Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2039: CWE-862: Missing Authorization in GFI Archiver

0
High
VulnerabilityCVE-2026-2039cvecve-2026-2039cwe-862
Published: Fri Feb 20 2026 (02/20/2026, 22:13:54 UTC)
Source: CVE Database V5
Vendor/Project: GFI
Product: Archiver

Description

CVE-2026-2039 is a high-severity vulnerability in GFI Archiver version 15. 10 that allows remote attackers to bypass authentication due to missing authorization checks in the MArc. Store. Remoting. exe process listening on port 8018. Exploitation requires no authentication or user interaction, enabling attackers to access functionality without proper permissions. This flaw can be chained with other vulnerabilities to achieve code execution with SYSTEM privileges. The vulnerability stems from CWE-862: Missing Authorization. Although no known exploits are currently in the wild, the ease of exploitation and potential impact on confidentiality, integrity, and availability make it a significant risk. Organizations using GFI Archiver 15.

AI-Powered Analysis

AILast updated: 02/20/2026, 22:47:26 UTC

Technical Analysis

CVE-2026-2039 identifies a missing authorization vulnerability in GFI Archiver version 15.10, specifically within the MArc.Store.Remoting.exe process that listens on TCP port 8018. This process lacks proper authorization checks before granting access to its functionality, allowing remote attackers to bypass authentication entirely. The vulnerability is classified under CWE-862 (Missing Authorization), indicating that the system fails to verify whether a user is permitted to perform certain actions. Because authentication is not required, an attacker can directly interact with the vulnerable service to access restricted functions. While this vulnerability alone does not directly enable code execution, it can be combined with other vulnerabilities to escalate privileges and execute arbitrary code with SYSTEM-level privileges, posing a critical threat to affected systems. The CVSS v3.0 base score is 7.3 (high), reflecting the network attack vector, low attack complexity, no privileges required, no user interaction, and impacts on confidentiality, integrity, and availability. The vulnerability was publicly disclosed on February 20, 2026, and is tracked as ZDI-CAN-28597. No official patches or mitigations have been linked yet, emphasizing the need for immediate attention from organizations using this product version.

Potential Impact

The vulnerability allows unauthenticated remote attackers to bypass authentication controls on GFI Archiver installations, potentially exposing sensitive archived data and administrative functions. This unauthorized access can lead to information disclosure, data manipulation, or service disruption. When combined with other vulnerabilities, attackers may achieve full SYSTEM-level code execution, resulting in complete compromise of the affected server. Organizations relying on GFI Archiver for email archiving and compliance risk breaches of confidential communications and regulatory violations. The availability of the archiving service could also be impacted, disrupting business continuity. Given the network-exposed service and lack of authentication, the attack surface is broad, increasing the likelihood of exploitation in environments where the service is reachable externally or insufficiently segmented internally.

Mitigation Recommendations

Since no official patch is currently available, organizations should implement immediate compensating controls. These include restricting network access to port 8018 by firewall rules to trusted hosts only, ideally limiting it to internal management networks. Employ network segmentation to isolate GFI Archiver servers from untrusted networks and users. Monitor network traffic to and from the MArc.Store.Remoting.exe process for anomalous activity. Review and harden configuration settings of GFI Archiver to disable or restrict remote remoting features if not required. Implement strict access controls and multi-factor authentication on management interfaces to reduce risk from chained exploits. Stay alert for vendor patches or updates and apply them promptly once released. Conduct thorough vulnerability scanning and penetration testing to identify potential exploitation attempts. Maintain comprehensive logging and alerting to detect unauthorized access early.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
zdi
Date Reserved
2026-02-06T01:12:40.764Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 6998e0efbe58cf853bd8653c

Added to database: 2/20/2026, 10:32:15 PM

Last enriched: 2/20/2026, 10:47:26 PM

Last updated: 2/21/2026, 2:08:40 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats