CVE-2020-36908
Published: 06 January 2026
Summary
CVE-2020-36908 is a medium-severity CSRF (CWE-352) vulnerability in Securecomputing Snapgear Sg560 Firmware. Its CVSS base score is 5.3 (Medium).
Operationally, ranked at the 23.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Awareness training educates users on avoiding untrusted links and actions that can be exploited via CSRF.
Requiring user re-entry of credentials for sensitive actions prevents automated forgery of requests without active user participation.
Security testing regimens explicitly include checks for missing or ineffective anti-CSRF protections in web applications.
Detects anomalous request patterns consistent with cross-site request forgery.
NVD Description
SnapGear Management Console SG560 version 3.1.5 contains a cross-site request forgery vulnerability that allows attackers to perform administrative actions without user consent. Attackers can craft a malicious web page that automatically submits a form to create a new super user…
more
account with full administrative privileges when a logged-in user visits the page.
Deeper analysisAI
CVE-2020-36908 is a cross-site request forgery (CSRF) vulnerability, classified under CWE-352, affecting the SnapGear Management Console SG560 version 3.1.5. The flaw enables attackers to perform unauthorized administrative actions without the consent of a legitimate user. It has a CVSS v3.1 base score of 5.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N), rated as medium severity.
An attacker can exploit this vulnerability by crafting a malicious web page that automatically submits a form to the vulnerable console, creating a new super user account with full administrative privileges. This requires a logged-in administrative user to visit the attacker's malicious page, such as through social engineering like phishing links or compromised websites. No special privileges are needed by the attacker (PR:N), and exploitation occurs over the network with low complexity.
Advisories and references, including those from IBM X-Force Exchange, Packet Storm, Exploit-DB, VulnCheck, and Zero Science, document the issue but do not specify patches or detailed mitigation steps in the provided information. Security practitioners should consult these sources for vendor guidance on updates or workarounds, such as implementing CSRF tokens or restricting administrative access.
Details
- CWE(s)