It allows an unauthenticated attacker who know user login names to brute force these tokens and change account passwords (including these belonging to administrators).
Version 5.20 of MegaBIP fixes this issue.
Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 23 May 2025 12:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 23 May 2025 10:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Token used for resetting passwords in MegaBIP software are generated using a small space of random values combined with a queryable value. It allows an unauthenticated attacker who know user login names to brute force these tokens and change account passwords (including these belonging to administrators). Version 5.20 of MegaBIP fixes this issue. | |
Title | Low token entropy in MegaBIP | |
Weaknesses | CWE-334 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2025-05-23T12:07:48.408Z
Reserved: 2025-04-23T09:52:16.114Z
Link: CVE-2025-3895

Updated: 2025-05-23T12:07:40.900Z

Status : Awaiting Analysis
Published: 2025-05-23T11:15:32.957
Modified: 2025-05-23T15:54:42.643
Link: CVE-2025-3895

No data.

Updated: 2025-06-23T19:31:59Z