PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-3124 Simplesamlphp CVE debrief

CVE-2016-3124 is an information-disclosure issue in SimpleSAMLphp’s sanitycheck module. According to NVD, versions through 1.14.0 are affected and the issue was fixed starting in 1.14.1. A remote attacker could learn the PHP version on the system through unspecified vectors, which primarily affects confidentiality rather than integrity or availability.

Vendor
Simplesamlphp
Product
CVE-2016-3124
CVSS
MEDIUM 5.3
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-07
Original CVE updated
2026-05-13
Advisory published
2017-02-07
Advisory updated
2026-05-13

Who should care

Administrators and operators running SimpleSAMLphp instances, especially deployments on versions 1.14.0 and earlier, should review exposure of the sanitycheck module and plan an upgrade. Security teams that rely on SimpleSAMLphp for authentication or identity workflows should also account for the fingerprinting risk.

Technical summary

NVD describes the weakness as CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The CVSS v3.0 vector is AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N, indicating a network-reachable issue with no privileges required and limited confidentiality impact. The vendor advisory referenced by MITRE and NVD identifies the affected component as the sanitycheck module and the fixed release as 1.14.1.

Defensive priority

Medium-low. The issue does not indicate code execution or service disruption, but it can reveal runtime details that may help adversaries fingerprint the environment. Remediation should still be scheduled promptly for any exposed or internet-facing SimpleSAMLphp deployment.

Recommended defensive actions

  • Upgrade SimpleSAMLphp to 1.14.1 or later, as identified in the vendor/NVD references.
  • Check whether the sanitycheck module is reachable from untrusted networks and restrict access where possible.
  • Inventory any SimpleSAMLphp instances running version 1.14.0 or earlier and prioritize remediation.
  • Review external exposure and logging for suspicious requests to the affected module.
  • Track the vendor advisory for any additional guidance linked from the CVE record.

Evidence notes

This debrief is based on the NVD CVE record and the vendor advisory referenced there. The supplied source data states that SimpleSAMLphp before 1.14.1 is affected and that a remote attacker may learn the PHP version via unspecified vectors. The CVSS vector and CWE classification come from the NVD metadata. No exploit details or unsupported assumptions are included.

Official resources

Publicly disclosed in the CVE record on 2017-02-07. The CVE metadata was later modified on 2026-05-13. The vendor advisory referenced by MITRE/NVD is dated 201603-01.