Grim Remoting: The Ghost of .NET Past Haunts Hyland OnBase
Vulnerability ID: CVE-2026-26221
CVSS Score: 10.0
Published: 2026-02-13
In the world of enterprise software, nothing ever truly dies; it just becomes a legacy service running with SYSTEM privileges. CVE-2026-26221 is a catastrophic, unauthenticated Remote Code Execution vulnerability in Hyland OnBase's Workflow Timer Service. By leveraging the ancient and insecure .NET Remoting protocol, attackers can turn a helper service into a full-blown command center, executing arbitrary code via insecure deserialization. Itβs a classic case of 2005-era architecture meeting modern exploitation tools, resulting in a CVSS 10.0 nightmare.
TL;DR
Unauthenticated RCE in Hyland OnBase Workflow Timer Service via TCP port 8900. The service uses insecure .NET Remoting with BinaryFormatter. Attackers can send a crafted payload to execute code as NT AUTHORITY\SYSTEM. Fix: Uninstall the legacy service and migrate to Unity Scheduler.
β οΈ Exploit Status: POC
Technical Details
- CWE ID: CWE-502 (Deserialization of Untrusted Data)
- CVSS v4.0: 10.0 (Critical)
- Attack Vector: Network (TCP/8900)
- Authentication: None Required
- Privileges: NT AUTHORITY\SYSTEM
- Exploit Reliability: High (Stable)
Affected Systems
- Hyland OnBase Workflow Timer Service (v8.0 - v17.0.x)
- Hyland OnBase Workview Timer Service (Legacy versions)
-
OnBase Workflow Timer Service: 8.0 - 17.0.x (Fixed in:
N/A (Migrate to Unity Scheduler))
Exploit Details
- GitHub: Full PoC leveraging ysoserial.net to achieve RCE on the Timer Service.
Mitigation Strategies
- Uninstall Legacy Service
- Network Segmentation
- Migrate to Unity Scheduler
Remediation Steps:
- Identify servers running 'Hyland OnBase Workflow Timer Service'.
- Verify if the Unity Scheduler component is installed and configured.
- Stop and disable the legacy Workflow Timer Service.
- Uninstall the legacy component via 'Add/Remove Programs' or the Hyland installer.
- Block TCP port 8900 at the network perimeter and host firewall.
References
Read the full report for CVE-2026-26221 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)