First published: Tue Nov 08 2022(Updated: )
A vulnerability has been identified in Mendix SAML (Mendix 7 compatible) (All versions < V1.17.0), Mendix SAML (Mendix 7 compatible) (All versions >= V1.17.0 < V1.17.2), Mendix SAML (Mendix 8 compatible) (All versions < V2.3.0), Mendix SAML (Mendix 8 compatible) (All versions >= V2.3.0 < V2.3.2), Mendix SAML (Mendix 9 compatible, New Track) (All versions < V3.3.1), Mendix SAML (Mendix 9 compatible, New Track) (All versions >= V3.3.1 < V3.3.5), Mendix SAML (Mendix 9 compatible, Upgrade Track) (All versions < V3.3.0), Mendix SAML (Mendix 9 compatible, Upgrade Track) (All versions >= V3.3.0 < V3.3.4). Affected versions of the module insufficiently protect from packet capture replay, only when the not recommended, non default configuration option `'Allow Idp Initiated Authentication'` is enabled. This CVE entry describes the incomplete fix for CVE-2022-37011 in a specific non default configuration.
Credit: productcert@siemens.com productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mendix | <1.17.0 | |
Mendix | >=2.3.0<2.3.2 | |
Mendix | >=3.3.0<3.3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-44457 is a vulnerability identified in Mendix SAML (Mendix 7 compatible) and Mendix SAML (Mendix 8 compatible) versions.
CVE-2022-44457 has a severity level of 9.8 (Critical).
CVE-2022-44457 affects Mendix SAML (Mendix 7 compatible) versions < V1.17.0, Mendix SAML (Mendix 7 compatible) versions >= V1.17.0 < V1.17.2, Mendix SAML (Mendix 8 compatible) versions < V2.3.0, and Mendix SAML (Mendix 8 compatible) versions >= V2.3.0 < V2.3.2.
To fix CVE-2022-44457, update your Mendix SAML software to a version that is not affected by the vulnerability.
You can find more information about CVE-2022-44457 at the following link: https://cert-portal.siemens.com/productcert/pdf/ssa-638652.pdf