Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23746: CWE-306 Missing Authentication for Critical Function in Entrust Corporation Instant Financial Issuance (IF)

0
Critical
VulnerabilityCVE-2026-23746cvecve-2026-23746cwe-306cwe-502
Published: Thu Jan 15 2026 (01/15/2026, 19:44:53 UTC)
Source: CVE Database V5
Vendor/Project: Entrust Corporation
Product: Instant Financial Issuance (IF)

Description

Entrust Instant Financial Issuance (IFI) On Premise software (formerly referred to as CardWizard) versions 5.x, prior to 6.10.5, and prior to 6.11.1 contain an insecure .NET Remoting exposure in the SmartCardController service (DCG.SmartCardControllerService.exe). The service registers a TCP remoting channel with unsafe formatter/settings that permit untrusted remoting object invocation. A remote, unauthenticated attacker who can reach the remoting port can invoke exposed remoting objects to read arbitrary files from the server and coerce outbound authentication, and may achieve arbitrary file write and remote code execution via known .NET Remoting exploitation techniques. This can lead to disclosure of sensitive installation and service-account data and compromise of the affected host.

AI-Powered Analysis

AILast updated: 01/15/2026, 20:16:24 UTC

Technical Analysis

CVE-2026-23746 is a critical security vulnerability affecting Entrust Corporation's Instant Financial Issuance (IFI) On Premise software, specifically versions 5.x and 6.0 prior to 6.10.5 and 6.11.1. The flaw resides in the SmartCardController service (DCG.SmartCardControllerService.exe), which uses .NET Remoting with insecure formatter settings and an exposed TCP remoting channel. This misconfiguration allows unauthenticated remote attackers to invoke remoting objects arbitrarily. Exploiting this vulnerability enables attackers to read arbitrary files from the server, coerce the service into performing outbound authentication, and potentially write arbitrary files or execute remote code using known .NET Remoting exploitation techniques. The vulnerability stems from CWE-306 (Missing Authentication for Critical Function) and CWE-502 (Deserialization of Untrusted Data), indicating that critical functions lack proper authentication and that unsafe deserialization mechanisms are in use. The absence of authentication and the network-exposed remoting channel make exploitation straightforward for attackers with network access to the remoting port. The impact includes disclosure of sensitive installation and service-account data, full system compromise, and potential lateral movement within the network. The vulnerability has a CVSS 4.0 base score of 9.3, reflecting its critical severity with network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. No patches are currently linked, so affected organizations must prioritize mitigation and monitoring.

Potential Impact

For European organizations, especially those in the financial sector using Entrust IFI On Premise software, this vulnerability poses a severe risk. Exploitation can lead to unauthorized disclosure of sensitive financial card issuance data, including service account credentials and installation details, potentially enabling further attacks or fraud. Remote code execution could allow attackers to take full control of affected servers, disrupt financial issuance operations, and compromise the integrity of issued financial instruments. This could result in significant financial losses, regulatory penalties under GDPR for data breaches, reputational damage, and operational downtime. Given the critical nature of financial services in Europe and Entrust's market presence, the vulnerability could be leveraged in targeted attacks against banks, payment processors, and government agencies involved in financial card issuance. The lack of authentication and ease of exploitation increase the likelihood of successful attacks if the remoting port is exposed or accessible within internal networks.

Mitigation Recommendations

1. Immediately upgrade Entrust IFI On Premise software to version 6.10.5 or later, or 6.11.1 or later, where the vulnerability is addressed. 2. If patching is not immediately possible, restrict network access to the SmartCardController service remoting port using firewalls or network segmentation to limit exposure to trusted hosts only. 3. Implement strict network-level access controls and monitoring to detect unusual remoting activity or unauthorized connections to the remoting port. 4. Disable or reconfigure .NET Remoting channels to use secure formatters and enforce authentication mechanisms to prevent unauthenticated invocation of remoting objects. 5. Conduct thorough audits of service accounts and credentials to identify potential compromise and rotate credentials if suspicious activity is detected. 6. Employ endpoint detection and response (EDR) tools to monitor for signs of exploitation or anomalous process behavior on servers running the affected service. 7. Review and harden deserialization processes in custom code if applicable to prevent exploitation of unsafe deserialization vulnerabilities. 8. Maintain up-to-date backups and incident response plans to quickly recover from potential compromises.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-01-15T18:42:20.937Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6969476c1ab3796b1034af87

Added to database: 1/15/2026, 8:00:44 PM

Last enriched: 1/15/2026, 8:16:24 PM

Last updated: 1/15/2026, 10:37:56 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats