Impact
The vulnerability permits attackers to use purely numeric PINs for authentication in the CashDro 3 Administration Panel. Because the platform does not lock accounts after repeated incorrect PIN attempts, an attacker can brute‑force credentials with minimal effort. Successful authentication would grant access to confidential configuration settings and potentially allow full control of the system, thereby compromising confidentiality, integrity, and availability.
Affected Systems
CashDro, specifically the CashDro 3 Administration Panel version 24.01.00.26. Older releases may also be affected if they retain the numeric PIN functionality; updated releases that enforce alphanumeric PINs have mitigated the issue.
Risk and Exploitability
The CVSS base score of 9.3 indicates a critical severity, and while EPSS data is unavailable, the lack of a lockout policy suggests that brute‑force attacks are likely feasible. The vulnerability is exposed through the web interface, making it reachable by remote attackers. The vulnerability is not listed in CISA’s KEV catalog, but the potential impact remains high if active exploitation attempts occur.
OpenCVE Enrichment