


Perceptive Security
SOC/SIEM Consultancy

Kofax Capture, now referred to as Tungsten Capture, version 6.0.0.0 (other versions may be affected) exposes a deprecated .NET Remoting HTTP channel on port 242…
Published:
22 April 2026 at 22:00:00
Alert date:
23 April 2026 at 17:04:31
Source:
nvd.nist.gov
Enterprise Applications
Kofax Capture (Tungsten Capture) version 6.0.0.0 exposes an unauthenticated .NET Remoting HTTP channel on port 2424 through the Ascent Capture Service. The vulnerability uses a deprecated remoting channel with a publicly known endpoint identifier. Remote unauthenticated attackers can exploit .NET Remoting object unmarshalling to instantiate System.Net.WebClient objects. This enables arbitrary file read/write operations on the server filesystem. Attackers can coerce NTLMv2 authentication to attacker-controlled hosts for credential disclosure. The vulnerability can lead to denial of service, remote code execution, or lateral movement depending on service privileges.
Technical details
Mitigation steps:
Affected products:
Kofax Capture
Tungsten Capture
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-23751
https://docshield.tungstenautomation.com/Portal/Products/en_US/KC/11.1.0-40hy9nfk91/KC.htm
https://gist.github.com/VAMorales/3888941d6e5efdd4b2e673e999f68ca2
https://www.vulncheck.com/advisories/kofax-capture-unauthenticated-file-read-write-smb-coercion-via-net-remoting
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
