Lucene search

K
cveSiemensCVE-2023-25957
HistoryMar 14, 2023 - 10:15 a.m.

CVE-2023-25957

2023-03-1410:15:28
CWE-303
CWE-287
siemens
web.nvd.nist.gov
36
cve
2023
25957
mendix
saml
vulnerability
authentication
encryption

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C

AI Score

8.5

Confidence

High

EPSS

0.001

Percentile

48.6%

A vulnerability has been identified in Mendix SAML (Mendix 7 compatible) (All versions >= V1.16.4 < V1.17.3), Mendix SAML (Mendix 8 compatible) (All versions >= V2.2.0 < V2.3.0), Mendix SAML (Mendix 9 latest compatible, New Track) (All versions >= V3.1.9 < V3.3.1), Mendix SAML (Mendix 9 latest compatible, Upgrade Track) (All versions >= V3.1.8 < V3.3.0), Mendix SAML (Mendix 9.6 compatible, New Track) (All versions >= V3.1.9 < V3.2.7), Mendix SAML (Mendix 9.6 compatible, Upgrade Track) (All versions >= V3.1.8 < V3.2.6). The affected versions of the module insufficiently verify the SAML assertions. This could allow unauthenticated remote attackers to bypass authentication and get access to the application.

For compatibility reasons, fix versions still contain this issue, but only when the recommended, default configuration option 'Use Encryption' is disabled.

Affected configurations

Nvd
Node
mendixsamlRange1.16.41.17.2mendix
OR
mendixsamlRange2.2.02.2.3mendix
OR
mendixsamlRange3.1.93.2.5mendix
VendorProductVersionCPE
mendixsaml*cpe:2.3:a:mendix:saml:*:*:*:*:*:mendix:*:*

CNA Affected

[
  {
    "vendor": "Siemens",
    "product": "Mendix SAML (Mendix 7 compatible)",
    "versions": [
      {
        "version": "All versions >= V1.16.4 < V1.17.3",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "vendor": "Siemens",
    "product": "Mendix SAML (Mendix 8 compatible)",
    "versions": [
      {
        "version": "All versions >= V2.2.0 < V2.3.0",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "vendor": "Siemens",
    "product": "Mendix SAML (Mendix 9 latest compatible, New Track)",
    "versions": [
      {
        "version": "All versions >= V3.1.9 < V3.3.1",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "vendor": "Siemens",
    "product": "Mendix SAML (Mendix 9 latest compatible, Upgrade Track)",
    "versions": [
      {
        "version": "All versions >= V3.1.8 < V3.3.0",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "vendor": "Siemens",
    "product": "Mendix SAML (Mendix 9.6 compatible, New Track)",
    "versions": [
      {
        "version": "All versions >= V3.1.9 < V3.2.7",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "vendor": "Siemens",
    "product": "Mendix SAML (Mendix 9.6 compatible, Upgrade Track)",
    "versions": [
      {
        "version": "All versions >= V3.1.8 < V3.2.6",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C

AI Score

8.5

Confidence

High

EPSS

0.001

Percentile

48.6%

Related for CVE-2023-25957