CVE-2020-36968
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-28

Last updated on: 2026-02-03

Assigner: VulnCheck

Description
M/Monit 3.7.4 contains an authentication vulnerability that allows authenticated attackers to retrieve user password hashes through an administrative API endpoint. Attackers can send requests to the /api/1/admin/users/list and /api/1/admin/users/get endpoints to extract MD5 password hashes for all users.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-28
Last Modified
2026-02-03
Generated
2026-05-07
AI Q&A
2026-01-29
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
tildeslash m\/monit 3.7.4
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-522 The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking if unauthorized or authenticated users can access the administrative API endpoints /api/1/admin/users/list and /api/1/admin/users/get to retrieve user password hashes. You can test this by sending authenticated HTTP requests to these endpoints and observing if MD5 password hashes are returned. For example, using curl commands with valid credentials: curl -u username:password https://<mmonit-server>/api/1/admin/users/list curl -u username:password https://<mmonit-server>/api/1/admin/users/get


Can you explain this vulnerability to me?

This vulnerability in M/Monit 3.7.4 allows authenticated attackers to retrieve user password hashes by exploiting an administrative API endpoint. Specifically, attackers can send requests to the /api/1/admin/users/list and /api/1/admin/users/get endpoints to extract MD5 password hashes for all users.


How can this vulnerability impact me? :

The vulnerability can lead to unauthorized disclosure of user password hashes, which could allow attackers to attempt to crack these hashes and gain unauthorized access to user accounts. This compromises user credential confidentiality and potentially leads to further unauthorized access within the system.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to the administrative API endpoints /api/1/admin/users/list and /api/1/admin/users/get to only trusted and necessary users, ensuring strong authentication and authorization controls are in place, and monitoring API access logs for suspicious activity. Additionally, consider updating or patching M/Monit to a version where this vulnerability is fixed if available.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart