CVE-2020-37168
Description
Ecommerce Systempay 1.0 contains a weak cryptographic implementation vulnerability that allows attackers to brute force the 16-character production secret key used for payment signature generation. Attackers can extract payment form data and signatures from POST requests to the payment endpoint, then use SHA1 hash comparison to iteratively test key candidates until discovering the correct production key, enabling them to forge valid payment signatures and manipulate transaction amounts.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Ecommerce Systempay 1.0 uses a weak 16-character production secret key that can be brute-forced via SHA1 hash comparison, allowing attackers to forge payment signatures and manipulate transaction amounts.
Vulnerability
Overview
Ecommerce Systempay 1.0 contains a critical cryptographic weakness in its payment signature generation. The production secret key is only 16 characters long and is used with SHA1 hashing to sign payment form data. Attackers can intercept the POST request sent to the payment endpoint (https://paiement.systempay.fr/vads-payment/) and extract both the form fields and the corresponding signature [1].
Exploitation
Method
An attacker with network access to the payment flow can capture a legitimate signed request. Using the extracted signature and form data, they can perform an offline brute-force attack against the 16-character secret key. The exploit script iterates through candidate keys, computing SHA1 hashes of the form data concatenated with each key, and compares the result to the captured signature until a match is found [1]. No authentication is required beyond observing a single payment transaction.
Impact
Once the production secret key is recovered, the attacker can forge valid signatures for any modified payment form data. This allows them to alter transaction amounts, redirect funds, or generate fake successful payment responses. The vulnerability is rated CVSS 9.8 (Critical) due to the low complexity of the attack and the high potential for financial fraud [2].
Mitigation
As of the advisory publication, no patch or vendor fix has been confirmed. Systempay users should immediately rotate their production secret keys to longer, randomly generated values and consider migrating to a stronger hashing algorithm (e.g., HMAC-SHA256) to prevent brute-force attacks. The exploit code has been publicly available since February 2020 [1].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: 1.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.