Siemens has issued a security bulletin regarding a medium-risk vulnerability in the Mendix Runtime. The vulnerability, identified as CVE-2023-49069, stems from an observable response discrepancy issue when validating usernames. This flaw allows a remote attacker to determine whether a username is valid or not, potentially disclosing sensitive information. The affected versions of Mendix Runtime are from 8.0 to 10.12. Siemens has confirmed that no public exploit is available for this vulnerability, and there is no known active exploitation at this time.
The vulnerability’s CVSSv3.1 score is 4.6, which indicates a medium risk, with an impact on confidentiality but no impact on integrity or availability. Attackers could exploit the flaw by sending crafted requests to the system, gaining insight into whether specific usernames exist, which could be used for further attacks. However, the issue does not allow for unauthorized access to the system or sensitive data beyond username information.
Siemens recommends that users update to the latest version of Mendix Runtime to mitigate the risk posed by this vulnerability. The company has provided patches that address the issue and is urging customers to install them as soon as possible. The specific vulnerable software versions range from Mendix Runtime 8.0 to 10.12, and users should ensure they are running patched versions to avoid any potential exploitation.
In addition to the patch recommendation, Siemens suggests standard security practices to further protect networked systems, including using secure access controls. The company emphasizes the importance of configuring the environment according to industrial security guidelines to mitigate any security risks. Users who rely on Mendix Runtime are urged to take immediate action to address the vulnerability and follow Siemens’ advice to safeguard their systems.
Reference: