Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34039: CWE-306 Missing Authentication for Critical Function in Yonyou Co., Ltd. UFIDA NC

0
Critical
VulnerabilityCVE-2025-34039cvecve-2025-34039cwe-306
Published: Tue Jun 24 2025 (06/24/2025, 01:07:05 UTC)
Source: CVE Database V5
Vendor/Project: Yonyou Co., Ltd.
Product: UFIDA NC

Description

A code injection vulnerability exists in Yonyou UFIDA NC v6.5 and prior due to the exposure of the BeanShell testing servlet (bsh.servlet.BshServlet) without proper access controls. The servlet allows unauthenticated remote attackers to execute arbitrary Java code via the bsh.script parameter. This can be exploited to run system commands and ultimately gain full control over the target server. The issue is rooted in a third-party JAR component bundled with the application, and the servlet is accessible without authentication on vulnerable installations. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-05 UTC.

AI-Powered Analysis

AILast updated: 11/17/2025, 22:06:56 UTC

Technical Analysis

CVE-2025-34039 is a critical unauthenticated remote code execution vulnerability affecting Yonyou Co., Ltd.'s UFIDA NC product, version 6.5 and prior. The vulnerability stems from the exposure of the BeanShell testing servlet (bsh.servlet.BshServlet), which is included as part of a third-party JAR bundled with the application. This servlet is intended for testing and debugging but is left accessible without any authentication or access control mechanisms. Attackers can exploit this by sending specially crafted HTTP requests containing malicious Java code in the bsh.script parameter. Upon processing, the servlet executes this code within the Java runtime environment, allowing arbitrary code execution on the server. This can lead to system command execution, data theft, service disruption, or full server takeover. The vulnerability is severe due to its unauthenticated nature, network accessibility, and the ability to execute arbitrary code with the privileges of the application server. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H) reflects that no privileges, user interaction, or authentication are required, and the impact on confidentiality, integrity, and availability is high. Exploitation was confirmed by Shadowserver Foundation in mid-2025, underscoring active threat potential. No patches have been published yet, increasing the urgency for mitigation.

Potential Impact

For European organizations, the impact of CVE-2025-34039 is significant. UFIDA NC is an enterprise resource planning (ERP) system widely used in various industries, including manufacturing, finance, and government sectors. Successful exploitation can lead to complete compromise of the ERP server, resulting in unauthorized access to sensitive business data, disruption of critical business processes, and potential lateral movement within corporate networks. This can cause severe operational downtime, financial losses, reputational damage, and regulatory compliance violations under GDPR due to data breaches. The ability to execute arbitrary code without authentication makes this vulnerability highly attractive to threat actors, including cybercriminals and nation-state groups. Given the critical nature of ERP systems in European enterprises, exploitation could affect supply chains and critical infrastructure. The lack of available patches increases the risk window, necessitating immediate defensive actions.

Mitigation Recommendations

1. Immediate network-level mitigation: Restrict access to the vulnerable servlet by implementing firewall rules or network segmentation to block external and unauthorized internal access to the bsh.servlet.BshServlet endpoint. 2. Disable or remove the BeanShell testing servlet from all UFIDA NC installations if not required for operations, as it is primarily intended for debugging and testing. 3. Monitor web server and application logs for any suspicious requests targeting the bsh.servlet.BshServlet or containing the bsh.script parameter. 4. Employ Web Application Firewalls (WAFs) with custom rules to detect and block attempts to exploit this servlet. 5. Conduct a thorough audit of all UFIDA NC instances to identify vulnerable versions and prioritize remediation. 6. Engage with Yonyou Co., Ltd. for official patches or updates and apply them promptly once available. 7. Implement strict access controls and authentication mechanisms around management and debugging interfaces in the future to prevent similar issues. 8. Prepare incident response plans to quickly isolate and remediate compromised systems if exploitation is detected.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.546Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 685a0560dec26fc862d8cf6c

Added to database: 6/24/2025, 1:54:40 AM

Last enriched: 11/17/2025, 10:06:56 PM

Last updated: 11/21/2025, 5:10:49 AM

Views: 138

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats