top of page
perceptive_background_267k.jpg

Kofax Capture, now referred to as Tungsten Capture, version 6.0.0.0 (other versions may be affected) exposes a deprecated .NET Remoting HTTP channel on port 242…

Published:

22 April 2026 at 22:00:00

Alert date:

23 April 2026 at 17:04:31

Source:

nvd.nist.gov

Click to open the original link from this advisory

Enterprise Applications

Kofax Capture (Tungsten Capture) version 6.0.0.0 exposes an unauthenticated .NET Remoting HTTP channel on port 2424 through the Ascent Capture Service. The vulnerability uses a deprecated remoting channel with a publicly known endpoint identifier. Remote unauthenticated attackers can exploit .NET Remoting object unmarshalling to instantiate System.Net.WebClient objects. This enables arbitrary file read/write operations on the server filesystem. Attackers can coerce NTLMv2 authentication to attacker-controlled hosts for credential disclosure. The vulnerability can lead to denial of service, remote code execution, or lateral movement depending on service privileges.

Technical details

Mitigation steps:

Affected products:

Kofax Capture
Tungsten Capture

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page