Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

770+ Articles
120+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. Kofax Capture Unauthenticated RCE via Exposed .NET Remoting Channel (CVE-2026-23751)
Kofax Capture Unauthenticated RCE via Exposed .NET Remoting Channel (CVE-2026-23751)

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2026-23751

Kofax Capture Unauthenticated RCE via Exposed .NET Remoting Channel (CVE-2026-23751)

A critical unauthenticated RCE vulnerability in Kofax Capture (Tungsten Capture) exposes a deprecated .NET Remoting HTTP channel on port 2424 with no authentication and a publicly known endpoint identifier, enabling full remote takeover.

Dylan H.

Security Team

April 24, 2026
6 min read

Affected Products

  • Kofax Capture / Tungsten Capture 6.0.0.0 (other versions may be affected)

Executive Summary

A critical unauthenticated remote code execution vulnerability (CVE-2026-23751) has been disclosed in Kofax Capture, now rebranded as Tungsten Capture by Tungsten Automation. The vulnerability carries a CVSS score of 9.8 and affects at minimum version 6.0.0.0, with other versions potentially impacted.

The root cause is the exposure of a deprecated .NET Remoting HTTP channel on port 2424 via the Ascent Capture Service. This channel is accessible without authentication and uses a default, publicly known endpoint identifier. An unauthenticated remote attacker can connect to this channel and execute arbitrary code on the server, gaining full control of systems running the Ascent Capture Service.

Organizations running Kofax/Tungsten Capture should immediately restrict access to port 2424 and apply available vendor patches or mitigations.


Vulnerability Overview

AttributeValue
CVE IDCVE-2026-23751
CVSS Score9.8 (Critical)
CWECWE-287 — Improper Authentication / CWE-749 — Exposed Dangerous Method
TypeUnauthenticated Remote Code Execution
Attack VectorNetwork
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
Exposed Port2424/TCP
Patch AvailableConsult vendor advisory

Affected Versions

ProductAffected VersionsNotes
Kofax Capture6.0.0.0Other versions may be affected
Tungsten Capture6.0.0.0Rebranded name for same product
Ascent Capture ServiceIncluded in aboveService that exposes the channel

Technical Analysis

Root Cause

The Ascent Capture Service component of Kofax/Tungsten Capture exposes a legacy .NET Remoting HTTP channel on TCP port 2424. .NET Remoting is a deprecated Microsoft framework superseded by WCF and gRPC. The channel:

  1. Requires no authentication to connect
  2. Uses a default, publicly documented endpoint identifier rather than a custom or secret endpoint
  3. Allows arbitrary remote method invocation on registered objects

The combination of no authentication, known endpoint, and the inherent code execution risks of unauthenticated .NET Remoting method invocation allows any network-accessible attacker to execute arbitrary code in the context of the Ascent Capture Service process.

.NET Remoting Attack Surface

.NET Remoting channels expose registered server-side objects for remote method invocation. With no authentication requirement and a known endpoint, an attacker can:

  • Instantiate remote objects
  • Invoke methods on those objects
  • Supply attacker-controlled parameters including serialized objects
  • Trigger code execution via method invocation or object deserialization

Attack Flow

1. Attacker scans for TCP port 2424 on reachable hosts
2. Identifies systems running Kofax/Tungsten Capture Ascent Capture Service
3. Connects to the .NET Remoting HTTP channel using the known default endpoint
4. No credentials required — channel accepts unauthenticated connections
5. Attacker invokes methods on remote objects or sends crafted serialized payloads
6. Code executes in the context of the Ascent Capture Service process
7. Attacker achieves full system compromise with service account permissions

Exploitation Conditions

  • Kofax/Tungsten Capture 6.0.0.0 (possibly other versions) must be installed and running
  • The Ascent Capture Service must be active
  • TCP port 2424 must be reachable from the attacker's network position
  • No credentials or prior authentication needed

Impact Assessment

Impact AreaDescription
Unauthenticated RCEFull code execution with no credentials required
Document Capture DataAccess to scanned documents, OCR output, forms data, and metadata
Credential TheftAccess to service account credentials and environment-stored secrets
Lateral MovementService account permissions can enable further network access
Persistent AccessAttacker can install backdoors within the service context
Regulatory ExposureDocument capture systems often handle regulated data (healthcare, finance, legal)
Business DisruptionService manipulation or shutdown impacts document processing workflows

Immediate Remediation

Step 1: Block Port 2424 at the Firewall

As an immediate mitigation, restrict access to TCP port 2424 to only required internal systems:

# Linux/iptables — block external access to port 2424
iptables -I INPUT -p tcp --dport 2424 -j DROP
iptables -I INPUT -p tcp --dport 2424 -s 10.0.0.0/8 -j ACCEPT
 
# Windows Firewall — block inbound on port 2424 except trusted hosts
netsh advfirewall firewall add rule name="Block Kofax 2424" protocol=TCP dir=in localport=2424 action=block

Step 2: Disable the Ascent Capture Service if Not Required

# Windows — stop and disable the service if not actively in use
sc stop "AscentCaptureService"
sc config "AscentCaptureService" start= disabled
 
# Verify
sc query "AscentCaptureService"

Step 3: Apply Vendor Patch

Consult the Tungsten Automation security advisories and apply the latest available patch for Kofax/Tungsten Capture. If no patch is yet available, maintain the firewall restriction as a compensating control.

Step 4: Audit for Prior Compromise

# Review Ascent Capture Service process for unusual child processes
Get-WmiObject Win32_Process | Where-Object { $_.ParentProcessId -eq (Get-Process "AscentCaptureService" -ErrorAction SilentlyContinue).Id }
 
# Check for unexpected scheduled tasks or service modifications
Get-ScheduledTask | Where-Object { $_.Date -gt (Get-Date).AddDays(-30) }
Get-Service | Where-Object { $_.StartType -eq "Automatic" } | Sort-Object Name

Detection Indicators

IndicatorDescription
Inbound connections to TCP/2424 from unexpected sourcesExploitation or scanning in progress
Unusual processes spawned by AscentCaptureServicePost-exploitation activity
New scheduled tasks or services created recentlyPersistence installation
Outbound connections from AscentCaptureService to external IPsC2 communication or exfiltration
Service account used for unusual network activityLateral movement attempt

Post-Remediation Checklist

  1. Block TCP port 2424 from all non-essential network segments immediately
  2. Apply available vendor patches for Kofax/Tungsten Capture
  3. Disable the Ascent Capture Service if not operationally required
  4. Audit running services and processes for evidence of compromise
  5. Review recent logs for unexpected connections to port 2424
  6. Rotate credentials for the Ascent Capture Service account
  7. Scan affected systems for persistence mechanisms
  8. Assess whether other versions of the product are also affected
  9. Monitor port 2424 for continued access attempts after mitigation

References

  • NVD — CVE-2026-23751
  • Tungsten Automation (formerly Kofax)
  • Microsoft .NET Remoting Overview (deprecated)
  • CISA Known Exploited Vulnerabilities Catalog
#CVE-2026-23751#Kofax Capture#Tungsten Capture#RCE#.NET Remoting#Unauthenticated#Enterprise Software

Related Articles

CVE-2026-6057: FalkorDB Browser Unauthenticated Path Traversal RCE

FalkorDB Browser 1.9.3 contains a critical unauthenticated path traversal vulnerability in its file upload API that allows remote attackers to write...

6 min read

CVE-2025-54068: Laravel Livewire Code Injection Vulnerability

A critical code injection vulnerability in Laravel Livewire v3 allows unauthenticated remote attackers to execute arbitrary commands. Over 130,000...

7 min read

CVE-2025-32432: Craft CMS Code Injection Vulnerability

A critical code injection vulnerability in Craft CMS allows unauthenticated remote attackers to execute arbitrary code on affected servers. Added to...

6 min read
Back to all Security Alerts