CVE-2020-36901
Published: 10 December 2025
Summary
CVE-2020-36901 is a high-severity CSRF (CWE-352) vulnerability in Medivision Medivision Digital Signage Firmware. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 16.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SC-23 (Session Authenticity) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SC-23 enforces session authenticity mechanisms such as anti-CSRF tokens, directly preventing attackers from forging requests to create admin users via malicious webpages.
SI-10 requires validation of information inputs at endpoints like /query/user/itSet, blocking forged requests lacking proper CSRF validation.
AC-2 establishes strict account management processes for creating administrative users, limiting unauthorized elevations even if CSRF bypasses initial validation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The CSRF vulnerability in a public-facing web endpoint (T1190) directly enables unauthenticated attackers to create local administrative accounts (T1136.001) by tricking authenticated users into submitting malicious requests.
NVD Description
UBICOD Medivision Digital Signage 1.5.1 contains a cross-site request forgery vulnerability that allows attackers to create administrative user accounts without proper request validation. Attackers can craft a malicious web page that submits a form to the /query/user/itSet endpoint to add…
more
a new admin user with elevated privileges.
Deeper analysisAI
CVE-2020-36901 is a cross-site request forgery (CSRF) vulnerability, classified under CWE-352, affecting UBICOD Medivision Digital Signage version 1.5.1. The flaw resides in the /query/user/itSet endpoint, which lacks proper request validation, enabling attackers to create administrative user accounts with elevated privileges. It has a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), indicating high severity due to its network accessibility, low attack complexity, and significant impacts on confidentiality, integrity, and availability.
Unauthenticated attackers can exploit this vulnerability by crafting a malicious web page that, when visited by a legitimate authenticated user, automatically submits a form to the vulnerable endpoint. This tricks the victim's browser into creating a new admin user account on the target system without the victim's knowledge or consent, requiring only user interaction such as visiting the attacker's page. Successful exploitation grants the attacker full administrative access, potentially allowing further compromise of the digital signage system.
Advisories from sources including VulnCheck, Zero Science (ZSL-2020-5574), and a proof-of-concept exploit on Exploit-DB (EDB-ID: 48694) document the issue, with the vendor site at medivision.co.kr listed as a reference. No specific patch or mitigation details are outlined in the available information.
Details
- CWE(s)