Cyber Posture

CVE-2026-2039

Critical

Published: 20 February 2026

Published
20 February 2026
Modified
24 February 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0036 58.0th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

GFI Archiver MArc.Store Missing Authorization Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of GFI Archiver. Authentication is not required to exploit this vulnerability. The specific flaw exists within the configuration of the MArc.Store.Remoting.exe…

more

process, which listens on port 8018. The issue results from the lack of authorization prior to allowing access to functionality. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of SYSTEM. Was ZDI-CAN-28597.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly enforces approved authorizations for access to system resources, addressing the missing authorization checks in MArc.Store.Remoting.exe that allow unauthenticated access to functionality.

prevent

Requires identification and authentication for system services like the vulnerable remoting process, preventing exploitation without credentials.

prevent

Monitors and controls communications at system boundaries, blocking unauthorized remote access to TCP port 8018 used by the flawed service.

Security SummaryAI

CVE-2026-2039 is a missing authorization authentication bypass vulnerability in GFI Archiver, published on 2026-02-20. The flaw resides in the configuration of the MArc.Store.Remoting.exe process, which listens on TCP port 8018 and lacks proper authorization checks prior to granting access to functionality. No authentication is required to exploit this issue, earning it a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and mapping to CWE-862 (Missing Authorization).

Remote attackers can exploit this vulnerability over the network without user interaction or privileges. Exploitation bypasses authentication on affected GFI Archiver installations, providing unauthorized access to sensitive functionality. When chained with other vulnerabilities, attackers can leverage this to execute arbitrary code in the context of the SYSTEM user.

The Zero Day Initiative advisory ZDI-26-077, which originally tracked this as ZDI-CAN-28597, provides further technical details on the vulnerability. Security practitioners should review this reference for recommended mitigations.

Details

CWE(s)

Affected Products

gfi
archiver
15.10

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is a missing authorization in a network-listening process (TCP 8018) allowing remote unauthenticated access to sensitive functionality, directly enabling exploitation of a public-facing application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References