CVE-2026-23751: CWE-306 Missing Authentication for Critical Function in Tungsten Automation Kofax Capture
Kofax Capture (Tungsten Capture) version 6. 0. 0. 0 exposes a deprecated . NET Remoting HTTP channel on port 2424 without authentication, using a default endpoint identifier. This allows unauthenticated remote attackers to exploit object unmarshalling to read or write arbitrary files, coerce NTLMv2 authentication, and potentially cause denial of service, remote code execution, or lateral movement depending on privileges. The vulnerability is critical with a CVSS score of 9. 3. No official patch or remediation guidance is currently available.
AI Analysis
Technical Summary
CVE-2026-23751 is a critical vulnerability in Tungsten Automation's Kofax Capture 6.0.0.0 where a deprecated .NET Remoting HTTP channel exposed on port 2424 via the Ascent Capture Service lacks authentication and uses a default, publicly known endpoint identifier. This allows unauthenticated attackers to perform .NET Remoting object unmarshalling attacks to instantiate remote objects like System.Net.WebClient, enabling arbitrary file read/write on the server, NTLMv2 credential relay, and potentially denial of service, remote code execution, or lateral movement depending on the service account privileges and network environment. The vulnerability is categorized under CWE-306 (Missing Authentication for Critical Function) and CWE-441 (Unintended Proxy or Intermediary). There is no vendor advisory or patch information available as of the publication date.
Potential Impact
An unauthenticated remote attacker can exploit this vulnerability to read and write arbitrary files on the affected server, potentially disclose sensitive credentials via NTLMv2 relay, cause denial of service, execute remote code, or move laterally within the network. The severity is critical due to the lack of authentication and the ability to perform multiple impactful actions depending on the environment and privileges.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is available, restrict network access to port 2424 on the affected server to trusted hosts only and consider disabling or blocking the deprecated .NET Remoting HTTP channel if possible. Monitor for unusual activity related to this service. Do not rely on generic mitigations; follow vendor updates closely.
CVE-2026-23751: CWE-306 Missing Authentication for Critical Function in Tungsten Automation Kofax Capture
Description
Kofax Capture (Tungsten Capture) version 6. 0. 0. 0 exposes a deprecated . NET Remoting HTTP channel on port 2424 without authentication, using a default endpoint identifier. This allows unauthenticated remote attackers to exploit object unmarshalling to read or write arbitrary files, coerce NTLMv2 authentication, and potentially cause denial of service, remote code execution, or lateral movement depending on privileges. The vulnerability is critical with a CVSS score of 9. 3. No official patch or remediation guidance is currently available.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-23751 is a critical vulnerability in Tungsten Automation's Kofax Capture 6.0.0.0 where a deprecated .NET Remoting HTTP channel exposed on port 2424 via the Ascent Capture Service lacks authentication and uses a default, publicly known endpoint identifier. This allows unauthenticated attackers to perform .NET Remoting object unmarshalling attacks to instantiate remote objects like System.Net.WebClient, enabling arbitrary file read/write on the server, NTLMv2 credential relay, and potentially denial of service, remote code execution, or lateral movement depending on the service account privileges and network environment. The vulnerability is categorized under CWE-306 (Missing Authentication for Critical Function) and CWE-441 (Unintended Proxy or Intermediary). There is no vendor advisory or patch information available as of the publication date.
Potential Impact
An unauthenticated remote attacker can exploit this vulnerability to read and write arbitrary files on the affected server, potentially disclose sensitive credentials via NTLMv2 relay, cause denial of service, execute remote code, or move laterally within the network. The severity is critical due to the lack of authentication and the ability to perform multiple impactful actions depending on the environment and privileges.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is available, restrict network access to port 2424 on the affected server to trusted hosts only and consider disabling or blocking the deprecated .NET Remoting HTTP channel if possible. Monitor for unusual activity related to this service. Do not rely on generic mitigations; follow vendor updates closely.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2026-01-15T18:42:20.938Z
- Cvss Version
- 4.0
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69ea9e7887115cfb686fc41d
Added to database: 4/23/2026, 10:34:32 PM
Last enriched: 4/23/2026, 10:35:56 PM
Last updated: 4/24/2026, 6:06:04 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.