Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes
HomeCVEs

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeCVEsCVE-2026-26221

CVE-2026-26221

Published: March 11, 2026
Last updated:6 hours ago (March 11, 2026)
Exploit: YesZero-day: NoPatch: NoTrend: Neutral
TL;DR
Updated March 11, 2026

CVE-2026-26221 is a low severity vulnerability with a CVSS score of 0.0. Active exploits exist with no official patch available - immediate mitigation is required.

Key Points
  • 1Low severity (CVSS 0.0/10)
  • 2EPSS: 1.00% - moderate likelihood of exploitation
  • 3Public exploits are available
  • 4No official patches released yet
Severity Scores
CVSS v30.0
CVSS v20.0
Priority Score0.0
EPSS Score1.0
None
Exploitation LikelihoodLow
1.00%EPSS

Lower probability of exploitation

Patch during regular maintenance
1.00%
EPSS
0.0
CVSS
Yes
Exploit
No
Patch
High Priority
exploit exists • no patch

EPSS predicts the probability of exploitation in the next 30 days based on real-world threat data, complementing CVSS severity scores with actual risk assessment.

Description

Hyland OnBase contains an unauthenticated .NET Remoting exposure in the OnBase Workflow Timer Service (Hyland.Core.Workflow.NTService.exe). An attacker who can reach the service can send crafted .NET Remoting requests to default HTTP channel endpoints on TCP/8900 (e.g., TimerServiceAPI.rem and TimerServiceEvents.rem for Workflow) to trigger unsafe object unmarshalling, enabling arbitrary file read/write. By writing attacker-controlled content into web-accessible locations or chaining with other OnBase features, this can lead to remote code execution. The same primitive can be abused by supplying a UNC path to coerce outbound NTLM authentication (SMB coercion) to an attacker-controlled host.

CVSS v3 Breakdown
Attack Vector:-
Attack Complexity:-
Privileges Required:-
User Interaction:-
Scope:-
Confidentiality:-
Integrity:-
Availability:-
Exploit References
GitHub
Trend Analysis
Neutral
Advisories
GitHub AdvisoryNVD
Cite This Page
APA Format
Strobes VI. (2026). CVE-2026-26221 - CVE Details and Analysis. Strobes VI. Retrieved March 11, 2026, from https://vi.strobes.co/cve/CVE-2026-26221
Quick copy link + title

Please cite this page when referencing data from Strobes VI. Proper attribution helps support our vulnerability intelligence research.