CVE-2020-37228
Published: 16 May 2026
Summary
CVE-2020-37228 is a critical-severity Improper Restriction of Excessive Authentication Attempts (CWE-307) vulnerability in Yerootech (inferred from references). Its CVSS base score is 9.8 (Critical).
Operationally, it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
This control directly enforces limits on consecutive invalid logon attempts and automatic response (e.g., lockout) to prevent brute-force exploitation of authentication mechanisms.
Specific conditions can include excessive failed attempts, triggering stronger authentication that restricts brute-force exploitation.
NVD Description
iDS6 DSSPro Digital Signage System 6.2 contains a CAPTCHA security bypass vulnerability that allows attackers to bypass authentication by requesting the autoLoginVerifyCode object. Attackers can retrieve valid CAPTCHA codes via the login endpoint and use them to perform brute-force attacks…
more
against user accounts.
Deeper analysisAI
Automated synthesis unavailable for this CVE.
Details
- CWE(s)