Fiserv Prologue through 2020-12-16 does not properly protect the database password. If an attacker were to gain access to the configuration file (specifically, the LogPassword attribute within appconfig.ini), they would be able to decrypt the password stored within the configuration file. This would yield cleartext credentials for the database (to gain access to financial records of customers stored within the database), and in some cases would allow remote login to the database.
References
Link Resource
https://github.com/micahvandeusen/PrologueDecrypt Third Party Advisory
https://www.fiserv.com Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2022-08-23T01:02:02

Updated: 2022-08-23T01:02:02

Reserved: 2021-01-04T00:00:00


Link: CVE-2020-35992

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2022-08-23T02:15:07.427

Modified: 2022-08-25T20:45:02.167


Link: CVE-2020-35992

JSON object: View

cve-icon Redhat Information

No data.

CWE