CVE-2020-36917
Published: 06 January 2026
Summary
CVE-2020-36917 is a high-severity Cleartext Transmission of Sensitive Information (CWE-319) vulnerability in Cxsecurity (inferred from references). Its CVSS base score is 7.5 (High).
Operationally, ranked at the 25.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Role-based training covers secure transmission methods, mitigating cleartext transmission of sensitive data.
By requiring documented security controls for information exchanges, the control reduces the risk of cleartext transmission of sensitive data.
Mapping transmission actions in data flows helps prevent cleartext transmission of sensitive information.
Settings can enforce secure transmission protocols to prevent cleartext transmission of sensitive data.
Policy addresses secure transport and handling of media to avoid cleartext transmission of sensitive information.
Enforces safeguards against cleartext transmission of CUI when data leaves organizational boundaries to external systems.
Explicit controls and continuous oversight on external system services prevent cleartext transmission of sensitive information over provider-managed channels.
Key-establishment procedures specify secure distribution channels that preclude cleartext transmission of key material.
NVD Description
iDS6 DSSPro Digital Signage System 6.2 contains a sensitive information disclosure vulnerability that allows remote attackers to intercept authentication credentials through cleartext cookie transmission. Attackers can exploit the autoSave feature to capture user passwords during man-in-the-middle attacks on HTTP communications.
Deeper analysisAI
CVE-2020-36917 is a sensitive information disclosure vulnerability in the iDS6 DSSPro Digital Signage System version 6.2. The issue stems from cleartext transmission of cookies over HTTP, allowing remote attackers to intercept authentication credentials, particularly user passwords exposed via the autoSave feature. It is classified under CWE-319 (Cleartext Transmission of Sensitive Information) with a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), highlighting high confidentiality impact.
Remote attackers without privileges can exploit this vulnerability by conducting man-in-the-middle (MITM) attacks on HTTP communications. By positioning themselves between users and the server, attackers can capture cookies containing plaintext passwords during autoSave operations, enabling unauthorized access to affected accounts.
Advisories from CXSecurity, IBM X-Force Exchange, Packet Storm Security, and VulnCheck detail the vulnerability and exploitation method, with an archived vendor page at yerootech.com. No specific patches or mitigation steps are outlined in the referenced advisories.
Details
- CWE(s)