CVE-2025-34153: CWE-502 Deserialization of Untrusted Data in Hyland Software OnBase
Hyland OnBase versions prior to 17.0.2.87 (other versions may be affected) are vulnerable to unauthenticated remote code execution via insecure deserialization on the .NET Remoting TCP channel. The service registers a listener on port 6031 with the URI endpoint TimerServer, implemented in Hyland.Core.Timers.dll. This endpoint deserializes untrusted input using the .NET BinaryFormatter, allowing attackers to execute arbitrary code under the context of NT AUTHORITY\SYSTEM.
AI Analysis
Technical Summary
CVE-2025-34153 is a critical vulnerability in Hyland Software's OnBase product, identified as CWE-502 (Deserialization of Untrusted Data). The vulnerability exists in the .NET Remoting TCP channel where the TimerServer endpoint listens on port 6031 and deserializes incoming data using the insecure .NET BinaryFormatter. This deserialization process does not validate or sanitize input, allowing attackers to craft malicious serialized payloads that execute arbitrary code on the target system. Exploitation requires no authentication or user interaction, and successful attacks run with NT AUTHORITY\SYSTEM privileges, effectively granting full control over the affected host. The vulnerability affects all versions prior to 17.0.2.87, though other versions may also be vulnerable. The flaw stems from the unsafe use of BinaryFormatter, which is known to be vulnerable to deserialization attacks if untrusted data is processed. The CVSS 4.0 base score is 10, reflecting the critical nature of this vulnerability with network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the ease of exploitation and high privileges gained make this a severe threat. The vulnerability impacts organizations using OnBase for enterprise content management, document workflow, and business process automation, potentially leading to full system compromise, data theft, ransomware deployment, or lateral movement within networks.
Potential Impact
For European organizations, the impact of CVE-2025-34153 is substantial. OnBase is widely used in sectors such as government, healthcare, finance, and legal services for managing sensitive documents and workflows. Exploitation could lead to complete system takeover, exposing confidential data, disrupting critical business processes, and enabling further attacks such as ransomware or espionage. The vulnerability's unauthenticated nature means attackers can exploit it remotely without prior access, increasing the risk of widespread attacks. Organizations with OnBase instances exposed to untrusted networks or insufficiently segmented internal networks are particularly vulnerable. The compromise of OnBase servers could also serve as a pivot point for attackers to infiltrate broader IT infrastructure. Given the criticality of the vulnerability and the high privileges obtained, the potential for operational disruption, regulatory non-compliance (e.g., GDPR breaches), and reputational damage is high.
Mitigation Recommendations
1. Apply patches from Hyland Software immediately once available, prioritizing OnBase versions prior to 17.0.2.87. 2. Until patches are deployed, restrict network access to port 6031 using firewalls or network segmentation to limit exposure to trusted hosts only. 3. Disable or replace .NET Remoting usage in OnBase configurations if possible, as BinaryFormatter is inherently unsafe for untrusted data. 4. Monitor network traffic for unusual connections or payloads targeting port 6031 and implement intrusion detection rules specific to .NET deserialization attack patterns. 5. Conduct thorough audits of OnBase server configurations and logs to detect any signs of compromise. 6. Employ application whitelisting and endpoint protection to prevent execution of unauthorized code. 7. Educate IT staff about the risks of insecure deserialization and ensure secure coding practices in custom integrations with OnBase. 8. Consider isolating OnBase servers in dedicated network zones with strict access controls to minimize lateral movement risks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-34153: CWE-502 Deserialization of Untrusted Data in Hyland Software OnBase
Description
Hyland OnBase versions prior to 17.0.2.87 (other versions may be affected) are vulnerable to unauthenticated remote code execution via insecure deserialization on the .NET Remoting TCP channel. The service registers a listener on port 6031 with the URI endpoint TimerServer, implemented in Hyland.Core.Timers.dll. This endpoint deserializes untrusted input using the .NET BinaryFormatter, allowing attackers to execute arbitrary code under the context of NT AUTHORITY\SYSTEM.
AI-Powered Analysis
Technical Analysis
CVE-2025-34153 is a critical vulnerability in Hyland Software's OnBase product, identified as CWE-502 (Deserialization of Untrusted Data). The vulnerability exists in the .NET Remoting TCP channel where the TimerServer endpoint listens on port 6031 and deserializes incoming data using the insecure .NET BinaryFormatter. This deserialization process does not validate or sanitize input, allowing attackers to craft malicious serialized payloads that execute arbitrary code on the target system. Exploitation requires no authentication or user interaction, and successful attacks run with NT AUTHORITY\SYSTEM privileges, effectively granting full control over the affected host. The vulnerability affects all versions prior to 17.0.2.87, though other versions may also be vulnerable. The flaw stems from the unsafe use of BinaryFormatter, which is known to be vulnerable to deserialization attacks if untrusted data is processed. The CVSS 4.0 base score is 10, reflecting the critical nature of this vulnerability with network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the ease of exploitation and high privileges gained make this a severe threat. The vulnerability impacts organizations using OnBase for enterprise content management, document workflow, and business process automation, potentially leading to full system compromise, data theft, ransomware deployment, or lateral movement within networks.
Potential Impact
For European organizations, the impact of CVE-2025-34153 is substantial. OnBase is widely used in sectors such as government, healthcare, finance, and legal services for managing sensitive documents and workflows. Exploitation could lead to complete system takeover, exposing confidential data, disrupting critical business processes, and enabling further attacks such as ransomware or espionage. The vulnerability's unauthenticated nature means attackers can exploit it remotely without prior access, increasing the risk of widespread attacks. Organizations with OnBase instances exposed to untrusted networks or insufficiently segmented internal networks are particularly vulnerable. The compromise of OnBase servers could also serve as a pivot point for attackers to infiltrate broader IT infrastructure. Given the criticality of the vulnerability and the high privileges obtained, the potential for operational disruption, regulatory non-compliance (e.g., GDPR breaches), and reputational damage is high.
Mitigation Recommendations
1. Apply patches from Hyland Software immediately once available, prioritizing OnBase versions prior to 17.0.2.87. 2. Until patches are deployed, restrict network access to port 6031 using firewalls or network segmentation to limit exposure to trusted hosts only. 3. Disable or replace .NET Remoting usage in OnBase configurations if possible, as BinaryFormatter is inherently unsafe for untrusted data. 4. Monitor network traffic for unusual connections or payloads targeting port 6031 and implement intrusion detection rules specific to .NET deserialization attack patterns. 5. Conduct thorough audits of OnBase server configurations and logs to detect any signs of compromise. 6. Employ application whitelisting and endpoint protection to prevent execution of unauthorized code. 7. Educate IT staff about the risks of insecure deserialization and ensure secure coding practices in custom integrations with OnBase. 8. Consider isolating OnBase servers in dedicated network zones with strict access controls to minimize lateral movement risks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.565Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 689cc539ad5a09ad004e1a4e
Added to database: 8/13/2025, 5:02:49 PM
Last enriched: 11/4/2025, 10:38:18 PM
Last updated: 11/14/2025, 6:14:16 AM
Views: 107
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64444: Improper neutralization of special elements used in an OS command ('OS Command Injection') in Sony Network Communications Inc. NCP-HG100/Cellular model
HighCVE-2025-13161: CWE-23 Relative Path Traversal in IQ Service International IQ-Support
HighCVE-2025-13160: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in IQ Service International IQ-Support
MediumCVE-2025-9479: Out of bounds read in Google Chrome
UnknownCVE-2025-13107: Inappropriate implementation in Google Chrome
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.