As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens’ ProductCERT Security Advisories (CERT Services | Services | Siemens Global).
1. EXECUTIVE SUMMARY
- CVSS v4 7.4
- ATTENTION: Exploitable remotely
- Vendor: Siemens
- Equipment: Mendix Applications
- Vulnerability: Improper Privilege Management
2. RISK EVALUATION
Successful exploitation requires to guess the identification of a target role which contains the elevated access rights.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
The following Siemens products, are affected:
- Siemens Mendix Applications using Mendix 9: Versions prior to V9.24.22 and after V9.3.0
- Siemens Mendix Applications using Mendix 10: Versions prior to V10.11.0
- Siemens Mendix Applications using Mendix 10 (V10.6): Versions prior V10.6.9
3.2 Vulnerability Overview
3.2.1 IMPROPER PRIVILEGE MANAGEMENT CWE-269
Affected applications could allow users with the capability to manage a role to elevate the access rights of users with that role. Successful exploitation requires to guess the id of a target role which contains the elevated access rights.
CVE-2024-33500 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been assigned; the CVSS vector string is (CVSS:3.1/AV:
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Read the original article: