Skip to content

42Gears Security and Compliance Standards

Advisory ID: 42G-2023-003

Shortened Description: Bypassing CAPTCHA & Enumerating Usernames via Password Reset Page

Explanation:

Severity (CVSSv3 Range): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L

Issue date: 2023-07-25

Updated on: 2023-07-25

CVE(s): CVE-2023-3897

Impacted products: SureMDM On-premise: 6.31 and below version

Affected component: Captcha, Forgot password

Vulnerability Overview: Username enumeration is possible through Bypassing CAPTCHA in On-premise SureMDM Solution on Windows deployment allows an attacker to enumerate local user information via error message.

Known Attack Vectors: A malicious actor need to have SureMDM on-premise access to bypass the captcha and enumerate users existence.

Mitigations: Upgrade to latest SureMDM on-premise version above 6.31 or Latest version.

Acknowledgements: 42Gears would like to thank Jonas Friedli for responsibly reporting this issue to us.

Reference:

https://www.cve.org/cverecord?id=CVE-2023-3897

https://nvd.nist.gov/vuln/detail/CVE-2023-3897