Platform
dotnet
Component
rightfax
Fixed in
16.6.1
20.2.1
21.2.2
22.2.1
26.4.1
24.4.1
25.4.1
CVE-2025-15610 identifies a security vulnerability within OpenText RightFax, specifically related to its use of the .NET Remoting framework. This framework contains known vulnerabilities that could be exploited by attackers if the RightFax service is exposed in environments where the remoting ports are accessible. The vulnerability impacts RightFax versions 16.6 through 26.4.0.1644, and a fix is available in version 26.4.1.
The core of the vulnerability lies in the insecure configuration and potential exposure of .NET Remoting ports within RightFax. Successful exploitation could allow an attacker to gain unauthorized access to the RightFax server and potentially compromise sensitive data, including fax documents, user credentials, and system configurations. Depending on the attacker's privileges and the network architecture, lateral movement to other systems within the network could also be possible. The blast radius extends to any system accessible through the exposed .NET Remoting ports, making proper network segmentation and firewall rules crucial.
Currently, there is no publicly available proof-of-concept (POC) code for CVE-2025-15610. The vulnerability is not listed on the CISA KEV catalog. Given the reliance on .NET Remoting, which has historically been a target for exploitation, and the potential for remote code execution, the probability of exploitation is considered medium. Monitor security advisories and threat intelligence feeds for any signs of active exploitation campaigns.
Exploit Status
EPSS
0.05% (17% percentile)
CISA SSVC
The primary mitigation for CVE-2025-15610 is to upgrade RightFax to version 26.4.1 or later, which includes the necessary security patches. If immediate upgrading is not feasible, consider implementing temporary workarounds such as restricting access to the .NET Remoting ports via a firewall or Web Application Firewall (WAF). Ensure that only authorized clients are allowed to connect to these ports. Review and harden the RightFax server configuration to minimize the attack surface. After upgrading, confirm the fix by attempting to connect to the .NET Remoting ports from an unauthorized client and verifying that the connection is denied.
Update RightFax to version 26.4.1 or later to mitigate vulnerabilities in the .NET Remoting framework. Refer to the OpenText documentation for detailed instructions on the update process. Ensure that remoting ports are not exposed to public networks.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2025-15610 affects RightFax versions 16.6 through 26.4.0.1644, stemming from insecure .NET Remoting. Exploitation is possible if remoting ports are exposed, potentially leading to unauthorized access.
If you are running RightFax versions 16.6 through 26.4.0.1644 and the .NET Remoting ports are accessible, you are potentially affected. Upgrade to 26.4.1 to mitigate.
Upgrade RightFax to version 26.4.1 or later. As a temporary workaround, restrict access to the .NET Remoting ports using a firewall or WAF.
Currently, there are no confirmed reports of active exploitation, but the potential for exploitation exists given the nature of the vulnerability.
Refer to the OpenText security advisory for CVE-2025-15610 on the OpenText support website.
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.
Upload your packages.lock.json file and we'll tell you instantly if you're affected.