Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-45794: CWE-294: Authentication Bypass by Capture-replay in Siemens Mendix Applications using Mendix 10

0
Medium
VulnerabilityCVE-2023-45794cvecve-2023-45794cwe-294
Published: Tue Nov 14 2023 (11/14/2023, 11:04:16 UTC)
Source: CVE Database V5
Vendor/Project: Siemens
Product: Mendix Applications using Mendix 10

Description

CVE-2023-45794 is an authentication bypass vulnerability affecting Siemens Mendix Applications using Mendix versions prior to 10. 4. 0, as well as earlier Mendix 7, 8, and 9 versions below specified patch levels. The flaw arises from a capture-replay weakness in the platform's authentication mechanism, potentially allowing authenticated attackers to replay captured authentication tokens or requests. Exploitation can lead to unauthorized access or modification of application objects and privilege escalation within the affected app context. The vulnerability requires an attacker with some level of authenticated access, and exploitation does not require user interaction. The CVSS score is 6. 8 (medium severity), reflecting network attack vector, low complexity, and partial privileges required. No known exploits are currently reported in the wild. European organizations using Mendix-based applications, especially in critical infrastructure or industrial sectors, should prioritize patching and reviewing access control models to mitigate risk.

AI-Powered Analysis

AILast updated: 12/23/2025, 18:32:35 UTC

Technical Analysis

CVE-2023-45794 is a capture-replay authentication bypass vulnerability classified under CWE-294 that affects Siemens Mendix Applications built on Mendix 10 versions prior to 10.4.0, as well as earlier Mendix 7, 8, and 9 versions below their respective patch levels. Mendix is a low-code application development platform widely used for enterprise and industrial applications. The vulnerability stems from the platform's flawed handling of authentication tokens or session data, which can be captured by an attacker with network access and replayed to bypass authentication controls. This flaw is conditional on the app's specific model and access control design, meaning that the impact depends on how the application implements authorization and session management. An attacker who is already authenticated with low privileges can exploit this flaw to gain unauthorized access to or modify objects within the application, or escalate their privileges, potentially compromising the confidentiality and integrity of the application data. The vulnerability does not require user interaction but does require some level of authentication, limiting the attack surface to insiders or attackers who have obtained initial access. The CVSS v3.1 score of 6.8 reflects a network attack vector, low attack complexity, low privileges required, no user interaction, and high impact on confidentiality and integrity, but no impact on availability. No public exploits or active exploitation have been reported yet, but the vulnerability is significant given Mendix's use in critical business and industrial applications. Siemens has released patches in Mendix 10.4.0 and corresponding versions for earlier Mendix lines to address this issue.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially to those relying on Mendix-based applications for critical business processes, industrial automation, or infrastructure management. Successful exploitation can lead to unauthorized data access, data modification, and privilege escalation within affected applications, potentially resulting in data breaches, operational disruption, or compliance violations under GDPR and other regulations. Given Mendix's adoption in sectors such as manufacturing, energy, and finance, the impact could extend to operational technology environments and sensitive data repositories. The requirement for an attacker to have some authenticated access limits the risk to insider threats or attackers who have compromised initial credentials, but the ease of replay attacks means lateral movement and privilege escalation within networks could be facilitated. This could undermine trust in application integrity and confidentiality, leading to reputational damage and financial losses. Organizations with complex access control models may face challenges in fully mitigating the risk without patching. The absence of known exploits reduces immediate urgency but does not eliminate the threat, as attackers may develop exploits in the future.

Mitigation Recommendations

European organizations should immediately prioritize upgrading Mendix applications to version 10.4.0 or later, or the corresponding patched versions for Mendix 7, 8, and 9. In parallel, conduct a thorough review of application access control models to ensure least privilege principles are strictly enforced and that sensitive operations require multi-factor authentication or additional verification. Implement network segmentation and monitoring to detect unusual replay or authentication anomalies, focusing on internal traffic where authenticated sessions are used. Employ session management best practices such as binding sessions to client attributes (IP, device fingerprint) and implementing short session lifetimes to reduce replay window. Use application-layer logging and anomaly detection to identify suspicious access patterns indicative of replay attacks. Educate internal users about credential security to reduce risk of initial credential compromise. Finally, coordinate with Siemens and Mendix support for guidance on secure configuration and any additional patches or workarounds.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
siemens
Date Reserved
2023-10-12T17:15:59.195Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6941947d9050fe8508061290

Added to database: 12/16/2025, 5:18:53 PM

Last enriched: 12/23/2025, 6:32:35 PM

Last updated: 2/7/2026, 5:48:16 AM

Views: 44

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats