Lucene search

K
cve[email protected]CVE-2022-37011
HistorySep 13, 2022 - 10:15 a.m.

CVE-2022-37011

2022-09-1310:15:10
CWE-294
web.nvd.nist.gov
36
4
cve-2022-37011
mendix saml
vulnerability
authentication bypass
packet capture replay
nvd
security

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.4 High

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

73.2%

A vulnerability has been identified in Mendix SAML (Mendix 7 compatible) (All versions < V1.17.0), Mendix SAML (Mendix 8 compatible) (All versions < V2.3.0), Mendix SAML (Mendix 9 compatible, New Track) (All versions < V3.3.1), Mendix SAML (Mendix 9 compatible, Upgrade Track) (All versions < V3.3.0). Affected versions of the module insufficiently protect from packet capture replay. This could allow unauthorized remote attackers to bypass authentication and get access to the application. For compatibility reasons, fix versions still contain this issue, but only when the not recommended, non default configuration option 'Allow Idp Initiated Authentication' is enabled.

Affected configurations

NVD
Node
mendixsamlRange<1.17.0
OR
mendixsamlRange2.0.02.3.0
OR
mendixsamlRange3.0.03.3.1

CNA Affected

[
  {
    "vendor": "Siemens",
    "product": "Mendix SAML (Mendix 7 compatible)",
    "versions": [
      {
        "version": "All versions < V1.17.0",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Siemens",
    "product": "Mendix SAML (Mendix 8 compatible)",
    "versions": [
      {
        "version": "All versions < V2.3.0",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Siemens",
    "product": "Mendix SAML (Mendix 9 compatible, New Track)",
    "versions": [
      {
        "version": "All versions < V3.3.1",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Siemens",
    "product": "Mendix SAML (Mendix 9 compatible, Upgrade Track)",
    "versions": [
      {
        "version": "All versions < V3.3.0",
        "status": "affected"
      }
    ]
  }
]

Social References

More

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.4 High

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

73.2%

Related for CVE-2022-37011