iDS6 DSSPro Digital Signage System CAPTCHA Bypass Vulnerability (CVE-2020-37228)
iDS6 DSSPro Digital Signage System 6.2 contains a CAPTCHA security bypass vulnerability (CVE-2020-37228) that allows attackers to bypass authentication by requesting the autoLoginVerifyCode object and performing brute-force attacks against user accounts.
iDS6 DSSPro Digital Signage System version 6.2 is vulnerable to a CAPTCHA security bypass, identified as CVE-2020-37228. This flaw allows unauthenticated attackers to circumvent the CAPTCHA mechanism by requesting the autoLoginVerifyCode object. By exploiting this vulnerability, attackers can retrieve valid CAPTCHA codes from the login endpoint and subsequently use them to conduct brute-force attacks against user accounts. The high CVSS score of 9.8 underscores the critical severity of this vulnerability, making it a significant risk for organizations using the affected digital signage system.
Attack Chain
- The attacker identifies an iDS6 DSSPro Digital Signage System 6.2 instance.
- The attacker sends a request to the login endpoint to retrieve the
autoLoginVerifyCodeobject, bypassing the CAPTCHA. - The system returns a valid CAPTCHA code to the attacker.
- The attacker uses the retrieved CAPTCHA code in a series of login attempts.
- The attacker inputs a username and attempts various passwords, along with the valid CAPTCHA.
- The system validates the CAPTCHA code, allowing the brute-force attack to proceed.
- The attacker successfully guesses a valid password for a user account.
- The attacker gains unauthorized access to the iDS6 DSSPro Digital Signage System with the compromised account.
Impact
Successful exploitation of CVE-2020-37228 allows attackers to bypass authentication mechanisms and gain unauthorized access to the iDS6 DSSPro Digital Signage System. This can lead to the compromise of sensitive information, disruption of digital signage operations, and potential further exploitation of the system. Given the high CVSS score, this poses a critical risk.
Recommendation
- Apply any available patches or upgrades provided by iDS6 to address CVE-2020-37228 on DSSPro Digital Signage System 6.2.
- Implement rate limiting on login attempts to mitigate brute-force attacks, in conjunction with the CAPTCHA bypass vulnerability.
- Deploy the Sigma rule
Detect iDS6 DSSPro Captcha Bypassto monitor for suspicious requests to the login endpoint with theautoLoginVerifyCodeobject. - Review user account access and privileges, and enforce strong password policies to reduce the risk of successful brute-force attacks.
Detection coverage 2
Detect iDS6 DSSPro Captcha Bypass
highDetects CVE-2020-37228 exploitation — request to the login endpoint to retrieve the autoLoginVerifyCode object, indicating a CAPTCHA bypass attempt.
Detect Multiple Failed Login Attempts After CAPTCHA Bypass
mediumDetects a high number of failed login attempts from the same source IP address after a CAPTCHA bypass attempt, indicating a brute-force attack.
Detection queries are available on the platform. Get full rules →