Home

Description

SecGate3600, a network firewall product developed by NSFOCUS, contains a sensitive information disclosure vulnerability in the /cgi-bin/authUser/authManageSet.cgi endpoint. The affected component fails to enforce authentication checks on POST requests to retrieve user data. An unauthenticated remote attacker can exploit this flaw to obtain sensitive information, including user identifiers and configuration details, by sending crafted requests to the vulnerable endpoint. An affected version range is undefined. Exploitation evidence was first observed by the Shadowserver Foundation on 2024-06-18 UTC.

PUBLISHED Reserved 2025-08-25 | Published 2025-08-27 | Updated 2025-08-28 | Assigner VulnCheck




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-306 Missing Authentication for Critical Function

CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

Product status

Default status
unknown

*
affected

Credits

Zhuge Liang finder

References

github.com/...in/wangshen-SecGate3600-information-leakage.py exploit

nsfocusglobal.com/products/next-gen-firewall-2/ product

www.vulncheck.com/advisories/secgate3600-firewall-info-disc third-party-advisory

cve.org (CVE-2023-7308)

nvd.nist.gov (CVE-2023-7308)

Download JSON