CVE-2025-34153
Hyland OnBase < 17.0.2.87 .NET Remoting TCP Channel Unauthenticated RCE
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
Hyland OnBase versions prior to 17.0.2.87 (other versions may be affected) are vulnerable to unauthenticated remote code execution via insecure deserialization on the .NET Remoting TCP channel. The service registers a listener on port 6031 with the URI endpoint TimerServer, implemented in Hyland.Core.Timers.dll. This endpoint deserializes untrusted input using the .NET BinaryFormatter, allowing attackers to execute arbitrary code under the context of NT AUTHORITY\SYSTEM.
| CWE | CWE-502 |
| Vendor | hyland software |
| Product | onbase |
| Published | Aug 13, 2025 |
| Last Updated | Feb 26, 2026 |
Stay Ahead of the Next One
Get instant alerts for hyland software onbase
Be the first to know when new unknown vulnerabilities affecting hyland software onbase are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Hyland Software / OnBase
* < 17.0.2.87
References
gist.github.com: https://gist.github.com/VAMorales/32794cccc2195a935623a12ef32760dc hyland.com: https://www.hyland.com/en/internal/onbase-unity-client support.hyland.com: https://support.hyland.com/r/OnBase/WorkView/Foundation-24.1/WorkView/Installation/Upgrade-Considerations/Upgrading-to-OnBase-Version-Foundation-24.1 vulncheck.com: https://www.vulncheck.com/advisories/hyland-onbase-net-remoting-tcp-channel-unauthenticated-rce community.hyland.com: https://community.hyland.com/resources/bulletins-and-notices/210540-security-update-hyland-timer-service-bulletin-ob2025-02
Credits
Victor Morales of GM Sectec