PatchSiren cyber security CVE debrief
CVE-2016-3124 Simplesamlphp CVE debrief
CVE-2016-3124 is an information-disclosure issue in SimpleSAMLphp’s sanitycheck module. According to NVD, versions through 1.14.0 are affected and the issue was fixed starting in 1.14.1. A remote attacker could learn the PHP version on the system through unspecified vectors, which primarily affects confidentiality rather than integrity or availability.
- Vendor
- Simplesamlphp
- Product
- CVE-2016-3124
- CVSS
- MEDIUM 5.3
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-07
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-07
- Advisory updated
- 2026-05-13
Who should care
Administrators and operators running SimpleSAMLphp instances, especially deployments on versions 1.14.0 and earlier, should review exposure of the sanitycheck module and plan an upgrade. Security teams that rely on SimpleSAMLphp for authentication or identity workflows should also account for the fingerprinting risk.
Technical summary
NVD describes the weakness as CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The CVSS v3.0 vector is AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N, indicating a network-reachable issue with no privileges required and limited confidentiality impact. The vendor advisory referenced by MITRE and NVD identifies the affected component as the sanitycheck module and the fixed release as 1.14.1.
Defensive priority
Medium-low. The issue does not indicate code execution or service disruption, but it can reveal runtime details that may help adversaries fingerprint the environment. Remediation should still be scheduled promptly for any exposed or internet-facing SimpleSAMLphp deployment.
Recommended defensive actions
- Upgrade SimpleSAMLphp to 1.14.1 or later, as identified in the vendor/NVD references.
- Check whether the sanitycheck module is reachable from untrusted networks and restrict access where possible.
- Inventory any SimpleSAMLphp instances running version 1.14.0 or earlier and prioritize remediation.
- Review external exposure and logging for suspicious requests to the affected module.
- Track the vendor advisory for any additional guidance linked from the CVE record.
Evidence notes
This debrief is based on the NVD CVE record and the vendor advisory referenced there. The supplied source data states that SimpleSAMLphp before 1.14.1 is affected and that a remote attacker may learn the PHP version via unspecified vectors. The CVSS vector and CWE classification come from the NVD metadata. No exploit details or unsupported assumptions are included.
Official resources
-
CVE-2016-3124 CVE record
CVE.org
-
CVE-2016-3124 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Vendor Advisory
Publicly disclosed in the CVE record on 2017-02-07. The CVE metadata was later modified on 2026-05-13. The vendor advisory referenced by MITRE/NVD is dated 201603-01.