Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-8074: CWE-306 Missing Authentication for Critical Function in Nomysoft Informatics Nomysem

0
Critical
VulnerabilityCVE-2024-8074cvecve-2024-8074cwe-306cwe-862
Published: Tue Nov 12 2024 (11/12/2024, 14:45:26 UTC)
Source: CVE Database V5
Vendor/Project: Nomysoft Informatics
Product: Nomysem

Description

Missing Authentication for Critical Function, Missing Authorization vulnerability in Nomysoft Informatics Nomysem allows Collect Data as Provided by Users.This issue affects Nomysem: before 13.10.2024.

AI-Powered Analysis

AILast updated: 12/23/2025, 20:07:03 UTC

Technical Analysis

CVE-2024-8074 is a vulnerability classified under CWE-306 (Missing Authentication for Critical Function) and CWE-862 (Missing Authorization) affecting Nomysoft Informatics' Nomysem software versions prior to 13.10.2024. The flaw allows an attacker with low privileges (PR:L) and network access (AV:N) to invoke critical functions without proper authentication or authorization controls. This enables unauthorized collection of data as provided by users, compromising confidentiality and integrity. The CVSS 4.0 vector indicates no user interaction is required (UI:N), and the attack complexity is low (AC:L), making exploitation feasible in many environments. The vulnerability impacts the system's confidentiality and integrity highly (VC:H, VI:H), with no impact on availability (VA:N). The scope is limited to the vulnerable component (SI:L), and no privileges are escalated (SA:N). No patches are currently available, and no known exploits have been reported in the wild. The vulnerability poses a significant risk to organizations relying on Nomysem for data processing or management, as attackers could extract sensitive user data without detection or authorization.

Potential Impact

For European organizations, this vulnerability presents a high risk of unauthorized data disclosure and potential breaches of personal or sensitive information, which could lead to violations of GDPR and other data protection regulations. The ability to collect user-provided data without authentication or authorization undermines trust and could result in reputational damage, legal penalties, and financial losses. Critical sectors such as healthcare, finance, and government agencies using Nomysem may face increased risks due to the sensitivity of the data handled. The lack of availability impact means systems remain operational, potentially allowing prolonged unauthorized data access. The ease of exploitation and network accessibility further increase the threat landscape, especially in environments with insufficient network segmentation or monitoring. Organizations may also face challenges in incident detection and response due to the stealthy nature of the exploit.

Mitigation Recommendations

1. Immediately restrict network access to Nomysem instances by implementing strict firewall rules and network segmentation to limit exposure to trusted hosts only. 2. Monitor logs and network traffic for unusual access patterns or data exfiltration attempts related to Nomysem services. 3. Employ application-layer access controls and intrusion detection systems to detect unauthorized function calls. 4. Engage with Nomysoft Informatics for timely updates and patches; prioritize patch deployment once available. 5. Conduct thorough access reviews and minimize privileges for users interacting with Nomysem to reduce potential attack vectors. 6. Implement multi-factor authentication and strong authorization mechanisms around critical functions if configurable. 7. Prepare incident response plans specific to unauthorized data access scenarios involving Nomysem. 8. Consider temporary compensating controls such as disabling non-essential features or services within Nomysem that expose critical functions. 9. Educate staff on the risks and signs of exploitation to enhance early detection.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
TR-CERT
Date Reserved
2024-08-22T11:58:48.877Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ee4e5118c99eb639aa9a4c

Added to database: 10/14/2025, 1:21:21 PM

Last enriched: 12/23/2025, 8:07:03 PM

Last updated: 1/17/2026, 8:49:21 AM

Views: 101

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats