Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
8.8
GFI Archiver: Untrusted Data Can Run Malicious Code Remotely
CVE-2026-2036
Summary
A vulnerability in GFI Archiver allows attackers to execute malicious code on affected systems, even if they're already authenticated. This is a serious issue because it could allow an attacker to gain full control of the system. To protect your system, update GFI Archiver to the latest version as soon as possible.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| gfi | archiver | 15.10 | – |
Original title
GFI Archiver MArc.Store Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GFI ...
Original description
GFI Archiver MArc.Store Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GFI Archiver. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.
The specific flaw exists within the configuration of the MArc.Store.Remoting.exe process. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-27936.
The specific flaw exists within the configuration of the MArc.Store.Remoting.exe process. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-27936.
nvd CVSS3.0
8.8
Vulnerability type
CWE-502
Deserialization of Untrusted Data
- https://www.zerodayinitiative.com/advisories/ZDI-26-076/ Third Party Advisory
Published: 20 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026