Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2021-42015 |
CWE-ID | CWE-525 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Mendix Applications using Mendix 7 Client/Desktop applications / Other client software Mendix Applications using Mendix 8 Client/Desktop applications / Other client software Mendix Applications using Mendix 9 Client/Desktop applications / Other client software |
Vendor | Siemens |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU58197
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2021-42015
CWE-ID:
CWE-525 - Use of Web Browser Cache Containing Sensitive Information
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to applications built with the affected versions of Mendix Studio Pro do not prevent file documents from being cached when files are opened or downloaded using a browser. A remote attacker can gain unauthorized access to sensitive information on the system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsMendix Applications using Mendix 7: before 7.23.26
Mendix Applications using Mendix 8: before 8.18.12
Mendix Applications using Mendix 9: before 9.6.1
CPE2.3https://cert-portal.siemens.com/productcert/pdf/ssa-338732.pdf
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.