Advisories

Entrust Instant Financial Issuance (IFI) Unauthenticated .NET Remoting Exposure

Go Back
severity
critical
date
Affecting
  • IFI 5.x

  • IFI < 6.10.5

  • IFI < 6.11.1

CWE
  • CWE-306 Missing Authentication for Critical Function
  • CWE-502 Deserialization of Untrusted Data
CVSS
9.3
CVSS V4 Vector
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Credit
Victor A. Morales of GM Sectec, Corp.
Description
Entrust Instant Financial Issuance (IFI) On Premise software (formerly referred to as CardWizard) versions 5.x, prior to 6.10.5, and prior to 6.11.1 contain an insecure .NET Remoting exposure in the Legacy Remoting Service that is enabled by default. The service registers a TCP remoting channel with SOAP and binary formatters configured at TypeFilterLevel=Full and exposes default ObjectURI endpoints. A remote, unauthenticated attacker who can reach the remoting port can invoke the exposed remoting objects to read arbitrary files from the server and coerce outbound authentication, and may achieve arbitrary file write and remote code execution via known .NET Remoting exploitation techniques. This can lead to disclosure of sensitive installation and service-account data and compromise of the affected host.