CVE-2025-56224
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-20

Last updated on: 2025-10-27

Assigner: MITRE

Description
A lack of rate limiting in the One-Time Password (OTP) verification endpoint of SigningHub v8.6.8 allows attackers to bypass verification via a bruteforce attack.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-20
Last Modified
2025-10-27
Generated
2026-05-07
AI Q&A
2025-10-20
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
ascertia signinghub to 8.6.8 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-307 The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a lack of rate limiting on the One-Time Password (OTP) verification endpoint in SigningHub version 8.6.8. Because there is no restriction on the number of OTP verification attempts, an attacker can perform a brute-force attack by rapidly trying many OTP codes until one succeeds. This allows the attacker to bypass OTP verification and impersonate another user's mobile number without knowing the actual OTP. [1]


How can this vulnerability impact me? :

The vulnerability can allow an attacker to impersonate another user by bypassing OTP verification through brute-force attacks. This can lead to unauthorized access to user accounts or services that rely on OTP verification for authentication, potentially resulting in data breaches, fraud, or other security incidents. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring the OTP verification endpoint for an unusually high volume of OTP verification attempts from the same source or targeting the same user account in a short period. Network or application logs should be analyzed for rapid successive OTP verification requests that indicate brute-force activity. Specific commands depend on your environment, but for example, using tools like 'grep' on server logs to find repeated OTP verification requests or using network monitoring tools to detect high request rates to the OTP endpoint can help. For instance, a command like 'grep "otp_verification" /var/log/app.log | awk '{print $1, $2, $3, $NF}' | sort | uniq -c | sort -nr' might help identify suspicious repeated attempts. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include implementing rate limiting on the OTP verification endpoint to restrict the number of OTP verification attempts allowed per user or IP address within a certain time frame. Additionally, revoke or invalidate the OTP code after a certain number of failed attempts to prevent brute-force attacks. Upgrading SigningHub to a version later than 8.6.8, where this vulnerability is fixed, is strongly recommended. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart