First published: Wed Jun 16 2021(Updated: )
An issue was discovered on Enphase Envoy R3.x and D4.x devices. There is a custom PAM module for user authentication that circumvents traditional user authentication. This module uses a password derived from the MD5 hash of the username and serial number. The serial number can be retrieved by an unauthenticated user at /info.xml. Attempts to change the user password via passwd or other tools have no effect.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Enphase Envoy | =d4.0 | |
Enphase Envoy | =r3.0 | |
Enphase Envoy Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-25754 is considered a high severity vulnerability due to its potential to circumvent traditional authentication methods.
To remediate CVE-2020-25754, update your Enphase Envoy devices to the latest firmware version that addresses this vulnerability.
CVE-2020-25754 affects Enphase Envoy R3.x and D4.x devices using a custom PAM module for authentication.
CVE-2020-25754 involves a custom PAM module that allows authentication to be bypassed through a weak password derived from the MD5 hash of the username and serial number.
Yes, in CVE-2020-25754, the serial number can be retrieved and used to derive the password, posing a significant security risk.