It allows an unauthenticated attacker who know user login names to brute force these tokens and change account passwords (including these belonging to administrators).
Version 5.20 of MegaBIP fixes this issue.
No analysis available yet.
No remediation available yet.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-27942 | Token used for resetting passwords in MegaBIP software are generated using a small space of random values combined with a queryable value. It allows an unauthenticated attacker who know user login names to brute force these tokens and change account passwords (including these belonging to administrators). Version 5.20 of MegaBIP fixes this issue. |
Fri, 23 May 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 23 May 2025 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Token used for resetting passwords in MegaBIP software are generated using a small space of random values combined with a queryable value. It allows an unauthenticated attacker who know user login names to brute force these tokens and change account passwords (including these belonging to administrators). Version 5.20 of MegaBIP fixes this issue. | |
| Title | Low token entropy in MegaBIP | |
| Weaknesses | CWE-334 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2025-05-23T12:07:48.408Z
Reserved: 2025-04-23T09:52:16.114Z
Link: CVE-2025-3895
Updated: 2025-05-23T12:07:40.900Z
Status : Deferred
Published: 2025-05-23T11:15:32.957
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-3895
No data.
OpenCVE Enrichment
Updated: 2025-06-23T19:31:59Z
EUVD