CVE-2020-37193

7.5 HIGH

📋 TL;DR

CVE-2020-37193 is a denial of service vulnerability in ZIP Password Recovery 2.30 where attackers can crash the application by providing a specially crafted text file with specific characters. This affects users of ZIP Password Recovery 2.30 who process untrusted ZIP files, potentially disrupting legitimate password recovery operations.

💻 Affected Systems

Products:
  • ZIP Password Recovery
Versions: 2.30
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the specific version 2.30 of ZIP Password Recovery software.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete application crash preventing legitimate password recovery operations, potentially disrupting business processes that rely on this tool.

🟠

Likely Case

Temporary denial of service where the application crashes when processing malicious ZIP files, requiring restart and potentially losing recovery progress.

🟢

If Mitigated

Minimal impact if application is isolated and doesn't process untrusted files, with quick recovery through restart.

🌐 Internet-Facing: LOW - This is a desktop application, not typically exposed to internet traffic.
🏢 Internal Only: MEDIUM - Internal users could be targeted with malicious ZIP files, causing application crashes and disrupting legitimate password recovery work.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit requires creating a specially crafted text file with specific characters and convincing a user to select it in the application.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.top-password.com/purchase.html

Restart Required: No

Instructions:

No official patch available. Consider upgrading to newer version if available or using alternative software.

🔧 Temporary Workarounds

Input Validation

all

Avoid processing untrusted ZIP files with the vulnerable application

Application Isolation

windows

Run the application in isolated environment or sandbox

🧯 If You Can't Patch

  • Restrict application usage to trusted personnel only
  • Implement strict file validation policies for ZIP files processed by the application

🔍 How to Verify

Check if Vulnerable:

Check application version in Help > About menu. If version is 2.30, it is vulnerable.

Check Version:

Check Help > About menu in the application

Verify Fix Applied:

Verify application version is no longer 2.30. Test with known safe ZIP files to ensure normal operation.

📡 Detection & Monitoring

Log Indicators:

  • Application crash logs
  • Unexpected termination events in Windows Event Viewer

Network Indicators:

  • No network indicators - local file processing vulnerability

SIEM Query:

EventID=1000 OR EventID=1001 with process name containing 'ZIP Password Recovery'

🔗 References

📤 Share & Export