Mendix Auth Priv Escalation via Cap-Replay <V10.4
CVE-2023-45794 Published on November 14, 2023

A vulnerability has been identified in Mendix Applications using Mendix 10 (All versions < V10.4.0), Mendix Applications using Mendix 7 (All versions < V7.23.37), Mendix Applications using Mendix 8 (All versions < V8.18.27), Mendix Applications using Mendix 9 (All versions < V9.24.10). A capture-replay flaw in the platform could have an impact to apps built with the platform, if certain preconditions are met that depend on the app's model and access control design. This could allow authenticated attackers to access or modify objects without proper authorization, or escalate privileges in the context of the vulnerable app.

NVD

Weakness Type

Authentication Bypass by Capture-replay

A capture-replay flaw exists when the design of the software makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes). Capture-replay attacks are common and can be difficult to defeat without cryptography. They are a subset of network injection attacks that rely on observing previously-sent valid commands, then changing them slightly if necessary and resending the same commands to the server.


Products Associated with CVE-2023-45794

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2023-45794 are published in these products:

 
 
 

Affected Versions

Siemens Mendix Applications using Mendix 10: Siemens Mendix Applications using Mendix 7: Siemens Mendix Applications using Mendix 8: Siemens Mendix Applications using Mendix 9:

Exploit Probability

EPSS
0.16%
Percentile
36.68%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.