Authentication Bypass Vulnerability in Mendix SAML Modules
CVE-2022-37011
9.8CRITICAL
Key Information:
- Vendor
- Siemens
- Status
- Vendor
- CVE Published:
- 13 September 2022
Summary
A vulnerability exists in the Mendix SAML modules that impairs protection against packet capture replay attacks. This flaw enables unauthorized remote attackers to potentially bypass authentication, granting them access to the application. Although updates have been provided, utilizing the non-recommended configuration option 'Allow Idp Initiated Authentication' can still expose the system to this risk. Organizations using these modules should carefully evaluate their configurations to mitigate potential threats.
Affected Version(s)
Mendix SAML (Mendix 7 compatible) All versions < V1.17.0
Mendix SAML (Mendix 8 compatible) All versions < V2.3.0
Mendix SAML (Mendix 9 compatible, New Track) All versions < V3.3.1
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved