Ecommerce Systempay 1.0 contains a weak cryptographic implementation vulnerability that allows attackers to brute force the 16-character production secret key used for payment signature generation. Attackers can extract payment form data and signatures from POST requests to the payment endpoint, then use SHA1 hash comparison to iteratively test key candidates until discovering the correct production key, enabling them to forge valid payment signatures and manipulate transaction amounts.
Metrics
Affected Vendors & Products
References
History
Wed, 13 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Ecommerce Systempay 1.0 contains a weak cryptographic implementation vulnerability that allows attackers to brute force the 16-character production secret key used for payment signature generation. Attackers can extract payment form data and signatures from POST requests to the payment endpoint, then use SHA1 hash comparison to iteratively test key candidates until discovering the correct production key, enabling them to forge valid payment signatures and manipulate transaction amounts. | |
| Title | Ecommerce Systempay 1.0 Production Key Brute Force | |
| Weaknesses | CWE-328 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-13T14:22:27.890Z
Reserved: 2026-02-06T12:30:34.927Z
Link: CVE-2020-37168
No data.
Status : Deferred
Published: 2026-05-13T16:16:31.720
Modified: 2026-05-13T17:07:21.030
Link: CVE-2020-37168
No data.
OpenCVE Enrichment
Updated: 2026-05-13T16:30:36Z