Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34039: CWE-306 Missing Authentication for Critical Function in Yonyou Co., Ltd. UFIDA NC

0
Critical
VulnerabilityCVE-2025-34039cvecve-2025-34039cwe-306
Published: Tue Jun 24 2025 (06/24/2025, 01:07:05 UTC)
Source: CVE Database V5
Vendor/Project: Yonyou Co., Ltd.
Product: UFIDA NC

Description

A code injection vulnerability exists in Yonyou UFIDA NC v6.5 and prior due to the exposure of the BeanShell testing servlet (bsh.servlet.BshServlet) without proper access controls. The servlet allows unauthenticated remote attackers to execute arbitrary Java code via the bsh.script parameter. This can be exploited to run system commands and ultimately gain full control over the target server. The issue is rooted in a third-party JAR component bundled with the application, and the servlet is accessible without authentication on vulnerable installations. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-05 UTC.

AI-Powered Analysis

AILast updated: 11/24/2025, 22:54:39 UTC

Technical Analysis

CVE-2025-34039 is a critical security vulnerability identified in Yonyou Co., Ltd.'s UFIDA NC software, version 6.5 and prior. The root cause is the exposure of the BeanShell testing servlet (bsh.servlet.BshServlet), a component intended for testing and debugging, which is bundled as a third-party JAR within the application. This servlet is accessible without any authentication or access control, allowing unauthenticated remote attackers to submit arbitrary Java code through the bsh.script parameter. Because BeanShell interprets and executes Java code dynamically, attackers can leverage this to execute arbitrary system commands on the underlying server, effectively gaining full control over the affected system. The vulnerability is classified under CWE-306 (Missing Authentication for Critical Function), highlighting the absence of proper authentication mechanisms protecting a critical functionality. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H/VI:H/VA:H). Exploitation evidence was observed by the Shadowserver Foundation in February 2025, confirming active attempts to exploit this flaw. No official patches were listed at the time of reporting, emphasizing the urgency for organizations to implement interim mitigations. This vulnerability is particularly dangerous because it allows remote code execution without any authentication or user interaction, making it trivially exploitable by attackers scanning for exposed endpoints. The affected product, UFIDA NC, is an enterprise resource planning (ERP) system widely used in various industries, increasing the potential impact of this vulnerability.

Potential Impact

The impact of CVE-2025-34039 on European organizations can be severe. Successful exploitation allows attackers to execute arbitrary code remotely, leading to full system compromise. This can result in data breaches, theft of sensitive business information, disruption of critical business processes, and potential ransomware deployment. Given UFIDA NC's role as an ERP system, attackers could manipulate financial data, supply chain information, and other critical enterprise resources. The lack of authentication and ease of exploitation increase the likelihood of widespread attacks. Additionally, compromised systems could be used as footholds for lateral movement within corporate networks, escalating the scope of damage. The exposure of this vulnerability could also lead to regulatory compliance violations under GDPR if personal data is compromised, resulting in legal and financial penalties. European organizations relying on UFIDA NC must consider this vulnerability a critical threat to their operational security and data integrity.

Mitigation Recommendations

To mitigate CVE-2025-34039, European organizations should immediately restrict network access to the BeanShell servlet endpoint (bsh.servlet.BshServlet) by implementing firewall rules or network segmentation to block unauthorized external and internal access. If possible, disable or remove the BeanShell testing servlet from the UFIDA NC installation entirely, as it is not intended for production use. Monitor network traffic and application logs for any suspicious requests targeting the bsh.script parameter to detect exploitation attempts early. Since no official patches were available at the time of reporting, organizations should engage with Yonyou Co., Ltd. for updates and apply any forthcoming security patches promptly. Employ application-layer firewalls or web application firewalls (WAFs) with custom rules to detect and block malicious payloads targeting this servlet. Conduct thorough vulnerability assessments and penetration testing to ensure no other similar unauthenticated endpoints exist. Finally, implement strict access controls and multi-factor authentication on all critical systems to limit the impact of potential breaches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.546Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 685a0560dec26fc862d8cf6c

Added to database: 6/24/2025, 1:54:40 AM

Last enriched: 11/24/2025, 10:54:39 PM

Last updated: 1/7/2026, 6:10:28 AM

Views: 185

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats