Critical Kofax Capture RCE Vulnerability: Unauthenticated Access to Files and NTLMv2 Coercion
The National Vulnerability Database has detailed CVE-2026-23751, a critical vulnerability in Kofax Capture, now known as Tungsten Capture, version 6.0.0.0. This flaw exposes a deprecated .NET Remoting HTTP channel on port 2424 via the Ascent Capture Service. Crucially, this service is accessible without authentication and leverages a publicly known default endpoint identifier.
An unauthenticated remote attacker can exploit .NET Remoting object unmarshalling. This allows for the instantiation of a remote System.Net.WebClient object, enabling attackers to read arbitrary files, write attacker-controlled files to the server, or coerce NTLMv2 authentication to an attacker-controlled host. The National Vulnerability Database assigns this a CVSS score of 9.8 (Critical), highlighting the severe implications.
This vulnerability presents a clear path to sensitive credential disclosure, denial of service, remote code execution, or lateral movement. The ultimate impact hinges on the privileges of the service account and the specific network environment. This isn’t just a theoretical risk; it’s a direct route to significant compromise if left unaddressed.
What This Means For You
- If your organization uses Kofax Capture (Tungsten Capture), immediately identify all instances running version 6.0.0.0 or potentially other affected versions. Prioritize patching or implementing network segmentation to block access to port 2424 on the Ascent Capture Service. Audit logs for any suspicious activity on this port, focusing on file access or authentication attempts to external hosts.
Related ATT&CK Techniques
🛡️ Detection Rules
4 rules · 6 SIEM formats4 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-23751 - Kofax Capture Unauthenticated .NET Remoting Access
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-23751 | Information Disclosure | Kofax Capture (Tungsten Capture) version 6.0.0.0, Ascent Capture Service, .NET Remoting HTTP channel on port 2424, unauthenticated access, arbitrary file read |
| CVE-2026-23751 | Remote Code Execution | Kofax Capture (Tungsten Capture) version 6.0.0.0, Ascent Capture Service, .NET Remoting HTTP channel on port 2424, unauthenticated access, arbitrary file write |
| CVE-2026-23751 | Auth Bypass | Kofax Capture (Tungsten Capture) version 6.0.0.0, Ascent Capture Service, .NET Remoting HTTP channel on port 2424, unauthenticated access, NTLMv2 authentication coercion |
| CVE-2026-23751 | DoS | Kofax Capture (Tungsten Capture) version 6.0.0.0, Ascent Capture Service, .NET Remoting HTTP channel on port 2424, unauthenticated access |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 23, 2026 at 19:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.