CVE-2024-56841
Published: 14 January 2025
Summary
CVE-2024-56841 is a high-severity LDAP Injection (CWE-90) vulnerability. Its CVSS base score is 7.4 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 20.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Mandates timely identification, reporting, and remediation of software flaws like CVE-2024-56841 through upgrading the vulnerable Mendix LDAP module.
Requires validation of inputs to LDAP queries to directly prevent injection attacks that bypass username verification.
Enables vulnerability scanning to identify systems affected by the LDAP injection flaw in Mendix LDAP prior to V1.1.2.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
LDAP injection directly enables remote exploitation of a public-facing authentication mechanism for unauthorized access.
NVD Description
A vulnerability has been identified in Mendix LDAP (All versions < V1.1.2). Affected versions of the module are vulnerable to LDAP injection. This could allow an unauthenticated remote attacker to bypass username verification.
Deeper analysisAI
CVE-2024-56841 is an LDAP injection vulnerability affecting the Mendix LDAP module in all versions prior to V1.1.2. This flaw enables attackers to manipulate LDAP queries, potentially compromising authentication mechanisms within applications using the module.
An unauthenticated remote attacker can exploit this vulnerability over the network with high attack complexity and no user interaction required. Successful exploitation allows bypassing username verification, resulting in high impacts to confidentiality and integrity (CVSS 7.4: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N), such as unauthorized access to sensitive data or systems.
The Siemens security advisory at https://cert-portal.siemens.com/productcert/html/ssa-314390.html details mitigation, recommending an upgrade to Mendix LDAP V1.1.2 or later to address the vulnerability.
Details
- CWE(s)