CVE-2020-37228
iDS6 · DSSPro Digital Signage System
The iDS6 DSSPro Digital Signage System 6.2 contains a CAPTCHA bypass vulnerability that allows attackers to retrieve valid codes and perform brute-force attacks against user accounts.
Executive summary
A critical authentication bypass vulnerability in iDS6 DSSPro 6.2 allows unauthenticated attackers to circumvent CAPTCHA protections and perform automated brute-force attacks.
Vulnerability
The vulnerability exists in the login endpoint, where an unauthenticated attacker can request the autoLoginVerifyCode object. This allows the attacker to bypass the intended CAPTCHA security mechanism, facilitating credential stuffing or brute-force attempts.
Business impact
By bypassing CAPTCHA, attackers can gain unauthorized access to user or administrative accounts, potentially leading to unauthorized system control or configuration changes. With a CVSS score of 9.8, this vulnerability poses a significant risk to the integrity and availability of the digital signage infrastructure.
Remediation
Immediate Action: Update the iDS6 DSSPro system to the latest available version that includes the fix for the CAPTCHA bypass.
Proactive Monitoring: Monitor authentication logs for an unusual spike in login attempts or failed authentication attempts from single IP addresses.
Compensating Controls: Implement rate-limiting at the Web Application Firewall (WAF) level to throttle requests to the login endpoint.
Exploitation status
Public Exploit Available: Unknown
Analyst recommendation
The ability to bypass authentication controls is a critical security failure. Administrators must urgently update the affected signage systems and consider implementing additional access controls, such as multi-factor authentication, if supported, to mitigate the risk of account takeover.