CVE-2026-26222: CWE-502 Deserialization of Untrusted Data in Beyond Limits Inc. Altec DocLink
Altec DocLink (now maintained by Beyond Limits Inc.) version 4.0.336.0 exposes insecure .NET Remoting endpoints over TCP and HTTP/SOAP via Altec.RDCHostService.exe using the ObjectURI "doclinkServer.soap". The service does not require authentication and is vulnerable to unsafe object unmarshalling, allowing remote attackers to read arbitrary files from the underlying system by specifying local file paths. Additionally, attackers can coerce SMB authentication via UNC paths and write arbitrary files to server locations. Because writable paths may be web-accessible under IIS, this can result in unauthenticated remote code execution or denial of service through file overwrite.
AI Analysis
Technical Summary
CVE-2026-26222 affects Altec DocLink version 4.0.336.0, maintained by Beyond Limits Inc., and involves insecure exposure of .NET Remoting endpoints via the Altec.RDCHostService.exe process. The service listens on TCP and HTTP/SOAP interfaces using the ObjectURI "doclinkServer.soap" and does not require any authentication, making it accessible to unauthenticated remote attackers. The core issue is unsafe deserialization (CWE-502) of untrusted data, allowing attackers to manipulate the object unmarshalling process. This flaw enables reading arbitrary files on the server by specifying local file paths, which can lead to sensitive data disclosure. Additionally, attackers can coerce SMB authentication by referencing UNC paths, potentially capturing credentials or performing relay attacks. More critically, the vulnerability allows writing arbitrary files to server locations. Since some writable directories may be served by IIS, attackers can place malicious files that lead to unauthenticated remote code execution or cause denial of service by overwriting critical files. The vulnerability also relates to CWE-918 (Server-Side Request Forgery), as the attacker can force the server to make SMB authentication requests. The CVSS 4.0 vector indicates network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. Although no exploits are currently known in the wild, the severity and ease of exploitation make this a critical threat requiring immediate attention.
Potential Impact
The vulnerability poses a severe risk to organizations using Altec DocLink 4.0.336.0, potentially leading to full system compromise. Confidentiality is at risk due to arbitrary file reading, exposing sensitive documents and credentials. Integrity is compromised by the ability to write arbitrary files, enabling attackers to implant backdoors or modify application behavior. Availability can be disrupted through denial of service by overwriting essential files. The unauthenticated nature of the exploit broadens the attack surface, allowing remote attackers to compromise systems without any prior access. Organizations relying on Altec DocLink for document management, especially those exposing the service to untrusted networks, face risks of data breaches, ransomware deployment, and operational disruption. The ability to coerce SMB authentication also raises concerns about credential theft and lateral movement within networks. Given the critical CVSS score and the nature of the vulnerability, the impact is potentially devastating for affected enterprises.
Mitigation Recommendations
Immediate mitigation steps include restricting network access to the Altec DocLink service endpoints by implementing firewall rules that limit access to trusted internal IP addresses only. Disable or block the .NET Remoting endpoints if not required, or configure the service to require strong authentication and encryption. Since no official patches are currently listed, organizations should contact Beyond Limits Inc. for updates or workarounds. Monitor network traffic for unusual SMB authentication attempts or unexpected file writes to IIS directories. Employ application-layer firewalls or intrusion detection systems to detect and block exploitation attempts targeting the ObjectURI "doclinkServer.soap". Conduct thorough audits of server file systems and IIS web directories for unauthorized changes. As a longer-term measure, consider isolating the Altec DocLink server in a segmented network zone with strict access controls. Regularly review and update security policies to prevent exposure of legacy or insecure services. Finally, prepare incident response plans to quickly contain and remediate any exploitation.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, India, Brazil
CVE-2026-26222: CWE-502 Deserialization of Untrusted Data in Beyond Limits Inc. Altec DocLink
Description
Altec DocLink (now maintained by Beyond Limits Inc.) version 4.0.336.0 exposes insecure .NET Remoting endpoints over TCP and HTTP/SOAP via Altec.RDCHostService.exe using the ObjectURI "doclinkServer.soap". The service does not require authentication and is vulnerable to unsafe object unmarshalling, allowing remote attackers to read arbitrary files from the underlying system by specifying local file paths. Additionally, attackers can coerce SMB authentication via UNC paths and write arbitrary files to server locations. Because writable paths may be web-accessible under IIS, this can result in unauthenticated remote code execution or denial of service through file overwrite.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-26222 affects Altec DocLink version 4.0.336.0, maintained by Beyond Limits Inc., and involves insecure exposure of .NET Remoting endpoints via the Altec.RDCHostService.exe process. The service listens on TCP and HTTP/SOAP interfaces using the ObjectURI "doclinkServer.soap" and does not require any authentication, making it accessible to unauthenticated remote attackers. The core issue is unsafe deserialization (CWE-502) of untrusted data, allowing attackers to manipulate the object unmarshalling process. This flaw enables reading arbitrary files on the server by specifying local file paths, which can lead to sensitive data disclosure. Additionally, attackers can coerce SMB authentication by referencing UNC paths, potentially capturing credentials or performing relay attacks. More critically, the vulnerability allows writing arbitrary files to server locations. Since some writable directories may be served by IIS, attackers can place malicious files that lead to unauthenticated remote code execution or cause denial of service by overwriting critical files. The vulnerability also relates to CWE-918 (Server-Side Request Forgery), as the attacker can force the server to make SMB authentication requests. The CVSS 4.0 vector indicates network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. Although no exploits are currently known in the wild, the severity and ease of exploitation make this a critical threat requiring immediate attention.
Potential Impact
The vulnerability poses a severe risk to organizations using Altec DocLink 4.0.336.0, potentially leading to full system compromise. Confidentiality is at risk due to arbitrary file reading, exposing sensitive documents and credentials. Integrity is compromised by the ability to write arbitrary files, enabling attackers to implant backdoors or modify application behavior. Availability can be disrupted through denial of service by overwriting essential files. The unauthenticated nature of the exploit broadens the attack surface, allowing remote attackers to compromise systems without any prior access. Organizations relying on Altec DocLink for document management, especially those exposing the service to untrusted networks, face risks of data breaches, ransomware deployment, and operational disruption. The ability to coerce SMB authentication also raises concerns about credential theft and lateral movement within networks. Given the critical CVSS score and the nature of the vulnerability, the impact is potentially devastating for affected enterprises.
Mitigation Recommendations
Immediate mitigation steps include restricting network access to the Altec DocLink service endpoints by implementing firewall rules that limit access to trusted internal IP addresses only. Disable or block the .NET Remoting endpoints if not required, or configure the service to require strong authentication and encryption. Since no official patches are currently listed, organizations should contact Beyond Limits Inc. for updates or workarounds. Monitor network traffic for unusual SMB authentication attempts or unexpected file writes to IIS directories. Employ application-layer firewalls or intrusion detection systems to detect and block exploitation attempts targeting the ObjectURI "doclinkServer.soap". Conduct thorough audits of server file systems and IIS web directories for unauthorized changes. As a longer-term measure, consider isolating the Altec DocLink server in a segmented network zone with strict access controls. Regularly review and update security policies to prevent exposure of legacy or insecure services. Finally, prepare incident response plans to quickly contain and remediate any exploitation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2026-02-11T20:08:07.945Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699e0f3bbe58cf853b2906cf
Added to database: 2/24/2026, 8:51:07 PM
Last enriched: 3/4/2026, 6:48:59 PM
Last updated: 4/11/2026, 12:19:15 AM
Views: 128
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.