Home

Description

SnapGear Management Console SG560 version 3.1.5 contains a cross-site request forgery vulnerability that allows attackers to perform administrative actions without user consent. Attackers can craft a malicious web page that automatically submits a form to create a new super user account with full administrative privileges when a logged-in user visits the page.

PUBLISHED Reserved 2026-01-03 | Published 2026-01-06 | Updated 2026-01-06 | Assigner VulnCheck




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Problem types

Cross-Site Request Forgery (CSRF)

Product status

3.1.5
affected

Credits

LiquidWorm as Gjoko Krstic of Zero Science Lab finder

References

www.exploit-db.com/exploits/48554 (ExploitDB-48554) exploit

www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5567.php (Zero Science Lab Disclosure (ZSL-2020-5567)) third-party-advisory

packetstorm.news/files/id/157937 (Packet Storm Security Exploit Entry) exploit

exchange.xforce.ibmcloud.com/vulnerabilities/182969 (IBM X-Force Vulnerability Exchange) vdb-entry

www.vulncheck.com/...ss-site-request-forgery-via-admin-users (VulnCheck Advisory: Secure Computing SnapGear Management Console SG560 3.1.5 Cross-Site Request Forgery via Admin Users) third-party-advisory

cve.org (CVE-2020-36908)

nvd.nist.gov (CVE-2020-36908)

Download JSON