Hyland OnBase versions prior to 17.0.2.87 (other versions may be affected) are vulnerable to unauthenticated remote code execution via insecure deserialization on the .NET Remoting TCP channel. The service registers a listener on port 6031 with the URI endpoint TimerServer, implemented in Hyland.Core.Timers.dll. This endpoint deserializes untrusted input using the .NET BinaryFormatter, allowing attackers to execute arbitrary code under the context of NT AUTHORITY\SYSTEM.

Project Subscriptions

Vendors Products
Advisories
Source ID Title
EUVD EUVD EUVD-2025-24595 Hyland OnBase versions prior to 17.0.2.87 (other versions may be affected) are vulnerable to unauthenticated remote code execution via insecure deserialization on the .NET Remoting TCP channel. The service registers a listener on port 6031 with the URI endpoint TimerServer, implemented in Hyland.Core.Timers.dll. This endpoint deserializes untrusted input using the .NET BinaryFormatter, allowing attackers to execute arbitrary code under the context of NT AUTHORITY\SYSTEM.
Fixes

Solution

No solution given by the vendor.


Workaround

It is recommended that customers immediately convert to the in-servicing module, Unity Scheduler. Starting with OnBase 16, Unity Scheduler is the recommended replacement. It is recommended customers using versions prior to 16 upgrade to an in-servicing release of OnBase and leverage Unity Scheduler.

History

Fri, 13 Feb 2026 17:30:00 +0000


Wed, 19 Nov 2025 01:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:hyland:onbase:*:*:*:*:*:*:*:*

Tue, 04 Nov 2025 22:30:00 +0000


Tue, 04 Nov 2025 21:30:00 +0000

Type Values Removed Values Added
Title Hyland OnBase .NET Remoting TCP Channel Unauthenticated RCE Hyland OnBase < 17.0.2.87 .NET Remoting TCP Channel Unauthenticated RCE

Sat, 16 Aug 2025 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Hyland
Hyland onbase
Vendors & Products Hyland
Hyland onbase

Wed, 13 Aug 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 13 Aug 2025 17:00:00 +0000

Type Values Removed Values Added
Description Hyland OnBase versions prior to 17.0.2.87 (other versions may be affected) are vulnerable to unauthenticated remote code execution via insecure deserialization on the .NET Remoting TCP channel. The service registers a listener on port 6031 with the URI endpoint TimerServer, implemented in Hyland.Core.Timers.dll. This endpoint deserializes untrusted input using the .NET BinaryFormatter, allowing attackers to execute arbitrary code under the context of NT AUTHORITY\SYSTEM.
Title Hyland OnBase .NET Remoting TCP Channel Unauthenticated RCE
Weaknesses CWE-502
References
Metrics cvssV4_0

{'score': 10, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-02-13T17:11:47.942Z

Reserved: 2025-04-15T19:15:22.565Z

Link: CVE-2025-34153

cve-icon Vulnrichment

Updated: 2025-08-13T17:27:16.168Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-13T17:15:27.663

Modified: 2026-02-13T18:16:10.517

Link: CVE-2025-34153

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-08-16T21:41:33Z

Weaknesses