Fiserv Prologue through 2020-12-16 does not properly protect the database password. If an attacker were to gain access to the configuration file (specifically, the LogPassword attribute within appconfig.ini), they would be able to decrypt the password stored within the configuration file. This would yield cleartext credentials for the database (to gain access to financial records of customers stored within the database), and in some cases would allow remote login to the database.
References
Link | Resource |
---|---|
https://github.com/micahvandeusen/PrologueDecrypt | Third Party Advisory |
https://www.fiserv.com | Vendor Advisory |
Configurations
History
25 Aug 2022, 20:45
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-522 | |
CPE | cpe:2.3:a:fiserv:prologue:*:*:*:*:*:*:*:* | |
References | (MISC) https://www.fiserv.com - Vendor Advisory | |
References | (MISC) https://github.com/micahvandeusen/PrologueDecrypt - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
23 Aug 2022, 02:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-08-23 02:15
Updated : 2024-02-04 22:51
NVD link : CVE-2020-35992
Mitre link : CVE-2020-35992
CVE.ORG link : CVE-2020-35992
JSON object : View
Products Affected
fiserv
- prologue
CWE
CWE-522
Insufficiently Protected Credentials