Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 06 May 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:unisys:webperfect_image_suite:3.0.3960.22604:*:*:*:*:*:*:* cpe:2.3:a:unisys:webperfect_image_suite:3.0.3960.22810:*:*:*:*:*:*:* |
|
| Metrics |
cvssV3_1
|
Thu, 23 Apr 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 16 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 15 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Unisys
Unisys webperfect Image Suite |
|
| Vendors & Products |
Unisys
Unisys webperfect Image Suite |
Tue, 14 Apr 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Unisys WebPerfect Image Suite versions 3.0.3960.22810 and 3.0.3960.22604 expose a deprecated .NET Remoting TCP channel that allows remote unauthenticated attackers to leak NTLMv2 machine-account hashes by supplying a Windows UNC path as a target file argument through object-unmarshalling techniques. Attackers can capture the leaked NTLMv2 hash and relay it to other hosts to achieve privilege escalation or lateral movement depending on network configuration and patch level. | |
| Title | Unisys WebPerfect Image Suite 3.0 NTLMv2 Hash Leakage via .NET Remoting | |
| Weaknesses | CWE-441 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-14T16:06:18.439Z
Reserved: 2026-04-07T20:57:06.209Z
Link: CVE-2026-39906
Updated: 2026-04-16T13:50:48.894Z
Status : Analyzed
Published: 2026-04-14T22:16:32.160
Modified: 2026-05-06T14:38:44.533
Link: CVE-2026-39906
No data.
OpenCVE Enrichment
Updated: 2026-04-15T14:53:55Z