Skip to content
  Sunday 9 November 2025
Trending
November 17, 2023Protecting Privacy: A Guide for State Governments to Regulate AI March 12, 2025400+ IPs Launch Coordinated Cyber Attack with SSRF Vulnerabilities October 9, 2024The majestic and mysterious world of the ocean depths has always captivated human imagination. With its vast expanses hiding untold wonders and creatures, the ocean remains one of the last frontiers to be fully explored and understood. From the towering kelp forests to the eerie depths of the abyssal plains, the ocean is a realm of endless possibilities and discoveries waiting to be made.<br /> <br /> One of the most fascinating aspects of the ocean is its incredible biodiversity. From tiny plankton to massive whales, the ocean is home to an astonishing array of life forms, each adapted to its own unique niche. The intricate web of relationships between these organisms forms the basis of the ocean’s delicate ecosystem, which is constantly in flux and under threat from human activities such as overfishing and pollution.<br /> <br /> Exploring the ocean depths is no easy task, requiring specialized equipment and a deep understanding of the challenges posed by the marine environment. From the pressure of the deep sea to the darkness of the ocean floor, scientists and explorers face numerous obstacles in their quest to uncover the secrets of the ocean. Yet, the rewards of such exploration are immense, with new species being discovered and insights gained into the workings of this vast and complex ecosystem.<br /> <br /> The ocean also plays a crucial role in regulating the Earth’s climate and supporting life on our planet. Its currents distribute heat around the globe, influencing weather patterns and climate systems. The ocean is also a major source of food and livelihood for millions of people around the world, highlighting the need for sustainable management and conservation efforts to ensure its continued health and productivity.<br /> <br /> In a world facing unprecedented environmental challenges, the ocean stands as a reminder of the interconnectedness of all life on Earth. By studying and protecting this vital ecosystem, we can gain valuable insights into our own place in the natural world and work towards a more sustainable future for both ourselves and the countless creatures that call the ocean home. May 27, 2025Beware: Hackers Trick Employees Into Sending Paychecks via Payroll Portals on Google January 26, 2024Cybersecurity Research and Development – Leadership September 23, 2025RMF Cybersecurity Analyst – TS/SCI with CI Poly June 19, 2025Linux Vulnerabilities Allow Full Root Access on Popular Distributions March 1, 2024Cybersecurity Architect January 4, 2024CISA Releases Three Industrial Control Systems Advisories December 2, 2023Advancements in AI are Revolutionizing Nurse Burnout Prevention
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Threat Advisories  Siemens Mendix SAML Module | CISA
Threat Advisories

Siemens Mendix SAML Module | CISA

Mister CybersecurityMister Cybersecurity—March 16, 20230
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail


As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens’ ProductCERT Security Advisories (CERT Services | Services | Siemens Global).

1. EXECUTIVE SUMMARY

  • CVSS v3 9.1
  • ATTENTION: Exploitable remotely / low attack complexity 
  • Vendor: Siemens 
  • Equipment: Mendix SAML Module 
  • Vulnerability: Incorrect Implementation of Authentication Algorithm 

2. RISK EVALUATION

Successful exploitation of this vulnerability could allow unauthenticated remote attackers to bypass authentication and gain access to the application. 

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

The following software from Siemens is affected: 

  • Mendix SAML (Mendix 7 compatible): Versions 1.16.4 to 1.17.2 
  • Mendix SAML (Mendix 8 compatible): Versions 2.2.0 to 2.2.3 
  • Mendix SAML (Mendix 9 compatible, New Track): Versions 3.1.9 to 3.2.5 
  • Mendix SAML (Mendix 9 compatible, Upgrade Track): Version 3.1.9 to 3.2.5 

3.2 VULNERABILITY OVERVIEW

3.2.1 INCORRECT IMPLEMENTATION OF AUTHENTICATION ALGORITHM CWE-303 

The affected versions of the module insufficiently verify the SAML assertions. This could allow unauthenticated remote attackers to bypass authentication and get access to the application. 

CVE-2023-25957 has been assigned to this vulnerability. A CVSS v3 base score of 9.1 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). 

3.3 BACKGROUND

  • CRITICAL INFRASTRUCTURE SECTORS: Critical Infrastructure 
  • COUNTRIES/AREAS DEPLOYED: Worldwide 
  • COMPANY HEADQUARTERS LOCATION: Germany 

3.4 RESEARCHER

More stories

AT&T Discloses Breach of Customer Data

July 12, 2024

Siemens SIMATIC CN 4100 | CISA

July 11, 2025

EFACEC BCU 500 | CISA

December 19, 2023

CISA Adds Three Known Exploited Vulnerabilities to Catalog

April 21, 2023

Siemens reported this vulnerability to CISA. 

4. MITIGATIONS

Siemens has identified the following specific workarounds and mitigations users can apply to reduce risk: 

As a general security measure, Siemens strongly recommends protecting network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens’ operational guidelines for industrial security, and to follow the recommendations in the product manuals. Additional information on industrial security by Siemens can be found on the Siemens website.

For further inquiries on security vulnerabilities in Siemens products and solutions, users should contact the Siemens ProductCERT.  

For more information, see the associated Siemens security advisory SSA-851884 in HTML and CSAF. 

CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:

  • Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the Internet.
  • Locate control system networks and remote devices behind firewalls and isolate them from business networks.
  • When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as its connected devices.

CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.

No known public exploits specifically target this vulnerability. 



Source link

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Mister Cybersecurity

Siemens RUGGEDCOM CROSSBOW V5.3 | CISA
Rockwell Automation Modbus TCP AOI Server
Related posts
  • Related posts
  • More from author
Threat Advisories

CISA Releases Four Industrial Control Systems Advisories

November 6, 20250
Threat Advisories

ABB FLXeon Controllers | CISA

November 6, 20250
Threat Advisories

Advantech DeviceOn/iEdge | CISA

November 6, 20250
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Careers

Cybersecurity Senior Engineer (DAST SME)

November 8, 20250
Careers

Senior Cybersecurity & Compliance Consultant

November 8, 20250
Careers

Sr. Lead Cybersecurity Architect

November 8, 20250
Careers

Cybersecurity Subject Matter/Functional Expert III

November 8, 20250
Careers

Cybersecurity Senior Data Analyst, Bureau of Audit Services

November 8, 20250
Careers

IT CYBERSECURITY SPECIALIST (CUSTSPT)

November 8, 20250
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Cybersecurity Senior Engineer (DAST SME)
  • Senior Cybersecurity & Compliance Consultant
  • Sr. Lead Cybersecurity Architect
  • Cybersecurity Subject Matter/Functional Expert III
  • Cybersecurity Senior Data Analyst, Bureau of Audit Services

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures