Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21665: Vulnerability in Fiserv Originate Loans Peripherals (formerly Velocity Services) -- Print Service component

0
High
VulnerabilityCVE-2026-21665cvecve-2026-21665
Published: Mon Feb 23 2026 (02/23/2026, 22:34:39 UTC)
Source: CVE Database V5
Vendor/Project: Fiserv
Product: Originate Loans Peripherals (formerly Velocity Services) -- Print Service component

Description

The Print Service component of Fiserv Originate Loans Peripherals (formerly Velocity Services) in unsupported version 2021.2.4 (build 4.7.3155.0011) uses deprecated .NET Remoting TCP channels that allow unsafe deserialization of untrusted data. When these services are exposed to an untrusted network in a client-managed deployment, an unauthenticated attacker can achieve remote code execution. Version 2021.2.4 is no longer supported by Fiserv. Customers should upgrade to a currently supported release (2025.1 or later) and ensure that .NET Remoting service ports are not exposed beyond trusted network boundaries. This CVE documents behavior observed in a client-hosted deployment running an unsupported legacy version of Originate Loans Peripherals with .NET Remoting ports exposed to an untrusted network. This is not a default or supported configuration. Customers running legacy versions should upgrade to a currently supported release and ensure .NET Remoting ports are restricted to trusted network segments. The finding does not apply to Fiserv-hosted environments.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/03/2026, 01:19:23 UTC

Technical Analysis

CVE-2026-21665 affects the Print Service component of Fiserv Originate Loans Peripherals (formerly Velocity Services) version 2021.2.4 (build 4.7.3155.0011). This component uses deprecated .NET Remoting TCP channels, which are known to be vulnerable to unsafe deserialization attacks. Unsafe deserialization occurs when untrusted data is deserialized without proper validation, allowing attackers to craft malicious payloads that execute arbitrary code remotely. In this case, the vulnerability allows an unauthenticated attacker to achieve remote code execution (RCE) if the .NET Remoting service ports are exposed to untrusted networks in client-managed deployments. The vulnerability is not present in Fiserv-hosted environments or default configurations, as those do not expose these ports externally. The affected version 2021.2.4 is no longer supported, and Fiserv recommends upgrading to version 2025.1 or later, which presumably removes or secures the vulnerable component. The CVSS 4.0 vector indicates the attack is network-based (AV:N), requires no privileges (PR:N), but requires user interaction (UI:P), and results in high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). This vulnerability is categorized under CWE-502 (Deserialization of Untrusted Data). No public exploits have been reported yet, but the risk remains significant due to the potential for RCE and the financial nature of the affected software.

Potential Impact

The vulnerability allows unauthenticated remote attackers to execute arbitrary code on systems running the vulnerable Print Service component of Fiserv Originate Loans Peripherals 2021.2.4 if .NET Remoting ports are exposed to untrusted networks. This can lead to full system compromise, data theft, manipulation of loan processing data, disruption of loan origination services, and potential financial fraud. Given the critical role of loan origination software in financial institutions, exploitation could result in severe operational disruption, regulatory non-compliance, reputational damage, and financial losses. The impact extends beyond confidentiality to integrity and availability, as attackers could alter or delete loan data or disrupt service availability. Since the affected version is unsupported, organizations may lack vendor support for incident response or patches, increasing remediation complexity. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially if attackers develop exploits targeting exposed legacy deployments.

Mitigation Recommendations

Organizations should immediately identify any deployments of Fiserv Originate Loans Peripherals version 2021.2.4 or earlier and assess network exposure of .NET Remoting TCP ports. The primary mitigation is to upgrade to the supported version 2025.1 or later, which addresses the vulnerability. If immediate upgrade is not feasible, restrict access to .NET Remoting service ports using network segmentation, firewalls, or VPNs to ensure they are only accessible from trusted internal networks. Disable or remove the Print Service component if it is not required. Monitor network traffic for unusual activity on .NET Remoting ports and implement intrusion detection systems capable of detecting deserialization attack patterns. Conduct regular vulnerability scans and penetration tests focusing on legacy client-hosted environments. Establish strict change management and patching policies to avoid running unsupported software versions. Finally, educate IT staff about the risks of exposing legacy services to untrusted networks and enforce least privilege principles for service accounts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
hackerone
Date Reserved
2026-01-02T15:00:02.871Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699cd8f4be58cf853bd429b0

Added to database: 2/23/2026, 10:47:16 PM

Last enriched: 3/3/2026, 1:19:23 AM

Last updated: 4/10/2026, 5:34:55 AM

Views: 107

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses