Cyber Posture

CVE-2026-39906

CriticalPublic PoCUpdated

Published: 14 April 2026

Published
14 April 2026
Modified
06 May 2026
KEV Added
Patch
CVSS Score 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0022 44.1th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-39906 is a critical-severity Confused Deputy (CWE-441) vulnerability in Unisys Webperfect Image Suite. Its CVSS base score is 10.0 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 44.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-441

Mitigates confused deputy risks by ensuring distinct privilege domains so one partition cannot unintentionally act on behalf of another.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1187 Forced Authentication Credential Access
Adversaries may gather credential material by invoking or forcing a user to automatically provide authentication information through a mechanism in which they can intercept.
Why these techniques?

The exposed .NET Remoting channel enables remote unauthenticated exploitation of a public-facing application (T1190). Supplying a UNC path directly forces NTLM authentication to an attacker server (T1187), enabling hash capture and relay.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Unisys WebPerfect Image Suite versions 3.0.3960.22810 and 3.0.3960.22604 expose a deprecated .NET Remoting TCP channel that allows remote unauthenticated attackers to leak NTLMv2 machine-account hashes by supplying a Windows UNC path as a target file argument through object-unmarshalling techniques. Attackers…

more

can capture the leaked NTLMv2 hash and relay it to other hosts to achieve privilege escalation or lateral movement depending on network configuration and patch level.

Deeper analysisAI

Automated synthesis unavailable for this CVE.

Details

CWE(s)

Affected Products

unisys
webperfect image suite
3.0.3960.22604, 3.0.3960.22810

CVEs Like This One

CVE-2026-39907Same product: Unisys Webperfect Image Suite
CVE-2025-48579Shared CWE-441
CVE-2025-48646Shared CWE-441
CVE-2026-33768Shared CWE-441
CVE-2025-62718Shared CWE-441
CVE-2026-0107Shared CWE-441
CVE-2026-0021Shared CWE-441
CVE-2023-31313Shared CWE-441
CVE-2026-23751Shared CWE-441
CVE-2026-24470Shared CWE-441

References