CVE-2026-26222
Published: 24 February 2026
Description
Altec DocLink (now maintained by Beyond Limits Inc.) version 4.0.336.0 exposes insecure .NET Remoting endpoints over TCP and HTTP/SOAP via Altec.RDCHostService.exe using the ObjectURI "doclinkServer.soap". The service does not require authentication and is vulnerable to unsafe object unmarshalling, allowing remote…
more
attackers to read arbitrary files from the underlying system by specifying local file paths. Additionally, attackers can coerce SMB authentication via UNC paths and write arbitrary files to server locations. Because writable paths may be web-accessible under IIS, this can result in unauthenticated remote code execution or denial of service through file overwrite.
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the unsafe object unmarshalling vulnerability (CWE-502) and lack of authentication in Altec.RDCHostService.exe by identifying, reporting, and applying vendor patches.
Monitors and controls communications at system boundaries to restrict network access to the exposed unauthenticated .NET Remoting endpoints over TCP and HTTP/SOAP.
Validates untrusted inputs to the remoting service to mitigate unsafe deserialization payloads that enable arbitrary file read/write and SSRF (CWE-918).
Security SummaryAI
CVE-2026-26222 affects Altec DocLink version 4.0.336.0, now maintained by Beyond Limits Inc., where the component Altec.RDCHostService.exe exposes insecure .NET Remoting endpoints over TCP and HTTP/SOAP using the ObjectURI "doclinkServer.soap". These endpoints operate without authentication and are vulnerable to unsafe object unmarshalling, associated with CWE-502 (Deserialization of Untrusted Data) and CWE-918 (Server-Side Request Forgery). The vulnerability enables remote file read and write operations on the underlying system.
Unauthenticated remote attackers can exploit this vulnerability over the network with low complexity, as indicated by its CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Attackers can read arbitrary files by specifying local file paths and coerce SMB authentication using UNC paths. They can also write arbitrary files to server locations, potentially leading to remote code execution or denial of service if writable paths are web-accessible under IIS configurations.
Advisories provide further details on the issue, including at https://www.vulncheck.com/advisories/doclink-net-remoting-unauthenticated-arbitrary-file-read-write-rce and https://doclinkai.com/. Security practitioners should consult these for recommended mitigations, such as restricting network access to the affected endpoints or applying any available patches from the vendor.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is an unauthenticated remote exploitation of a public-facing .NET Remoting service (T1190), directly enabling arbitrary file reads from the local system (T1005) and SMB authentication coercion via UNC paths (T1187).