CVE-2024-1006: CWE-287 Improper Authentication in Shanxi Diankeyun Technology NODERP
A vulnerability was found in Shanxi Diankeyun Technology NODERP up to 6.0.2 and classified as critical. This issue affects some unknown processing of the file application/index/common.php of the component Cookie Handler. The manipulation of the argument Nod_User_Id/Nod_User_Token leads to improper authentication. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252275. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2024-1006 is a critical vulnerability identified in Shanxi Diankeyun Technology's NODERP product versions up to 6.0.2. The vulnerability is categorized under CWE-287, which relates to improper authentication mechanisms. Specifically, the flaw exists in the handling of the Cookie Handler component within the file application/index/common.php. The vulnerability arises from improper processing and validation of the arguments Nod_User_Id and Nod_User_Token. An attacker can manipulate these parameters to bypass authentication controls remotely without requiring any privileges or user interaction. This means an unauthenticated attacker can potentially gain unauthorized access to the system, compromising confidentiality, integrity, and availability. The CVSS v3.1 base score is 7.3 (high severity), reflecting the ease of exploitation (network vector, low attack complexity, no privileges or user interaction required) and the impact on all three security properties, although confidentiality, integrity, and availability impacts are rated as low to moderate. The vendor has not responded to disclosure attempts, and no patches or mitigations have been officially released yet. While no known exploits are currently reported in the wild, the public disclosure of the vulnerability details increases the risk of exploitation by threat actors.
Potential Impact
For European organizations using NODERP versions 6.0.0 through 6.0.2, this vulnerability poses a significant risk. Unauthorized access through improper authentication can lead to data breaches, unauthorized transactions, or manipulation of business-critical processes managed by NODERP. Given that NODERP is an enterprise resource planning (ERP) system, attackers could access sensitive corporate data, disrupt operations, or escalate privileges within the affected environment. This could result in financial losses, reputational damage, and regulatory compliance violations, especially under GDPR, where unauthorized access to personal data must be reported and mitigated promptly. The remote exploitability without authentication or user interaction increases the urgency for European organizations to assess their exposure and implement mitigations. The lack of vendor response and patches further exacerbates the risk, requiring organizations to consider compensating controls.
Mitigation Recommendations
Since no official patches are currently available, European organizations should implement the following specific mitigations: 1) Conduct an immediate inventory to identify all instances of NODERP versions 6.0.0 to 6.0.2 in their environment. 2) Restrict network access to the NODERP application, limiting it to trusted internal networks or VPNs to reduce exposure to remote attackers. 3) Implement Web Application Firewalls (WAFs) with custom rules to detect and block suspicious manipulations of the Nod_User_Id and Nod_User_Token parameters. 4) Monitor application logs for anomalous authentication attempts or unusual parameter values indicative of exploitation attempts. 5) Employ multi-factor authentication (MFA) at the network or application gateway level to add an additional authentication barrier. 6) If feasible, isolate NODERP instances in segmented network zones to contain potential breaches. 7) Engage with Shanxi Diankeyun Technology for updates and patches, and prepare to apply them immediately upon release. 8) Consider temporary alternative ERP solutions or manual controls if the risk is unacceptable and patching is delayed.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2024-1006: CWE-287 Improper Authentication in Shanxi Diankeyun Technology NODERP
Description
A vulnerability was found in Shanxi Diankeyun Technology NODERP up to 6.0.2 and classified as critical. This issue affects some unknown processing of the file application/index/common.php of the component Cookie Handler. The manipulation of the argument Nod_User_Id/Nod_User_Token leads to improper authentication. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252275. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2024-1006 is a critical vulnerability identified in Shanxi Diankeyun Technology's NODERP product versions up to 6.0.2. The vulnerability is categorized under CWE-287, which relates to improper authentication mechanisms. Specifically, the flaw exists in the handling of the Cookie Handler component within the file application/index/common.php. The vulnerability arises from improper processing and validation of the arguments Nod_User_Id and Nod_User_Token. An attacker can manipulate these parameters to bypass authentication controls remotely without requiring any privileges or user interaction. This means an unauthenticated attacker can potentially gain unauthorized access to the system, compromising confidentiality, integrity, and availability. The CVSS v3.1 base score is 7.3 (high severity), reflecting the ease of exploitation (network vector, low attack complexity, no privileges or user interaction required) and the impact on all three security properties, although confidentiality, integrity, and availability impacts are rated as low to moderate. The vendor has not responded to disclosure attempts, and no patches or mitigations have been officially released yet. While no known exploits are currently reported in the wild, the public disclosure of the vulnerability details increases the risk of exploitation by threat actors.
Potential Impact
For European organizations using NODERP versions 6.0.0 through 6.0.2, this vulnerability poses a significant risk. Unauthorized access through improper authentication can lead to data breaches, unauthorized transactions, or manipulation of business-critical processes managed by NODERP. Given that NODERP is an enterprise resource planning (ERP) system, attackers could access sensitive corporate data, disrupt operations, or escalate privileges within the affected environment. This could result in financial losses, reputational damage, and regulatory compliance violations, especially under GDPR, where unauthorized access to personal data must be reported and mitigated promptly. The remote exploitability without authentication or user interaction increases the urgency for European organizations to assess their exposure and implement mitigations. The lack of vendor response and patches further exacerbates the risk, requiring organizations to consider compensating controls.
Mitigation Recommendations
Since no official patches are currently available, European organizations should implement the following specific mitigations: 1) Conduct an immediate inventory to identify all instances of NODERP versions 6.0.0 to 6.0.2 in their environment. 2) Restrict network access to the NODERP application, limiting it to trusted internal networks or VPNs to reduce exposure to remote attackers. 3) Implement Web Application Firewalls (WAFs) with custom rules to detect and block suspicious manipulations of the Nod_User_Id and Nod_User_Token parameters. 4) Monitor application logs for anomalous authentication attempts or unusual parameter values indicative of exploitation attempts. 5) Employ multi-factor authentication (MFA) at the network or application gateway level to add an additional authentication barrier. 6) If feasible, isolate NODERP instances in segmented network zones to contain potential breaches. 7) Engage with Shanxi Diankeyun Technology for updates and patches, and prepare to apply them immediately upon release. 8) Consider temporary alternative ERP solutions or manual controls if the risk is unacceptable and patching is delayed.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-01-29T07:03:38.802Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683879c8182aa0cae2829670
Added to database: 5/29/2025, 3:14:16 PM
Last enriched: 7/8/2025, 1:25:31 AM
Last updated: 8/12/2025, 10:48:22 AM
Views: 11
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.