CVE-2020-36888
BaseFortify
Publication date: 2025-12-10
Last updated on: 2025-12-17
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| spinetix | fusion_digital_signage | to 3.4.8 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-203 | The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in SpinetiX Fusion Digital Signage 3.4.8 allows attackers to perform username enumeration through the login script. By sending specially crafted login requests with different usernames, attackers can analyze the server's error responses to determine which usernames are valid user accounts.
How can this vulnerability impact me? :
The vulnerability can allow attackers to identify valid usernames on the system, which can be used as a first step in further attacks such as password guessing, phishing, or brute force attacks, potentially leading to unauthorized access.