CVE-2026-21665: Vulnerability in Fiserv Originate Loans Peripherals (formerly Velocity Services) -- Print Service component
The Print Service component of Fiserv Originate Loans Peripherals (formerly Velocity Services) in unsupported version 2021.2.4 (build 4.7.3155.0011) uses deprecated .NET Remoting TCP channels that allow unsafe deserialization of untrusted data. When these services are exposed to an untrusted network in a client-managed deployment, an unauthenticated attacker can achieve remote code execution. Version 2021.2.4 is no longer supported by Fiserv. Customers should upgrade to a currently supported release (2025.1 or later) and ensure that .NET Remoting service ports are not exposed beyond trusted network boundaries. This CVE documents behavior observed in a client-hosted deployment running an unsupported legacy version of Originate Loans Peripherals with .NET Remoting ports exposed to an untrusted network. This is not a default or supported configuration. Customers running legacy versions should upgrade to a currently supported release and ensure .NET Remoting ports are restricted to trusted network segments. The finding does not apply to Fiserv-hosted environments.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2026-21665 affects the Print Service component of Fiserv Originate Loans Peripherals (formerly Velocity Services) specifically in the unsupported version 2021.2.4 (build 4.7.3155.0011). This component relies on deprecated .NET Remoting TCP channels, which are known to be susceptible to unsafe deserialization attacks. Unsafe deserialization occurs when untrusted data is deserialized without proper validation, allowing attackers to manipulate the deserialization process to execute arbitrary code remotely. In this case, if the .NET Remoting service ports are exposed beyond trusted network boundaries in a client-managed deployment, an unauthenticated attacker can send crafted data to trigger remote code execution (RCE). The vulnerability is not present in Fiserv-hosted environments or default configurations, as these do not expose the vulnerable service to untrusted networks. The affected version is no longer supported, and Fiserv recommends upgrading to version 2025.1 or later, which presumably removes or mitigates the use of unsafe .NET Remoting channels. The CVSS 4.0 score of 7.7 reflects high severity, with network attack vector, low attack complexity, no privileges required, and partial user interaction needed. The vulnerability impacts confidentiality, integrity, and availability due to the potential for full system compromise. No known exploits have been reported in the wild, but the risk remains significant for exposed legacy deployments.
Potential Impact
This vulnerability poses a significant risk to organizations using the unsupported 2021.2.4 version of Fiserv Originate Loans Peripherals in client-managed environments where .NET Remoting ports are exposed to untrusted networks. Successful exploitation allows unauthenticated remote attackers to execute arbitrary code, potentially leading to full system compromise, data theft, manipulation of loan processing data, disruption of loan origination services, and lateral movement within the network. Financial institutions relying on this software for loan processing could face severe operational disruptions, reputational damage, regulatory penalties, and financial losses. Since the vulnerability affects confidentiality, integrity, and availability, attackers could manipulate sensitive financial data or disrupt critical business functions. The lack of support for the affected version exacerbates the risk, as no official patches are available, forcing organizations to either upgrade or implement stringent network controls. Although no exploits are currently known in the wild, the ease of exploitation and critical impact make this a high-priority threat for affected deployments.
Mitigation Recommendations
Organizations should immediately assess their deployments of Fiserv Originate Loans Peripherals to identify any instances running version 2021.2.4 or earlier. The primary mitigation is to upgrade to the currently supported version 2025.1 or later, which addresses the vulnerability. Until upgrades can be performed, organizations must ensure that .NET Remoting TCP service ports are not exposed beyond trusted internal network segments; this includes implementing strict firewall rules, network segmentation, and access control lists to block untrusted network access. Monitoring network traffic for unusual activity on .NET Remoting ports can help detect exploitation attempts. Additionally, organizations should review and harden their deserialization processes and consider disabling or replacing deprecated .NET Remoting components where feasible. Regular vulnerability scanning and penetration testing should be conducted to verify that no exposed legacy services remain accessible. Finally, organizations should maintain an incident response plan tailored to potential remote code execution incidents involving this software.
Affected Countries
United States, Canada, United Kingdom, Australia, Germany, France, Japan, India, Brazil, South Africa
CVE-2026-21665: Vulnerability in Fiserv Originate Loans Peripherals (formerly Velocity Services) -- Print Service component
Description
The Print Service component of Fiserv Originate Loans Peripherals (formerly Velocity Services) in unsupported version 2021.2.4 (build 4.7.3155.0011) uses deprecated .NET Remoting TCP channels that allow unsafe deserialization of untrusted data. When these services are exposed to an untrusted network in a client-managed deployment, an unauthenticated attacker can achieve remote code execution. Version 2021.2.4 is no longer supported by Fiserv. Customers should upgrade to a currently supported release (2025.1 or later) and ensure that .NET Remoting service ports are not exposed beyond trusted network boundaries. This CVE documents behavior observed in a client-hosted deployment running an unsupported legacy version of Originate Loans Peripherals with .NET Remoting ports exposed to an untrusted network. This is not a default or supported configuration. Customers running legacy versions should upgrade to a currently supported release and ensure .NET Remoting ports are restricted to trusted network segments. The finding does not apply to Fiserv-hosted environments.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2026-21665 affects the Print Service component of Fiserv Originate Loans Peripherals (formerly Velocity Services) specifically in the unsupported version 2021.2.4 (build 4.7.3155.0011). This component relies on deprecated .NET Remoting TCP channels, which are known to be susceptible to unsafe deserialization attacks. Unsafe deserialization occurs when untrusted data is deserialized without proper validation, allowing attackers to manipulate the deserialization process to execute arbitrary code remotely. In this case, if the .NET Remoting service ports are exposed beyond trusted network boundaries in a client-managed deployment, an unauthenticated attacker can send crafted data to trigger remote code execution (RCE). The vulnerability is not present in Fiserv-hosted environments or default configurations, as these do not expose the vulnerable service to untrusted networks. The affected version is no longer supported, and Fiserv recommends upgrading to version 2025.1 or later, which presumably removes or mitigates the use of unsafe .NET Remoting channels. The CVSS 4.0 score of 7.7 reflects high severity, with network attack vector, low attack complexity, no privileges required, and partial user interaction needed. The vulnerability impacts confidentiality, integrity, and availability due to the potential for full system compromise. No known exploits have been reported in the wild, but the risk remains significant for exposed legacy deployments.
Potential Impact
This vulnerability poses a significant risk to organizations using the unsupported 2021.2.4 version of Fiserv Originate Loans Peripherals in client-managed environments where .NET Remoting ports are exposed to untrusted networks. Successful exploitation allows unauthenticated remote attackers to execute arbitrary code, potentially leading to full system compromise, data theft, manipulation of loan processing data, disruption of loan origination services, and lateral movement within the network. Financial institutions relying on this software for loan processing could face severe operational disruptions, reputational damage, regulatory penalties, and financial losses. Since the vulnerability affects confidentiality, integrity, and availability, attackers could manipulate sensitive financial data or disrupt critical business functions. The lack of support for the affected version exacerbates the risk, as no official patches are available, forcing organizations to either upgrade or implement stringent network controls. Although no exploits are currently known in the wild, the ease of exploitation and critical impact make this a high-priority threat for affected deployments.
Mitigation Recommendations
Organizations should immediately assess their deployments of Fiserv Originate Loans Peripherals to identify any instances running version 2021.2.4 or earlier. The primary mitigation is to upgrade to the currently supported version 2025.1 or later, which addresses the vulnerability. Until upgrades can be performed, organizations must ensure that .NET Remoting TCP service ports are not exposed beyond trusted internal network segments; this includes implementing strict firewall rules, network segmentation, and access control lists to block untrusted network access. Monitoring network traffic for unusual activity on .NET Remoting ports can help detect exploitation attempts. Additionally, organizations should review and harden their deserialization processes and consider disabling or replacing deprecated .NET Remoting components where feasible. Regular vulnerability scanning and penetration testing should be conducted to verify that no exposed legacy services remain accessible. Finally, organizations should maintain an incident response plan tailored to potential remote code execution incidents involving this software.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- hackerone
- Date Reserved
- 2026-01-02T15:00:02.871Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699cd8f4be58cf853bd429b0
Added to database: 2/23/2026, 10:47:16 PM
Last enriched: 2/23/2026, 11:01:35 PM
Last updated: 2/24/2026, 3:27:53 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-3091: Uncontrolled Search Path Element in Synology Synology Presto Client
MediumCVE-2026-3065: Command Injection in HummerRisk
MediumCVE-2026-3064: Command Injection in HummerRisk
MediumCVE-2026-3057: SQL Injection in a54552239 pearProjectApi
MediumCVE-2026-3054: Cross Site Scripting in Alinto SOGo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.