CVE-2020-35992
NixOS vulnerability analysis and mitigation

Overview

Fiserv Prologue through 2020-12-16 contains a vulnerability related to improper protection of database passwords. The vulnerability, identified as CVE-2020-35992, allows attackers who gain access to the configuration file (specifically, the LogPassword attribute within appconfig.ini) to decrypt stored database passwords due to the use of a static encryption key across all installations (NVD, PrologueDecrypt).

Technical details

The vulnerability has been assigned a CVSS v3.1 Base Score of 6.5 (MEDIUM) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N. The technical issue stems from Fiserv Prologue's implementation of password encryption using a static encryption key that is consistent across all installations, making it possible to decrypt database passwords stored in configuration files (NVD).

Impact

If successfully exploited, this vulnerability would allow attackers to obtain cleartext credentials for the database, potentially exposing financial records of customers stored within the database. In some cases, the compromised credentials could also enable remote login to the database (NVD).

Mitigation and workarounds

The vulnerability affects versions of Fiserv Prologue through December 16, 2020. Organizations using Fiserv Prologue should ensure they are running a version newer than the affected date (NVD).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management