5.9 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N
7.4 High
CVSS4
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/SC:N/VI:H/SI:N/VA:N/SA:N
0.0004 Low
EPSS
Percentile
9.1%
A vulnerability has been identified in Mendix Applications using Mendix 10 (All versions < V10.11.0), Mendix Applications using Mendix 10 (V10.6) (All versions < V10.6.9), Mendix Applications using Mendix 9 (All versions >= V9.3.0 < V9.24.22). Affected applications could allow users with the capability to manage a role to elevate the access rights of users with that role. Successful exploitation requires to guess the id of a target role which contains the elevated access rights.
[
{
"vendor": "Siemens",
"product": "Mendix Applications using Mendix 10",
"versions": [
{
"status": "affected",
"version": "0",
"lessThan": "V10.11.0",
"versionType": "custom"
}
],
"defaultStatus": "unknown"
},
{
"vendor": "Siemens",
"product": "Mendix Applications using Mendix 10 (V10.6)",
"versions": [
{
"status": "affected",
"version": "0",
"lessThan": "V10.6.9",
"versionType": "custom"
}
],
"defaultStatus": "unknown"
},
{
"vendor": "Siemens",
"product": "Mendix Applications using Mendix 9",
"versions": [
{
"status": "affected",
"version": "V9.3.0",
"lessThan": "V9.24.22",
"versionType": "custom"
}
],
"defaultStatus": "unknown"
}
]
5.9 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N
7.4 High
CVSS4
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/SC:N/VI:H/SI:N/VA:N/SA:N
0.0004 Low
EPSS
Percentile
9.1%