CVE-2026-2039
Published: 20 February 2026
Description
GFI Archiver MArc.Store Missing Authorization Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of GFI Archiver. Authentication is not required to exploit this vulnerability. The specific flaw exists within the configuration of the MArc.Store.Remoting.exe…
more
process, which listens on port 8018. The issue results from the lack of authorization prior to allowing access to functionality. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of SYSTEM. Was ZDI-CAN-28597.
Mitigating Controls (NIST 800-53 r5)AI
Directly enforces approved authorizations for access to system resources, addressing the missing authorization checks in MArc.Store.Remoting.exe that allow unauthenticated access to functionality.
Requires identification and authentication for system services like the vulnerable remoting process, preventing exploitation without credentials.
Monitors and controls communications at system boundaries, blocking unauthorized remote access to TCP port 8018 used by the flawed service.
Security SummaryAI
CVE-2026-2039 is a missing authorization authentication bypass vulnerability in GFI Archiver, published on 2026-02-20. The flaw resides in the configuration of the MArc.Store.Remoting.exe process, which listens on TCP port 8018 and lacks proper authorization checks prior to granting access to functionality. No authentication is required to exploit this issue, earning it a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and mapping to CWE-862 (Missing Authorization).
Remote attackers can exploit this vulnerability over the network without user interaction or privileges. Exploitation bypasses authentication on affected GFI Archiver installations, providing unauthorized access to sensitive functionality. When chained with other vulnerabilities, attackers can leverage this to execute arbitrary code in the context of the SYSTEM user.
The Zero Day Initiative advisory ZDI-26-077, which originally tracked this as ZDI-CAN-28597, provides further technical details on the vulnerability. Security practitioners should review this reference for recommended mitigations.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is a missing authorization in a network-listening process (TCP 8018) allowing remote unauthenticated access to sensitive functionality, directly enabling exploitation of a public-facing application.