Impact
The flaw in the MArc.Core.Remoting.exe process allows a remote attacker to access functions without first providing authentication credentials. Because the process listens on port 8017, an unauthenticated connection can be established from outside the local network. The vulnerability itself enables an attacker to bypass authentication; if combined with other weaknesses, the attacker may achieve SYSTEM‑level code execution. The primary impact therefore is the loss of authentication safeguards and the potential for complete compromise of the host running GFI Archiver.
Affected Systems
The affected product is GFI Archiver version 15.10, specifically the MArc.Core.Remoting.exe component that listens on TCP port 8017.
Risk and Exploitability
The CVSS score of 9.8 classifies this as a critical flaw, and although the EPSS score is less than 1 %, it indicates a non‑zero but low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. The attack vector is remote over the open port; based on the description, local exploitation is not explicitly documented but could be inferred if the service binds to localhost, and the bypass may be combined with other weaknesses to achieve SYSTEM‑level code execution.
OpenCVE Enrichment