The IntelliSpace portal application utilizes .NET Remoting for its functionality. The vulnerability arises from the exploitation of port 755 through the "Object Marshalling" technique, which allows an attacker to read internal files without any authentication. This is possible by crafting specific .NET Remoting URLs derived from information enumerated in the client-side configuration files. This issue affects IntelliSpace Portal: 12 and prior.
History

Thu, 10 Apr 2025 16:00:00 +0000


Mon, 07 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 07 Apr 2025 15:45:00 +0000

Type Values Removed Values Added
Description The IntelliSpace portal application utilizes .NET Remoting for its functionality. The vulnerability arises from the exploitation of port 755 through the "Object Marshalling" technique, which allows an attacker to read internal files without any authentication. This is possible by crafting specific .NET Remoting URLs derived from information enumerated in the client-side configuration files. This issue affects IntelliSpace Portal: 12 and prior.
Title 3.2.1 Arbitrary File Read in insecure .NET Remoting TCP Channel
Weaknesses CWE-22
References
Metrics cvssV4_0

{'score': 7.7, 'vector': 'CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/S:P/AU:Y/R:U/V:C/RE:M/U:Green'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Philips

Published:

Updated: 2025-04-10T15:42:10.381Z

Reserved: 2025-04-07T15:05:10.307Z

Link: CVE-2025-3424

cve-icon Vulnrichment

Updated: 2025-04-07T16:11:39.941Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-04-07T16:15:27.703

Modified: 2025-04-10T16:15:29.207

Link: CVE-2025-3424

cve-icon Redhat

No data.