#VU58197 Use of Web Browser Cache Containing Sensitive Information in Siemens products - CVE-2021-42015


Vulnerability identifier: #VU58197

Vulnerability risk: Medium

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2021-42015

CWE-ID: CWE-525

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Mendix Applications using Mendix 7
Client/Desktop applications / Other client software
Mendix Applications using Mendix 8
Client/Desktop applications / Other client software
Mendix Applications using Mendix 9
Client/Desktop applications / Other client software

Vendor: Siemens

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to applications built with the affected versions of Mendix Studio Pro do not prevent file documents from being cached when files are opened or downloaded using a browser. A remote attacker can gain unauthorized access to sensitive information on the system.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Mendix Applications using Mendix 7: before 7.23.26

Mendix Applications using Mendix 8: before 8.18.12

Mendix Applications using Mendix 9: before 9.6.1


External links
https://cert-portal.siemens.com/productcert/pdf/ssa-338732.pdf


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability