Vulnerability Description
Unisys WebPerfect Image Suite versions 3.0.3960.22810 and 3.0.3960.22604 expose a deprecated .NET Remoting TCP channel that allows remote unauthenticated attackers to leak NTLMv2 machine-account hashes by supplying a Windows UNC path as a target file argument through object-unmarshalling techniques. Attackers can capture the leaked NTLMv2 hash and relay it to other hosts to achieve privilege escalation or lateral movement depending on network configuration and patch level.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Unisys | Webperfect Image Suite | 3.0.3960.22604 |
Related Weaknesses (CWE)
References
- https://gist.github.com/VAMorales/be3e4ed472c51794493c1256cce16129ExploitThird Party Advisory
- https://www.unisys.com/solutions/cai/applications/Product
- https://www.vulncheck.com/advisories/unisys-webperfect-image-suite-ntlmv2-hash-lThird Party Advisory
FAQ
What is CVE-2026-39906?
CVE-2026-39906 is a vulnerability with a CVSS score of 10.0 (CRITICAL). Unisys WebPerfect Image Suite versions 3.0.3960.22810 and 3.0.3960.22604 expose a deprecated .NET Remoting TCP channel that allows remote unauthenticated attackers to leak NTLMv2 machine-account hashe...
How severe is CVE-2026-39906?
CVE-2026-39906 has been rated CRITICAL with a CVSS base score of 10.0/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-39906?
Check the references section above for vendor advisories and patch information. Affected products include: Unisys Webperfect Image Suite.