SnapGear Management Console SG560 version 3.1.5 contains a cross-site request forgery vulnerability that allows attackers to perform administrative actions without user consent. Attackers can craft a malicious web page that automatically submits a form to create a new super user account with full administrative privileges when a logged-in user visits the page.
References
| Link | Resource |
|---|---|
| https://exchange.xforce.ibmcloud.com/vulnerabilities/182969 | Third Party Advisory |
| https://packetstorm.news/files/id/157937 | Exploit Third Party Advisory |
| https://www.exploit-db.com/exploits/48554 | Exploit Third Party Advisory VDB Entry |
| https://www.vulncheck.com/advisories/secure-computing-snapgear-management-console-sg-cross-site-request-forgery-via-admin-users | Third Party Advisory |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5567.php | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-01-06 16:15
Updated : 2026-02-23 19:00
NVD link : CVE-2020-36908
Mitre link : CVE-2020-36908
CVE.ORG link : CVE-2020-36908
JSON object : View
Products Affected
securecomputing
- snapgear_sg560
- snapgear_sg560_firmware
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
