<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>DSSPro Digital Signage System 6.2 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/dsspro-digital-signage-system-6.2/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 16 May 2026 16:17:03 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/dsspro-digital-signage-system-6.2/feed.xml" rel="self" type="application/rss+xml"/><item><title>iDS6 DSSPro Digital Signage System CAPTCHA Bypass Vulnerability (CVE-2020-37228)</title><link>https://feed.craftedsignal.io/briefs/2026-05-ids6-dsspro-captcha-bypass/</link><pubDate>Sat, 16 May 2026 16:17:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-ids6-dsspro-captcha-bypass/</guid><description>iDS6 DSSPro Digital Signage System 6.2 contains a CAPTCHA security bypass vulnerability (CVE-2020-37228) that allows attackers to bypass authentication by requesting the autoLoginVerifyCode object and performing brute-force attacks against user accounts.</description><content:encoded><![CDATA[<p>iDS6 DSSPro Digital Signage System version 6.2 is vulnerable to a CAPTCHA security bypass, identified as CVE-2020-37228. This flaw allows unauthenticated attackers to circumvent the CAPTCHA mechanism by requesting the <code>autoLoginVerifyCode</code> object. By exploiting this vulnerability, attackers can retrieve valid CAPTCHA codes from the login endpoint and subsequently use them to conduct brute-force attacks against user accounts. The high CVSS score of 9.8 underscores the critical severity of this vulnerability, making it a significant risk for organizations using the affected digital signage system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an iDS6 DSSPro Digital Signage System 6.2 instance.</li>
<li>The attacker sends a request to the login endpoint to retrieve the <code>autoLoginVerifyCode</code> object, bypassing the CAPTCHA.</li>
<li>The system returns a valid CAPTCHA code to the attacker.</li>
<li>The attacker uses the retrieved CAPTCHA code in a series of login attempts.</li>
<li>The attacker inputs a username and attempts various passwords, along with the valid CAPTCHA.</li>
<li>The system validates the CAPTCHA code, allowing the brute-force attack to proceed.</li>
<li>The attacker successfully guesses a valid password for a user account.</li>
<li>The attacker gains unauthorized access to the iDS6 DSSPro Digital Signage System with the compromised account.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2020-37228 allows attackers to bypass authentication mechanisms and gain unauthorized access to the iDS6 DSSPro Digital Signage System. This can lead to the compromise of sensitive information, disruption of digital signage operations, and potential further exploitation of the system. Given the high CVSS score, this poses a critical risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or upgrades provided by iDS6 to address CVE-2020-37228 on DSSPro Digital Signage System 6.2.</li>
<li>Implement rate limiting on login attempts to mitigate brute-force attacks, in conjunction with the CAPTCHA bypass vulnerability.</li>
<li>Deploy the Sigma rule <code>Detect iDS6 DSSPro Captcha Bypass</code> to monitor for suspicious requests to the login endpoint with the <code>autoLoginVerifyCode</code> object.</li>
<li>Review user account access and privileges, and enforce strong password policies to reduce the risk of successful brute-force attacks.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>captcha-bypass</category><category>credential-access</category><category>brute-force</category></item></channel></rss>