First published: Tue Oct 10 2023(Updated: )
A vulnerability has been identified in Mendix Forgot Password (Mendix 10 compatible) (All versions < V5.4.0), Mendix Forgot Password (Mendix 7 compatible) (All versions < V3.7.3), Mendix Forgot Password (Mendix 8 compatible) (All versions < V4.1.3), Mendix Forgot Password (Mendix 9 compatible) (All versions < V5.4.0). Applications using the affected module are vulnerable to user enumeration due to distinguishable responses. This could allow an unauthenticated remote attacker to determine if a user is valid or not, enabling a brute force attack with valid users.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mendix | <3.7.3 | |
Mendix | >=4.0.0<4.1.3 | |
Mendix | >=5.0.0<5.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Mendix Forgot Password vulnerability is CVE-2023-43623.
All versions of Mendix Forgot Password prior to V5.4.0 for Mendix 10, V3.7.3 for Mendix 7, V4.1.3 for Mendix 8, and V5.0.0 for Mendix 9 are affected by this vulnerability.
The severity of CVE-2023-43623 is medium with a CVSS score of 5.3.
The Common Weakness Enumeration (CWE) ID for this vulnerability is CWE-203.
You can find more information about this vulnerability at the following reference: [https://cert-portal.siemens.com/productcert/pdf/ssa-295483.pdf](https://cert-portal.siemens.com/productcert/pdf/ssa-295483.pdf)