CVE-2024-50313

5.3 MEDIUM

📋 TL;DR

A race condition vulnerability in Mendix Runtime's basic authentication implementation allows unauthenticated remote attackers to bypass account lockout protections. This affects Mendix applications using basic authentication across multiple versions of Runtime V8, V9, and V10. Attackers could potentially brute-force credentials without triggering lockout mechanisms.

💻 Affected Systems

Products:
  • Mendix Runtime
Versions: V8 (all versions), V9 (<9.24.29), V10.6 (<10.6.15), V10.12 (<10.12.7), V10 (<10.16.0)
Operating Systems: All platforms running Mendix Runtime
Default Config Vulnerable: ✅ No
Notes: Only affects applications using basic authentication mechanism; other authentication methods are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers bypass account lockout to brute-force credentials, gaining unauthorized access to sensitive data or administrative functions.

🟠

Likely Case

Credential stuffing or brute-force attacks succeed more easily against vulnerable applications, leading to account compromise.

🟢

If Mitigated

With proper monitoring and rate limiting, attacks may be detected before significant damage occurs.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires race condition exploitation timing; no public exploit code identified yet.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V9.24.29, V10.6.15, V10.12.7, V10.16.0

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-914892.html

Restart Required: Yes

Instructions:

1. Identify Mendix Runtime version. 2. Upgrade to patched version: V9.24.29+, V10.6.15+, V10.12.7+, or V10.16.0+. 3. Restart Mendix Runtime service. 4. Verify authentication functionality.

🔧 Temporary Workarounds

Disable Basic Authentication

all

Switch to alternative authentication mechanisms (SAML, OAuth, LDAP) not affected by this vulnerability.

Modify application authentication configuration to use non-basic authentication

Implement External Rate Limiting

all

Deploy WAF or reverse proxy with rate limiting for authentication endpoints.

Configure rate limiting rules for /login or authentication endpoints

🧯 If You Can't Patch

  • Implement network-level rate limiting and monitoring for authentication attempts
  • Enable detailed logging for authentication events and monitor for brute-force patterns

🔍 How to Verify

Check if Vulnerable:

Check Mendix Runtime version and verify if basic authentication is enabled in application configuration.

Check Version:

Check Mendix Modeler or Runtime logs for version information

Verify Fix Applied:

Confirm upgraded to patched version and test authentication with multiple rapid failed attempts to verify lockout triggers properly.

📡 Detection & Monitoring

Log Indicators:

  • Multiple rapid authentication failures from same source without lockout
  • Unusual authentication patterns bypassing rate limits

Network Indicators:

  • High volume of authentication requests to /login endpoints
  • Sustained authentication attempts from single IPs

SIEM Query:

source="mendix-logs" auth_failure count by src_ip | where count > threshold

🔗 References

📤 Share & Export