CVE-2026-39906
NET Remoting Vulnerability in Unisys WebPerfect Leaks NTLMv2 Hashes
Publication date: 2026-04-14
Last updated on: 2026-05-06
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| unisys | webperfect_image_suite | 3.0.3960.22604 |
| unisys | webperfect_image_suite | 3.0.3960.22810 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-441 | The product receives a request, message, or directive from an upstream component, but the product does not sufficiently preserve the original source of the request before forwarding the request to an external actor that is outside of the product's control sphere. This causes the product to appear to be the source of the request, leading it to act as a proxy or other intermediary between the upstream component and the external actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in Unisys WebPerfect Image Suite versions 3.0.3960.22810 and 3.0.3960.22604. It involves the exposure of a deprecated .NET Remoting TCP channel that allows remote unauthenticated attackers to leak NTLMv2 machine-account hashes.
Attackers exploit this by supplying a Windows UNC path as a target file argument through object-unmarshalling techniques, which causes the system to leak the NTLMv2 hash.
The leaked NTLMv2 hash can then be captured and relayed to other hosts, enabling attackers to escalate privileges or move laterally within the network depending on the network configuration and patch level.
How can this vulnerability impact me? :
This vulnerability can impact you by allowing remote unauthenticated attackers to obtain NTLMv2 machine-account hashes.
With these hashes, attackers can perform relay attacks to escalate privileges or move laterally across your network.
Such unauthorized access can lead to compromise of sensitive systems, data breaches, and disruption of services depending on your network's security posture and patch status.