Siemens Mendix
A Mendix application vulnerability allows an authenticated user to extract information from protected database fields by sorting query results. When a user performs a database query, they can intentionally sort by a protected field that should not be accessible. Although the sort operation itself does not return the field's value directly, the ordering of results reveals information about the protected field's contents, bypassing field-level access controls. Siemens has released updates for Mendix 7, 8, 9 and the v9.6 branch to address this vulnerability.
- Valid user credentials (login) to the Mendix application
- Access to the Mendix application's query interface or API
- Target application must use protected fields in its database schema
Patching may require device reboot — plan for process interruption
/api/v1/advisories/aa02e8fd-57e7-4b65-a108-0abf7238c56eGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.