CriticalCVE-2025-45994: n/a
MediumCVE-2025-60164: CWE-352 Cross-Site Request Forgery (CSRF) in NewsMAN NewsmanApp
HighCVE-2025-59844: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in SonarSource sonarqube-scan-action
HighCVE-2025-11029: Cross-Site Request Forgery in givanz Vvveb
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.