CVE-2026-23746: CWE-306 Missing Authentication for Critical Function in Entrust Corporation Instant Financial Issuance (IF)
Entrust Instant Financial Issuance (IFI) On Premise software (formerly referred to as CardWizard) versions 5.x, prior to 6.10.5, and prior to 6.11.1 contain an insecure .NET Remoting exposure in the SmartCardController service (DCG.SmartCardControllerService.exe). The service registers a TCP remoting channel with unsafe formatter/settings that permit untrusted remoting object invocation. A remote, unauthenticated attacker who can reach the remoting port can invoke exposed remoting objects to read arbitrary files from the server and coerce outbound authentication, and may achieve arbitrary file write and remote code execution via known .NET Remoting exploitation techniques. This can lead to disclosure of sensitive installation and service-account data and compromise of the affected host.
AI Analysis
Technical Summary
CVE-2026-23746 is a critical security vulnerability affecting Entrust Corporation's Instant Financial Issuance (IFI) On Premise software, specifically versions 5.x and 6.0 prior to 6.10.5 and 6.11.1. The flaw resides in the SmartCardController service (DCG.SmartCardControllerService.exe), which uses .NET Remoting with insecure formatter settings and an exposed TCP remoting channel. This misconfiguration allows unauthenticated remote attackers to invoke remoting objects arbitrarily. Exploiting this vulnerability enables attackers to read arbitrary files from the server, coerce the service into performing outbound authentication, and potentially write arbitrary files or execute remote code using known .NET Remoting exploitation techniques. The vulnerability stems from CWE-306 (Missing Authentication for Critical Function) and CWE-502 (Deserialization of Untrusted Data), indicating that critical functions lack proper authentication and that unsafe deserialization mechanisms are in use. The absence of authentication and the network-exposed remoting channel make exploitation straightforward for attackers with network access to the remoting port. The impact includes disclosure of sensitive installation and service-account data, full system compromise, and potential lateral movement within the network. The vulnerability has a CVSS 4.0 base score of 9.3, reflecting its critical severity with network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. No patches are currently linked, so affected organizations must prioritize mitigation and monitoring.
Potential Impact
For European organizations, especially those in the financial sector using Entrust IFI On Premise software, this vulnerability poses a severe risk. Exploitation can lead to unauthorized disclosure of sensitive financial card issuance data, including service account credentials and installation details, potentially enabling further attacks or fraud. Remote code execution could allow attackers to take full control of affected servers, disrupt financial issuance operations, and compromise the integrity of issued financial instruments. This could result in significant financial losses, regulatory penalties under GDPR for data breaches, reputational damage, and operational downtime. Given the critical nature of financial services in Europe and Entrust's market presence, the vulnerability could be leveraged in targeted attacks against banks, payment processors, and government agencies involved in financial card issuance. The lack of authentication and ease of exploitation increase the likelihood of successful attacks if the remoting port is exposed or accessible within internal networks.
Mitigation Recommendations
1. Immediately upgrade Entrust IFI On Premise software to version 6.10.5 or later, or 6.11.1 or later, where the vulnerability is addressed. 2. If patching is not immediately possible, restrict network access to the SmartCardController service remoting port using firewalls or network segmentation to limit exposure to trusted hosts only. 3. Implement strict network-level access controls and monitoring to detect unusual remoting activity or unauthorized connections to the remoting port. 4. Disable or reconfigure .NET Remoting channels to use secure formatters and enforce authentication mechanisms to prevent unauthenticated invocation of remoting objects. 5. Conduct thorough audits of service accounts and credentials to identify potential compromise and rotate credentials if suspicious activity is detected. 6. Employ endpoint detection and response (EDR) tools to monitor for signs of exploitation or anomalous process behavior on servers running the affected service. 7. Review and harden deserialization processes in custom code if applicable to prevent exploitation of unsafe deserialization vulnerabilities. 8. Maintain up-to-date backups and incident response plans to quickly recover from potential compromises.
Affected Countries
Germany, France, United Kingdom, Netherlands, Switzerland
CVE-2026-23746: CWE-306 Missing Authentication for Critical Function in Entrust Corporation Instant Financial Issuance (IF)
Description
Entrust Instant Financial Issuance (IFI) On Premise software (formerly referred to as CardWizard) versions 5.x, prior to 6.10.5, and prior to 6.11.1 contain an insecure .NET Remoting exposure in the SmartCardController service (DCG.SmartCardControllerService.exe). The service registers a TCP remoting channel with unsafe formatter/settings that permit untrusted remoting object invocation. A remote, unauthenticated attacker who can reach the remoting port can invoke exposed remoting objects to read arbitrary files from the server and coerce outbound authentication, and may achieve arbitrary file write and remote code execution via known .NET Remoting exploitation techniques. This can lead to disclosure of sensitive installation and service-account data and compromise of the affected host.
AI-Powered Analysis
Technical Analysis
CVE-2026-23746 is a critical security vulnerability affecting Entrust Corporation's Instant Financial Issuance (IFI) On Premise software, specifically versions 5.x and 6.0 prior to 6.10.5 and 6.11.1. The flaw resides in the SmartCardController service (DCG.SmartCardControllerService.exe), which uses .NET Remoting with insecure formatter settings and an exposed TCP remoting channel. This misconfiguration allows unauthenticated remote attackers to invoke remoting objects arbitrarily. Exploiting this vulnerability enables attackers to read arbitrary files from the server, coerce the service into performing outbound authentication, and potentially write arbitrary files or execute remote code using known .NET Remoting exploitation techniques. The vulnerability stems from CWE-306 (Missing Authentication for Critical Function) and CWE-502 (Deserialization of Untrusted Data), indicating that critical functions lack proper authentication and that unsafe deserialization mechanisms are in use. The absence of authentication and the network-exposed remoting channel make exploitation straightforward for attackers with network access to the remoting port. The impact includes disclosure of sensitive installation and service-account data, full system compromise, and potential lateral movement within the network. The vulnerability has a CVSS 4.0 base score of 9.3, reflecting its critical severity with network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. No patches are currently linked, so affected organizations must prioritize mitigation and monitoring.
Potential Impact
For European organizations, especially those in the financial sector using Entrust IFI On Premise software, this vulnerability poses a severe risk. Exploitation can lead to unauthorized disclosure of sensitive financial card issuance data, including service account credentials and installation details, potentially enabling further attacks or fraud. Remote code execution could allow attackers to take full control of affected servers, disrupt financial issuance operations, and compromise the integrity of issued financial instruments. This could result in significant financial losses, regulatory penalties under GDPR for data breaches, reputational damage, and operational downtime. Given the critical nature of financial services in Europe and Entrust's market presence, the vulnerability could be leveraged in targeted attacks against banks, payment processors, and government agencies involved in financial card issuance. The lack of authentication and ease of exploitation increase the likelihood of successful attacks if the remoting port is exposed or accessible within internal networks.
Mitigation Recommendations
1. Immediately upgrade Entrust IFI On Premise software to version 6.10.5 or later, or 6.11.1 or later, where the vulnerability is addressed. 2. If patching is not immediately possible, restrict network access to the SmartCardController service remoting port using firewalls or network segmentation to limit exposure to trusted hosts only. 3. Implement strict network-level access controls and monitoring to detect unusual remoting activity or unauthorized connections to the remoting port. 4. Disable or reconfigure .NET Remoting channels to use secure formatters and enforce authentication mechanisms to prevent unauthenticated invocation of remoting objects. 5. Conduct thorough audits of service accounts and credentials to identify potential compromise and rotate credentials if suspicious activity is detected. 6. Employ endpoint detection and response (EDR) tools to monitor for signs of exploitation or anomalous process behavior on servers running the affected service. 7. Review and harden deserialization processes in custom code if applicable to prevent exploitation of unsafe deserialization vulnerabilities. 8. Maintain up-to-date backups and incident response plans to quickly recover from potential compromises.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2026-01-15T18:42:20.937Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6969476c1ab3796b1034af87
Added to database: 1/15/2026, 8:00:44 PM
Last enriched: 1/15/2026, 8:16:24 PM
Last updated: 1/15/2026, 10:37:56 PM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0915: CWE-908 Use of Uninitialized Resource in The GNU C Library glibc
MediumAWS CodeBuild Misconfiguration Exposed GitHub Repos to Potential Supply Chain Attacks
CriticalCVE-2025-67822: n/a
UnknownCVE-2025-59959: CWE-822 Untrusted Pointer Dereference in Juniper Networks Junos OS
MediumCVE-2025-52987: CWE-1021 Improper Restriction of Rendered UI Layers or Frames in Juniper Networks Paragon Automation (Pathfinder, Planner, Insights)
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.