Siemens Mendix Applications
Mendix Runtime versions 9.3.0 and later contain an improper access control vulnerability (CWE-269) that could allow users with role management permissions to escalate access rights. A user granted the ability to manage a role can modify permissions within that role, potentially elevating their own access or that of other users, provided they can guess the internal ID of a target role containing higher privileges. The vulnerability affects Mendix 9 versions prior to 9.24.22, Mendix 10 versions prior to 10.11.0, and Mendix 10.6 versions prior to 10.6.9.
- User account with role management capability within the Mendix application
- Knowledge of or ability to guess the internal ID of a target role containing elevated access rights
- Network access to the Mendix application interface
Patching may require device reboot — plan for process interruption
/api/v1/advisories/f122ee9e-c0c8-424e-8afb-42d77fba692aGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.