Siemens Mendix Runtime
Siemens Mendix Runtime contains a race condition in its basic authentication mechanism that allows unauthenticated remote attackers to bypass account lockout protections. An attacker can exploit this to perform credential brute-force attacks without triggering the lockout mechanism, potentially gaining unauthorized access. Siemens has released patches for Runtime V9, V10, V10.6, and V10.12. Runtime V8 will not be patched. As a workaround, organizations should disable basic authentication and use alternative authentication methods such as SAML or MendixSSO.
- Network access to the Mendix Runtime application port
- Basic authentication must be enabled on the Mendix Runtime instance
- Ability to send multiple rapid HTTP requests to the authentication endpoint
Patching may require device reboot — plan for process interruption
/api/v1/advisories/ac14b678-9b3d-4b16-b84e-c088e9322dd0Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.