Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
8.8

GFI Archiver allows attackers to run unauthorized code on your server

CVE-2026-2037
Summary

If an attacker has access to your GFI Archiver system, they can potentially execute their own code, which could lead to unauthorized changes or data theft. This is a serious issue that requires immediate attention. To protect your system, update GFI Archiver with the latest security patches as soon as possible.

What to do

No fix is available yet. Check with your software vendor for updates.

Affected software
VendorProductAffected versionsFix available
gfi archiver 15.10 –
Original title
GFI Archiver MArc.Core Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GFI A...
Original description
GFI Archiver MArc.Core Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GFI Archiver. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.

The specific flaw exists within the configuration of the MArc.Core.Remoting.exe process, which listens on port 8017. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-27935.
nvd CVSS3.0 8.8
Vulnerability type
CWE-502 Deserialization of Untrusted Data
Published: 20 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026