๐Ÿ” CVE Alert

CVE-2025-34153

UNKNOWN 0.0

Hyland OnBase < 17.0.2.87 .NET Remoting TCP Channel Unauthenticated RCE

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Hyland OnBase versions prior to 17.0.2.87 (other versions may be affected) are vulnerable to unauthenticated remote code execution via insecure deserialization on the .NET Remoting TCP channel. The service registers a listener on port 6031 with the URI endpoint TimerServer, implemented in Hyland.Core.Timers.dll. This endpoint deserializes untrusted input using the .NET BinaryFormatter, allowing attackers to execute arbitrary code under the context of NT AUTHORITY\SYSTEM.

CWE CWE-502
Vendor hyland software
Product onbase
Published Aug 13, 2025
Last Updated Feb 26, 2026
Stay Ahead of the Next One

Get instant alerts for hyland software onbase

Be the first to know when new unknown vulnerabilities affecting hyland software onbase are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Hyland Software / OnBase
* < 17.0.2.87

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
gist.github.com: https://gist.github.com/VAMorales/32794cccc2195a935623a12ef32760dc hyland.com: https://www.hyland.com/en/internal/onbase-unity-client support.hyland.com: https://support.hyland.com/r/OnBase/WorkView/Foundation-24.1/WorkView/Installation/Upgrade-Considerations/Upgrading-to-OnBase-Version-Foundation-24.1 vulncheck.com: https://www.vulncheck.com/advisories/hyland-onbase-net-remoting-tcp-channel-unauthenticated-rce community.hyland.com: https://community.hyland.com/resources/bulletins-and-notices/210540-security-update-hyland-timer-service-bulletin-ob2025-02

Credits

Victor Morales of GM Sectec