No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 16 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 15 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Unisys
Unisys webperfect Image Suite |
|
| Vendors & Products |
Unisys
Unisys webperfect Image Suite |
Tue, 14 Apr 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Unisys WebPerfect Image Suite versions 3.0.3960.22810 and 3.0.3960.22604 expose a deprecated .NET Remoting TCP channel that allows remote unauthenticated attackers to leak NTLMv2 machine-account hashes by supplying a Windows UNC path as a target file argument through object-unmarshalling techniques. Attackers can capture the leaked NTLMv2 hash and relay it to other hosts to achieve privilege escalation or lateral movement depending on network configuration and patch level. | |
| Title | Unisys WebPerfect Image Suite 3.0 NTLMv2 Hash Leakage via .NET Remoting | |
| Weaknesses | CWE-441 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-16T13:50:58.130Z
Reserved: 2026-04-07T20:57:06.209Z
Link: CVE-2026-39906
Updated: 2026-04-16T13:50:48.894Z
Status : Received
Published: 2026-04-14T22:16:32.160
Modified: 2026-04-14T22:16:32.160
Link: CVE-2026-39906
No data.
OpenCVE Enrichment
Updated: 2026-04-15T14:53:55Z