Vulnerability identifier: #VU58197
Vulnerability risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID:
CWE-ID:
CWE-525
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Mendix Applications using Mendix 7
Client/Desktop applications /
Other client software
Mendix Applications using Mendix 8
Client/Desktop applications /
Other client software
Mendix Applications using Mendix 9
Client/Desktop applications /
Other client software
Vendor: Siemens
Description
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to applications built with the affected versions of Mendix Studio Pro do not prevent file documents from being cached when files are opened or downloaded using a browser. A remote attacker can gain unauthorized access to sensitive information on the system.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Mendix Applications using Mendix 7: before 7.23.26
Mendix Applications using Mendix 8: before 8.18.12
Mendix Applications using Mendix 9: before 9.6.1
External links
https://cert-portal.siemens.com/productcert/pdf/ssa-338732.pdf
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.