Skip to main content

CVE-2025-34153: CWE-502 Deserialization of Untrusted Data in Hyland Software OnBase

Critical
VulnerabilityCVE-2025-34153cvecve-2025-34153cwe-502
Published: Wed Aug 13 2025 (08/13/2025, 16:51:26 UTC)
Source: CVE Database V5
Vendor/Project: Hyland Software
Product: OnBase

Description

Hyland OnBase versions prior to 17.0.2.87 (other versions may be affected) are vulnerable to unauthenticated remote code execution via insecure deserialization on the .NET Remoting TCP channel. The service registers a listener on port 6031 with the URI endpoint TimerServer, implemented in Hyland.Core.Timers.dll. This endpoint deserializes untrusted input using the .NET BinaryFormatter, allowing attackers to execute arbitrary code under the context of NT AUTHORITY\SYSTEM.

AI-Powered Analysis

AILast updated: 08/21/2025, 01:19:05 UTC

Technical Analysis

CVE-2025-34153 is a critical vulnerability affecting Hyland Software's OnBase product, specifically versions prior to 17.0.2.87, though other versions may also be impacted. The vulnerability arises from insecure deserialization of untrusted data within the .NET Remoting TCP channel. OnBase registers a listener on port 6031 with the URI endpoint 'TimerServer', implemented in the Hyland.Core.Timers.dll assembly. This endpoint uses the .NET BinaryFormatter to deserialize incoming data without proper validation or sanitization. BinaryFormatter is known to be unsafe for deserializing untrusted input because it can instantiate arbitrary objects and invoke their methods during deserialization. An attacker can exploit this by sending specially crafted serialized payloads to the TimerServer endpoint, leading to remote code execution (RCE) under the NT AUTHORITY\SYSTEM context, which is the highest privilege level on Windows systems. This vulnerability requires no authentication or user interaction, making it highly exploitable remotely. The CVSS 4.0 score is 10.0 (critical), reflecting the vulnerability's ease of exploitation, lack of required privileges, and the severe impact on confidentiality, integrity, and availability. The vulnerability is classified under CWE-502 (Deserialization of Untrusted Data), a common and dangerous software weakness. No known exploits are currently reported in the wild, but the criticality and straightforward exploitation vector make it a prime target for attackers once publicized. The lack of available patches at the time of reporting further increases risk for affected organizations.

Potential Impact

For European organizations using Hyland OnBase, this vulnerability poses a severe risk. Successful exploitation leads to full system compromise with SYSTEM-level privileges, allowing attackers to execute arbitrary code, install malware, exfiltrate sensitive data, disrupt operations, or move laterally within networks. Given OnBase's role as an enterprise content management and document management system, attackers could access confidential business documents, personally identifiable information (PII), and other sensitive data protected under GDPR. The ability to execute code remotely without authentication means attackers can compromise systems at scale, potentially impacting multiple departments or subsidiaries. Disruption of OnBase services could halt critical business workflows, causing operational downtime and financial losses. Additionally, compromised systems could be used as footholds for further attacks against European infrastructure or supply chains. The criticality of this vulnerability demands immediate attention to prevent data breaches, regulatory penalties, and reputational damage.

Mitigation Recommendations

1. Immediate mitigation should include network-level controls to restrict access to port 6031, allowing only trusted internal hosts or VPN users to connect. 2. Employ host-based firewalls or network segmentation to isolate OnBase servers from untrusted networks. 3. Monitor network traffic for unusual or unexpected connections to the TimerServer endpoint, and implement intrusion detection/prevention systems (IDS/IPS) signatures targeting .NET deserialization attack patterns. 4. Disable or restrict .NET Remoting TCP channel usage if feasible, or configure OnBase to avoid using BinaryFormatter for deserialization. 5. Apply vendor patches as soon as they become available; if no official patch exists, consider temporary workarounds such as disabling the vulnerable service or endpoint. 6. Conduct thorough audits of OnBase server logs for signs of exploitation attempts. 7. Educate IT and security teams about this vulnerability and ensure incident response plans are updated to address potential exploitation. 8. Consider deploying application-layer firewalls or runtime application self-protection (RASP) solutions that can detect and block malicious deserialization payloads. These targeted measures go beyond generic advice and focus on the specific attack vector and environment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.565Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 689cc539ad5a09ad004e1a4e

Added to database: 8/13/2025, 5:02:49 PM

Last enriched: 8/21/2025, 1:19:05 AM

Last updated: 9/26/2025, 9:50:53 AM

Views: 75

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats