Siemens Mendix SAML Module
The Mendix SAML module insufficiently verifies SAML assertions, allowing unauthenticated remote attackers to forge SAML responses and bypass authentication to gain unauthorized access to the application. The vulnerability exists in the assertion validation logic and is more severe when the 'Use Encryption' configuration option is disabled. Two rounds of fixes address different aspects: earlier patches address the vulnerability only when encryption is enabled, while later patches close the gap for non-default configurations.
- Network access to the Mendix application's SAML endpoint
- Mendix application must be using the vulnerable SAML module with 'Use Encryption' disabled (or early patch versions)
- No valid user credentials required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/abbe62dd-5342-4963-b428-9f04437a9f6eGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.