It allows an unauthenticated attacker who know user login names to brute force these tokens and change account passwords (including these belonging to administrators).
Version 5.20 of MegaBIP fixes this issue.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-27942 | Token used for resetting passwords in MegaBIP software are generated using a small space of random values combined with a queryable value. It allows an unauthenticated attacker who know user login names to brute force these tokens and change account passwords (including these belonging to administrators). Version 5.20 of MegaBIP fixes this issue. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 23 May 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 23 May 2025 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Token used for resetting passwords in MegaBIP software are generated using a small space of random values combined with a queryable value. It allows an unauthenticated attacker who know user login names to brute force these tokens and change account passwords (including these belonging to administrators). Version 5.20 of MegaBIP fixes this issue. | |
| Title | Low token entropy in MegaBIP | |
| Weaknesses | CWE-334 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2025-05-23T12:07:48.408Z
Reserved: 2025-04-23T09:52:16.114Z
Link: CVE-2025-3895
Updated: 2025-05-23T12:07:40.900Z
Status : Awaiting Analysis
Published: 2025-05-23T11:15:32.957
Modified: 2025-05-23T15:54:42.643
Link: CVE-2025-3895
No data.
OpenCVE Enrichment
Updated: 2025-06-23T19:31:59Z
EUVD