Home

Description

iDS6 DSSPro Digital Signage System 6.2 contains a CAPTCHA security bypass vulnerability that allows attackers to bypass authentication by requesting the autoLoginVerifyCode object. Attackers can retrieve valid CAPTCHA codes via the login endpoint and use them to perform brute-force attacks against user accounts.

PUBLISHED Reserved 2026-05-15 | Published 2026-05-16 | Updated 2026-05-18 | Assigner VulnCheck




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

Improper Restriction of Excessive Authentication Attempts

Product status

6.2
affected

Credits

LiquidWorm as Gjoko Krstic of Zero Science Lab finder

References

www.exploit-db.com/exploits/48991 (ExploitDB-48991) exploit

www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5607.php (Vulnerability Advisory) vendor-advisory

www.yerootech.com (Official Product Homepage) product

www.vulncheck.com/...-signage-system-captcha-security-bypass (VulnCheck Advisory: iDS6 DSSPro Digital Signage System 6.2 CAPTCHA Security Bypass) third-party-advisory

cve.org (CVE-2020-37228)

nvd.nist.gov (CVE-2020-37228)

Download JSON