CVE-2024-1006: CWE-287 Improper Authentication in Shanxi Diankeyun Technology NODERP
A vulnerability was found in Shanxi Diankeyun Technology NODERP up to 6.0.2 and classified as critical. This issue affects some unknown processing of the file application/index/common.php of the component Cookie Handler. The manipulation of the argument Nod_User_Id/Nod_User_Token leads to improper authentication. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252275. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2024-1006 is a critical vulnerability identified in Shanxi Diankeyun Technology's NODERP product versions up to 6.0.2. The vulnerability is categorized under CWE-287, which relates to improper authentication mechanisms. Specifically, the flaw exists in the handling of the Cookie Handler component within the file application/index/common.php. The vulnerability arises from improper processing and validation of the arguments Nod_User_Id and Nod_User_Token. An attacker can manipulate these parameters to bypass authentication controls remotely without requiring any privileges or user interaction. This means an unauthenticated attacker can potentially gain unauthorized access to the system, compromising confidentiality, integrity, and availability. The CVSS v3.1 base score is 7.3 (high severity), reflecting the ease of exploitation (network vector, low attack complexity, no privileges or user interaction required) and the impact on all three security properties, although confidentiality, integrity, and availability impacts are rated as low to moderate. The vendor has not responded to disclosure attempts, and no patches or mitigations have been officially released yet. While no known exploits are currently reported in the wild, the public disclosure of the vulnerability details increases the risk of exploitation by threat actors.
Potential Impact
For European organizations using NODERP versions 6.0.0 through 6.0.2, this vulnerability poses a significant risk. Unauthorized access through improper authentication can lead to data breaches, unauthorized transactions, or manipulation of business-critical processes managed by NODERP. Given that NODERP is an enterprise resource planning (ERP) system, attackers could access sensitive corporate data, disrupt operations, or escalate privileges within the affected environment. This could result in financial losses, reputational damage, and regulatory compliance violations, especially under GDPR, where unauthorized access to personal data must be reported and mitigated promptly. The remote exploitability without authentication or user interaction increases the urgency for European organizations to assess their exposure and implement mitigations. The lack of vendor response and patches further exacerbates the risk, requiring organizations to consider compensating controls.
Mitigation Recommendations
Since no official patches are currently available, European organizations should implement the following specific mitigations: 1) Conduct an immediate inventory to identify all instances of NODERP versions 6.0.0 to 6.0.2 in their environment. 2) Restrict network access to the NODERP application, limiting it to trusted internal networks or VPNs to reduce exposure to remote attackers. 3) Implement Web Application Firewalls (WAFs) with custom rules to detect and block suspicious manipulations of the Nod_User_Id and Nod_User_Token parameters. 4) Monitor application logs for anomalous authentication attempts or unusual parameter values indicative of exploitation attempts. 5) Employ multi-factor authentication (MFA) at the network or application gateway level to add an additional authentication barrier. 6) If feasible, isolate NODERP instances in segmented network zones to contain potential breaches. 7) Engage with Shanxi Diankeyun Technology for updates and patches, and prepare to apply them immediately upon release. 8) Consider temporary alternative ERP solutions or manual controls if the risk is unacceptable and patching is delayed.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2024-1006: CWE-287 Improper Authentication in Shanxi Diankeyun Technology NODERP
Description
A vulnerability was found in Shanxi Diankeyun Technology NODERP up to 6.0.2 and classified as critical. This issue affects some unknown processing of the file application/index/common.php of the component Cookie Handler. The manipulation of the argument Nod_User_Id/Nod_User_Token leads to improper authentication. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252275. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2024-1006 is a critical vulnerability identified in Shanxi Diankeyun Technology's NODERP product versions up to 6.0.2. The vulnerability is categorized under CWE-287, which relates to improper authentication mechanisms. Specifically, the flaw exists in the handling of the Cookie Handler component within the file application/index/common.php. The vulnerability arises from improper processing and validation of the arguments Nod_User_Id and Nod_User_Token. An attacker can manipulate these parameters to bypass authentication controls remotely without requiring any privileges or user interaction. This means an unauthenticated attacker can potentially gain unauthorized access to the system, compromising confidentiality, integrity, and availability. The CVSS v3.1 base score is 7.3 (high severity), reflecting the ease of exploitation (network vector, low attack complexity, no privileges or user interaction required) and the impact on all three security properties, although confidentiality, integrity, and availability impacts are rated as low to moderate. The vendor has not responded to disclosure attempts, and no patches or mitigations have been officially released yet. While no known exploits are currently reported in the wild, the public disclosure of the vulnerability details increases the risk of exploitation by threat actors.
Potential Impact
For European organizations using NODERP versions 6.0.0 through 6.0.2, this vulnerability poses a significant risk. Unauthorized access through improper authentication can lead to data breaches, unauthorized transactions, or manipulation of business-critical processes managed by NODERP. Given that NODERP is an enterprise resource planning (ERP) system, attackers could access sensitive corporate data, disrupt operations, or escalate privileges within the affected environment. This could result in financial losses, reputational damage, and regulatory compliance violations, especially under GDPR, where unauthorized access to personal data must be reported and mitigated promptly. The remote exploitability without authentication or user interaction increases the urgency for European organizations to assess their exposure and implement mitigations. The lack of vendor response and patches further exacerbates the risk, requiring organizations to consider compensating controls.
Mitigation Recommendations
Since no official patches are currently available, European organizations should implement the following specific mitigations: 1) Conduct an immediate inventory to identify all instances of NODERP versions 6.0.0 to 6.0.2 in their environment. 2) Restrict network access to the NODERP application, limiting it to trusted internal networks or VPNs to reduce exposure to remote attackers. 3) Implement Web Application Firewalls (WAFs) with custom rules to detect and block suspicious manipulations of the Nod_User_Id and Nod_User_Token parameters. 4) Monitor application logs for anomalous authentication attempts or unusual parameter values indicative of exploitation attempts. 5) Employ multi-factor authentication (MFA) at the network or application gateway level to add an additional authentication barrier. 6) If feasible, isolate NODERP instances in segmented network zones to contain potential breaches. 7) Engage with Shanxi Diankeyun Technology for updates and patches, and prepare to apply them immediately upon release. 8) Consider temporary alternative ERP solutions or manual controls if the risk is unacceptable and patching is delayed.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-01-29T07:03:38.802Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683879c8182aa0cae2829670
Added to database: 5/29/2025, 3:14:16 PM
Last enriched: 7/8/2025, 1:25:31 AM
Last updated: 10/16/2025, 12:49:20 PM
Views: 18
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9955: Vulnerability in WSO2 WSO2 Enterprise Integrator
MediumCVE-2025-10611: Vulnerability in WSO2 WSO2 API Manager
CriticalCVE-2025-58426: Use of hard-coded cryptographic key in NEOJAPAN Inc. desknet's NEO
MediumCVE-2025-58079: Improper Protection of Alternate Path in NEOJAPAN Inc. desknet's NEO
MediumCVE-2025-55072: Cross-site scripting (XSS) in NEOJAPAN Inc. desknet's NEO
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.