CVE-2026-8214
Received Received - Intake
Improper Authentication in IAS Canias ERP via RMI Interface

Publication date: 2026-05-10

Last updated on: 2026-05-10

Assigner: VulDB

Description
A vulnerability was found in Industrial Application Software IAS Canias ERP 8.03. This affects the function doAction of the component RMI Interface. The manipulation of the argument sessionId results in improper authentication. It is possible to launch the attack remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-10
Last Modified
2026-05-10
Generated
2026-05-10
AI Q&A
2026-05-10
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
industrial_application_software canias_erp 8.03
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-287 When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Industrial Application Software IAS Canias ERP version 8.03, specifically in the doAction function of the RMI Interface component.

The issue arises from improper authentication due to manipulation of the sessionId argument, allowing an attacker to bypass authentication controls.

The attack can be launched remotely, and the exploit has already been made public.


How can this vulnerability impact me? :

An attacker exploiting this vulnerability can remotely bypass authentication by manipulating the sessionId parameter.

This could allow unauthorized access to the system without valid credentials.

According to Resource 1, it is possible to retrieve sensitive information about active user sessions, such as session IDs and user names, without authentication.

Such unauthorized access could lead to information disclosure and potential further exploitation within the affected ERP system.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by attempting to interact with the Canias ERP server's RMI Interface remotely without authentication to retrieve active user session information.

A Java program named GetUserList.java can be used to connect to the Canias ERP server on the default RMI port 27499 and query the remote interface "11000000S2OUT" to fetch active user sessions.

This program requires the canias803.jar library and uses Java RMI to perform the detection.

  • Run the GetUserList.java program with the target IP address and port (default 27499) to retrieve active sessions.
  • Alternatively, monitor network traffic for unauthorized RMI calls to port 27499 targeting the "11000000S2OUT" interface.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability in Industrial Application Software IAS Canias ERP 8.03 allows remote attackers to manipulate the sessionId argument, resulting in improper authentication. This can lead to unauthorized access to user session information without proper authentication.

Such unauthorized access to user session data could potentially expose sensitive personal or organizational information, which may violate data protection requirements under regulations like GDPR or HIPAA that mandate strict controls over access to personal and sensitive data.

Because the exploit is publicly known and the vendor has not responded, affected organizations may face increased risk of data breaches, which could lead to non-compliance with these standards and regulations.


What immediate steps should I take to mitigate this vulnerability?

The vulnerability allows remote attackers to manipulate the sessionId argument in the doAction function of the RMI Interface, resulting in improper authentication. Since the exploit is public and the vendor has not responded, immediate mitigation steps should focus on limiting exposure.

  • Restrict network access to the RMI service, especially port 27499, to trusted IP addresses only.
  • Monitor and log all RMI interface access attempts to detect suspicious activity.
  • If possible, disable or block the RMI Interface component until a patch or vendor guidance is available.
  • Review active user sessions for any unauthorized access using tools or scripts that interact with the RMI Interface.
  • Apply network-level protections such as firewalls or VPNs to limit remote access to the affected system.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart