Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21665: Vulnerability in Fiserv Originate Loans Peripherals (formerly Velocity Services) -- Print Service component

0
High
VulnerabilityCVE-2026-21665cvecve-2026-21665
Published: Mon Feb 23 2026 (02/23/2026, 22:34:39 UTC)
Source: CVE Database V5
Vendor/Project: Fiserv
Product: Originate Loans Peripherals (formerly Velocity Services) -- Print Service component

Description

The Print Service component of Fiserv Originate Loans Peripherals (formerly Velocity Services) in unsupported version 2021.2.4 (build 4.7.3155.0011) uses deprecated .NET Remoting TCP channels that allow unsafe deserialization of untrusted data. When these services are exposed to an untrusted network in a client-managed deployment, an unauthenticated attacker can achieve remote code execution. Version 2021.2.4 is no longer supported by Fiserv. Customers should upgrade to a currently supported release (2025.1 or later) and ensure that .NET Remoting service ports are not exposed beyond trusted network boundaries. This CVE documents behavior observed in a client-hosted deployment running an unsupported legacy version of Originate Loans Peripherals with .NET Remoting ports exposed to an untrusted network. This is not a default or supported configuration. Customers running legacy versions should upgrade to a currently supported release and ensure .NET Remoting ports are restricted to trusted network segments. The finding does not apply to Fiserv-hosted environments.

AI-Powered Analysis

AILast updated: 02/23/2026, 23:01:35 UTC

Technical Analysis

The vulnerability identified as CVE-2026-21665 affects the Print Service component of Fiserv Originate Loans Peripherals (formerly Velocity Services) specifically in the unsupported version 2021.2.4 (build 4.7.3155.0011). This component relies on deprecated .NET Remoting TCP channels, which are known to be susceptible to unsafe deserialization attacks. Unsafe deserialization occurs when untrusted data is deserialized without proper validation, allowing attackers to manipulate the deserialization process to execute arbitrary code remotely. In this case, if the .NET Remoting service ports are exposed beyond trusted network boundaries in a client-managed deployment, an unauthenticated attacker can send crafted data to trigger remote code execution (RCE). The vulnerability is not present in Fiserv-hosted environments or default configurations, as these do not expose the vulnerable service to untrusted networks. The affected version is no longer supported, and Fiserv recommends upgrading to version 2025.1 or later, which presumably removes or mitigates the use of unsafe .NET Remoting channels. The CVSS 4.0 score of 7.7 reflects high severity, with network attack vector, low attack complexity, no privileges required, and partial user interaction needed. The vulnerability impacts confidentiality, integrity, and availability due to the potential for full system compromise. No known exploits have been reported in the wild, but the risk remains significant for exposed legacy deployments.

Potential Impact

This vulnerability poses a significant risk to organizations using the unsupported 2021.2.4 version of Fiserv Originate Loans Peripherals in client-managed environments where .NET Remoting ports are exposed to untrusted networks. Successful exploitation allows unauthenticated remote attackers to execute arbitrary code, potentially leading to full system compromise, data theft, manipulation of loan processing data, disruption of loan origination services, and lateral movement within the network. Financial institutions relying on this software for loan processing could face severe operational disruptions, reputational damage, regulatory penalties, and financial losses. Since the vulnerability affects confidentiality, integrity, and availability, attackers could manipulate sensitive financial data or disrupt critical business functions. The lack of support for the affected version exacerbates the risk, as no official patches are available, forcing organizations to either upgrade or implement stringent network controls. Although no exploits are currently known in the wild, the ease of exploitation and critical impact make this a high-priority threat for affected deployments.

Mitigation Recommendations

Organizations should immediately assess their deployments of Fiserv Originate Loans Peripherals to identify any instances running version 2021.2.4 or earlier. The primary mitigation is to upgrade to the currently supported version 2025.1 or later, which addresses the vulnerability. Until upgrades can be performed, organizations must ensure that .NET Remoting TCP service ports are not exposed beyond trusted internal network segments; this includes implementing strict firewall rules, network segmentation, and access control lists to block untrusted network access. Monitoring network traffic for unusual activity on .NET Remoting ports can help detect exploitation attempts. Additionally, organizations should review and harden their deserialization processes and consider disabling or replacing deprecated .NET Remoting components where feasible. Regular vulnerability scanning and penetration testing should be conducted to verify that no exposed legacy services remain accessible. Finally, organizations should maintain an incident response plan tailored to potential remote code execution incidents involving this software.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
hackerone
Date Reserved
2026-01-02T15:00:02.871Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699cd8f4be58cf853bd429b0

Added to database: 2/23/2026, 10:47:16 PM

Last enriched: 2/23/2026, 11:01:35 PM

Last updated: 2/24/2026, 3:27:53 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats