CVE-2023-45794: CWE-294: Authentication Bypass by Capture-replay in Siemens Mendix Applications using Mendix 10
CVE-2023-45794 is an authentication bypass vulnerability affecting Siemens Mendix Applications using Mendix versions prior to 10. 4. 0, as well as earlier Mendix 7, 8, and 9 versions below specified patch levels. The flaw arises from a capture-replay weakness in the platform's authentication mechanism, potentially allowing authenticated attackers to replay captured authentication tokens or requests. Exploitation can lead to unauthorized access or modification of application objects and privilege escalation within the affected app context. The vulnerability requires an attacker with some level of authenticated access, and exploitation does not require user interaction. The CVSS score is 6. 8 (medium severity), reflecting network attack vector, low complexity, and partial privileges required. No known exploits are currently reported in the wild. European organizations using Mendix-based applications, especially in critical infrastructure or industrial sectors, should prioritize patching and reviewing access control models to mitigate risk.
AI Analysis
Technical Summary
CVE-2023-45794 is a capture-replay authentication bypass vulnerability classified under CWE-294 that affects Siemens Mendix Applications built on Mendix 10 versions prior to 10.4.0, as well as earlier Mendix 7, 8, and 9 versions below their respective patch levels. Mendix is a low-code application development platform widely used for enterprise and industrial applications. The vulnerability stems from the platform's flawed handling of authentication tokens or session data, which can be captured by an attacker with network access and replayed to bypass authentication controls. This flaw is conditional on the app's specific model and access control design, meaning that the impact depends on how the application implements authorization and session management. An attacker who is already authenticated with low privileges can exploit this flaw to gain unauthorized access to or modify objects within the application, or escalate their privileges, potentially compromising the confidentiality and integrity of the application data. The vulnerability does not require user interaction but does require some level of authentication, limiting the attack surface to insiders or attackers who have obtained initial access. The CVSS v3.1 score of 6.8 reflects a network attack vector, low attack complexity, low privileges required, no user interaction, and high impact on confidentiality and integrity, but no impact on availability. No public exploits or active exploitation have been reported yet, but the vulnerability is significant given Mendix's use in critical business and industrial applications. Siemens has released patches in Mendix 10.4.0 and corresponding versions for earlier Mendix lines to address this issue.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially to those relying on Mendix-based applications for critical business processes, industrial automation, or infrastructure management. Successful exploitation can lead to unauthorized data access, data modification, and privilege escalation within affected applications, potentially resulting in data breaches, operational disruption, or compliance violations under GDPR and other regulations. Given Mendix's adoption in sectors such as manufacturing, energy, and finance, the impact could extend to operational technology environments and sensitive data repositories. The requirement for an attacker to have some authenticated access limits the risk to insider threats or attackers who have compromised initial credentials, but the ease of replay attacks means lateral movement and privilege escalation within networks could be facilitated. This could undermine trust in application integrity and confidentiality, leading to reputational damage and financial losses. Organizations with complex access control models may face challenges in fully mitigating the risk without patching. The absence of known exploits reduces immediate urgency but does not eliminate the threat, as attackers may develop exploits in the future.
Mitigation Recommendations
European organizations should immediately prioritize upgrading Mendix applications to version 10.4.0 or later, or the corresponding patched versions for Mendix 7, 8, and 9. In parallel, conduct a thorough review of application access control models to ensure least privilege principles are strictly enforced and that sensitive operations require multi-factor authentication or additional verification. Implement network segmentation and monitoring to detect unusual replay or authentication anomalies, focusing on internal traffic where authenticated sessions are used. Employ session management best practices such as binding sessions to client attributes (IP, device fingerprint) and implementing short session lifetimes to reduce replay window. Use application-layer logging and anomaly detection to identify suspicious access patterns indicative of replay attacks. Educate internal users about credential security to reduce risk of initial credential compromise. Finally, coordinate with Siemens and Mendix support for guidance on secure configuration and any additional patches or workarounds.
Affected Countries
Germany, Netherlands, United Kingdom, France, Italy, Belgium, Sweden
CVE-2023-45794: CWE-294: Authentication Bypass by Capture-replay in Siemens Mendix Applications using Mendix 10
Description
CVE-2023-45794 is an authentication bypass vulnerability affecting Siemens Mendix Applications using Mendix versions prior to 10. 4. 0, as well as earlier Mendix 7, 8, and 9 versions below specified patch levels. The flaw arises from a capture-replay weakness in the platform's authentication mechanism, potentially allowing authenticated attackers to replay captured authentication tokens or requests. Exploitation can lead to unauthorized access or modification of application objects and privilege escalation within the affected app context. The vulnerability requires an attacker with some level of authenticated access, and exploitation does not require user interaction. The CVSS score is 6. 8 (medium severity), reflecting network attack vector, low complexity, and partial privileges required. No known exploits are currently reported in the wild. European organizations using Mendix-based applications, especially in critical infrastructure or industrial sectors, should prioritize patching and reviewing access control models to mitigate risk.
AI-Powered Analysis
Technical Analysis
CVE-2023-45794 is a capture-replay authentication bypass vulnerability classified under CWE-294 that affects Siemens Mendix Applications built on Mendix 10 versions prior to 10.4.0, as well as earlier Mendix 7, 8, and 9 versions below their respective patch levels. Mendix is a low-code application development platform widely used for enterprise and industrial applications. The vulnerability stems from the platform's flawed handling of authentication tokens or session data, which can be captured by an attacker with network access and replayed to bypass authentication controls. This flaw is conditional on the app's specific model and access control design, meaning that the impact depends on how the application implements authorization and session management. An attacker who is already authenticated with low privileges can exploit this flaw to gain unauthorized access to or modify objects within the application, or escalate their privileges, potentially compromising the confidentiality and integrity of the application data. The vulnerability does not require user interaction but does require some level of authentication, limiting the attack surface to insiders or attackers who have obtained initial access. The CVSS v3.1 score of 6.8 reflects a network attack vector, low attack complexity, low privileges required, no user interaction, and high impact on confidentiality and integrity, but no impact on availability. No public exploits or active exploitation have been reported yet, but the vulnerability is significant given Mendix's use in critical business and industrial applications. Siemens has released patches in Mendix 10.4.0 and corresponding versions for earlier Mendix lines to address this issue.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially to those relying on Mendix-based applications for critical business processes, industrial automation, or infrastructure management. Successful exploitation can lead to unauthorized data access, data modification, and privilege escalation within affected applications, potentially resulting in data breaches, operational disruption, or compliance violations under GDPR and other regulations. Given Mendix's adoption in sectors such as manufacturing, energy, and finance, the impact could extend to operational technology environments and sensitive data repositories. The requirement for an attacker to have some authenticated access limits the risk to insider threats or attackers who have compromised initial credentials, but the ease of replay attacks means lateral movement and privilege escalation within networks could be facilitated. This could undermine trust in application integrity and confidentiality, leading to reputational damage and financial losses. Organizations with complex access control models may face challenges in fully mitigating the risk without patching. The absence of known exploits reduces immediate urgency but does not eliminate the threat, as attackers may develop exploits in the future.
Mitigation Recommendations
European organizations should immediately prioritize upgrading Mendix applications to version 10.4.0 or later, or the corresponding patched versions for Mendix 7, 8, and 9. In parallel, conduct a thorough review of application access control models to ensure least privilege principles are strictly enforced and that sensitive operations require multi-factor authentication or additional verification. Implement network segmentation and monitoring to detect unusual replay or authentication anomalies, focusing on internal traffic where authenticated sessions are used. Employ session management best practices such as binding sessions to client attributes (IP, device fingerprint) and implementing short session lifetimes to reduce replay window. Use application-layer logging and anomaly detection to identify suspicious access patterns indicative of replay attacks. Educate internal users about credential security to reduce risk of initial credential compromise. Finally, coordinate with Siemens and Mendix support for guidance on secure configuration and any additional patches or workarounds.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- siemens
- Date Reserved
- 2023-10-12T17:15:59.195Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6941947d9050fe8508061290
Added to database: 12/16/2025, 5:18:53 PM
Last enriched: 12/23/2025, 6:32:35 PM
Last updated: 2/7/2026, 5:48:16 AM
Views: 44
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2075: Improper Access Controls in yeqifu warehouse
MediumCVE-2026-2073: SQL Injection in itsourcecode School Management System
MediumCVE-2026-25845
LowCVE-2026-25844
LowCVE-2026-25843
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.