CVE-2026-26333

9.8 CRITICAL

📋 TL;DR

Calero VeraSMART versions before 2022 R1 expose an unauthenticated .NET Remoting service on port 8001, allowing remote attackers to read/write arbitrary files and potentially achieve remote code execution via ViewState manipulation. This affects organizations using vulnerable VeraSMART installations, particularly those with internet-facing instances.

💻 Affected Systems

Products:
  • Calero VeraSMART
Versions: All versions prior to 2022 R1
Operating Systems: Windows Server (IIS-based deployments)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerable in default configuration when VeraSMART is installed with .NET Remoting services enabled on port 8001.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution on the IIS server, complete compromise of the VeraSMART application and underlying system, credential theft via NTLMv2 hash capture, and lateral movement within the network.

🟠

Likely Case

Unauthenticated attackers reading sensitive configuration files (web.config) containing machine keys, potentially leading to ViewState-based RCE or credential theft via SMB relay attacks.

🟢

If Mitigated

Limited to internal network access only, reducing exposure to trusted users; proper network segmentation and authentication controls would prevent exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires understanding of .NET Remoting, SOAP/binary formatters, and ASP.NET ViewState manipulation, but tools may exist in underground communities.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2022 R1 or later

Vendor Advisory: https://www.calero.com/

Restart Required: No

Instructions:

1. Upgrade VeraSMART to version 2022 R1 or later. 2. Verify the .NET Remoting service on port 8001 is no longer exposed or properly secured. 3. Review and update IIS machine keys if compromised.

🔧 Temporary Workarounds

Block Port 8001

Windows

Block inbound and outbound traffic to TCP port 8001 at the network firewall or host firewall to prevent remote access to the vulnerable service.

netsh advfirewall firewall add rule name="Block_VeraSMART_8001" dir=in action=block protocol=TCP localport=8001
netsh advfirewall firewall add rule name="Block_VeraSMART_8001_Out" dir=out action=block protocol=TCP remoteport=8001

Disable .NET Remoting Service

Windows

Disable the vulnerable .NET Remoting HTTP service in VeraSMART configuration or Windows Services if not required for functionality.

sc stop "VeraSMART_Remoting_Service"
sc config "VeraSMART_Remoting_Service" start= disabled

🧯 If You Can't Patch

  • Isolate the VeraSMART server in a restricted network segment with no internet access and minimal internal access.
  • Implement strict network access controls (firewall rules) to allow only trusted IPs to port 8001, and monitor for unauthorized access attempts.

🔍 How to Verify

Check if Vulnerable:

Check if TCP port 8001 is listening on the VeraSMART server and accessible remotely; test with a network scanner or attempt to connect to EndeavorServer.rem or RemoteFileReceiver.rem endpoints.

Check Version:

Check VeraSMART application version via its administrative interface or installed programs list in Windows.

Verify Fix Applied:

After patching, verify port 8001 is no longer accessible or the service responds with authentication requirements; check VeraSMART version is 2022 R1 or later.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access to port 8001 in firewall or IIS logs
  • Failed or successful connections to EndeavorServer.rem or RemoteFileReceiver.rem
  • Unexpected file read/write operations in system or application logs

Network Indicators:

  • Inbound traffic to TCP port 8001 from untrusted sources
  • Outbound SMB connections from the VeraSMART server to external IPs
  • Anomalous SOAP or binary data over port 8001

SIEM Query:

source="firewall" dest_port=8001 AND action=allow | stats count by src_ip

🔗 References

📤 Share & Export