Token used for resetting passwords in MegaBIP software are generated using a small space of random values combined with a queryable value.
It allows an unauthenticated attacker who know user login names to brute force these tokens and change account passwords (including these belonging to administrators).
Version 5.20 of MegaBIP fixes this issue.
Metrics
Affected Vendors & Products
References
History
Fri, 23 May 2025 12:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 23 May 2025 10:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Token used for resetting passwords in MegaBIP software are generated using a small space of random values combined with a queryable value. It allows an unauthenticated attacker who know user login names to brute force these tokens and change account passwords (including these belonging to administrators). Version 5.20 of MegaBIP fixes this issue. | |
Title | Low token entropy in MegaBIP | |
Weaknesses | CWE-334 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: CERT-PL
Published: 2025-05-23T10:20:03.919Z
Updated: 2025-05-23T12:07:48.408Z
Reserved: 2025-04-23T09:52:16.114Z
Link: CVE-2025-3895

Updated: 2025-05-23T12:07:40.900Z

Status : Awaiting Analysis
Published: 2025-05-23T11:15:32.957
Modified: 2025-05-23T15:54:42.643
Link: CVE-2025-3895

No data.