Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2038: CWE-862: Missing Authorization in GFI Archiver

0
High
VulnerabilityCVE-2026-2038cvecve-2026-2038cwe-862
Published: Fri Feb 20 2026 (02/20/2026, 22:13:35 UTC)
Source: CVE Database V5
Vendor/Project: GFI
Product: Archiver

Description

CVE-2026-2038 is a high-severity vulnerability in GFI Archiver version 15. 10, caused by missing authorization checks in the MArc. Core. Remoting. exe process listening on port 8017. This flaw allows remote attackers to bypass authentication without any user interaction or privileges, potentially enabling unauthorized access to the system. Exploitation can lead to information disclosure, integrity compromise, and availability disruption. Attackers may combine this vulnerability with others to execute code with SYSTEM-level privileges. Although no known exploits are currently in the wild, the vulnerability poses a significant risk due to its ease of exploitation and critical impact. Organizations using GFI Archiver should prioritize patching or implementing mitigations to restrict access to the vulnerable service.

AI-Powered Analysis

AILast updated: 02/20/2026, 22:47:42 UTC

Technical Analysis

CVE-2026-2038 is a vulnerability identified in GFI Archiver version 15.10, specifically within the MArc.Core.Remoting.exe process that listens on TCP port 8017. The core issue is a missing authorization check (CWE-862), which allows remote attackers to bypass authentication mechanisms entirely. This means that an attacker can connect to the service without any credentials or prior authentication and gain unauthorized access to the functionality exposed by this process. The lack of authorization controls enables attackers to interact with the system in ways not intended by the software design. While the vulnerability itself does not directly allow code execution, it can be chained with other vulnerabilities to escalate privileges and execute arbitrary code with SYSTEM-level privileges, which is the highest level of access on Windows systems. The vulnerability has a CVSS v3.0 base score of 7.3, reflecting its high severity due to network attack vector, no required privileges or user interaction, and impacts on confidentiality, integrity, and availability. No patches or known exploits are currently publicly available, but the vulnerability was assigned and published by the Zero Day Initiative (ZDI) under ZDI-CAN-27934. The vulnerability affects only version 15.10 of GFI Archiver, and the flaw resides in the configuration and design of the remoting service, which should enforce authorization before granting access. The vulnerability's exploitation could lead to unauthorized data access, modification, or denial of service, and potentially full system compromise if combined with other exploits.

Potential Impact

The impact of CVE-2026-2038 is significant for organizations using GFI Archiver 15.10. Since the vulnerability allows remote attackers to bypass authentication without any privileges or user interaction, it exposes sensitive archived data to unauthorized access, risking confidentiality breaches. Integrity of archived data and system configurations can be compromised, potentially allowing attackers to alter or delete critical information. Availability may also be affected if attackers disrupt the archiver service or cause denial of service conditions. Furthermore, the ability to chain this vulnerability with others to achieve SYSTEM-level code execution elevates the risk to full system compromise, enabling attackers to deploy malware, move laterally within networks, or exfiltrate data. Organizations relying on GFI Archiver for email and document archiving, especially in regulated industries, face compliance and reputational risks if exploited. The lack of known exploits currently reduces immediate risk, but the ease of exploitation and high impact necessitate urgent attention to prevent future attacks.

Mitigation Recommendations

To mitigate CVE-2026-2038, organizations should first verify if they are running GFI Archiver version 15.10 and restrict network access to port 8017 to trusted hosts only, using firewalls or network segmentation to limit exposure. Implement strict access control lists (ACLs) and monitor network traffic for unusual connections to the MArc.Core.Remoting.exe service. Since no official patch is currently available, consider disabling or stopping the remoting service if it is not essential to operations. Employ intrusion detection/prevention systems (IDS/IPS) to detect anomalous activity targeting port 8017. Regularly audit and review logs for unauthorized access attempts. Coordinate with GFI for updates or patches addressing this vulnerability and plan timely deployment once available. Additionally, conduct thorough vulnerability assessments and penetration testing to identify any chained vulnerabilities that could be exploited in conjunction with this flaw. Educate IT staff about this vulnerability and ensure incident response plans include scenarios involving unauthorized access to archiving systems.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
zdi
Date Reserved
2026-02-06T01:12:35.967Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 6998e0efbe58cf853bd86539

Added to database: 2/20/2026, 10:32:15 PM

Last enriched: 2/20/2026, 10:47:42 PM

Last updated: 2/21/2026, 4:03:59 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats