### [CVE-2020-28597](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28597) ![](https://img.shields.io/static/v1?label=Product&message=Epignosis&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-337%3A%20Predictable%20Seed%20in%20Pseudo-Random%20Number%20Generator%20(PRNG)&color=brighgreen) ### Description A predictable seed vulnerability exists in the password reset functionality of Epignosis EfrontPro 5.2.21. By predicting the seed it is possible to generate the correct password reset 1-time token. An attacker can visit the password reset supplying the password reset token to reset the password of an account of their choice. ### POC #### Reference - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1221 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1221 #### Github No PoCs found on GitHub currently.