Cyber Posture

CVE-2020-36908

MediumPublic PoC

Published: 06 January 2026

Published
06 January 2026
Modified
23 February 2026
KEV Added
Patch
CVSS Score 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
EPSS Score 0.0008 23.1th percentile
Risk Priority 11 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2020-36908 is a medium-severity CSRF (CWE-352) vulnerability in Securecomputing Snapgear Sg560 Firmware. Its CVSS base score is 5.3 (Medium).

Operationally, ranked at the 23.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-352

Awareness training educates users on avoiding untrusted links and actions that can be exploited via CSRF.

addresses: CWE-352

Requiring user re-entry of credentials for sensitive actions prevents automated forgery of requests without active user participation.

addresses: CWE-352

Security testing regimens explicitly include checks for missing or ineffective anti-CSRF protections in web applications.

addresses: CWE-352

Detects anomalous request patterns consistent with cross-site request forgery.

NVD Description

SnapGear Management Console SG560 version 3.1.5 contains a cross-site request forgery vulnerability that allows attackers to perform administrative actions without user consent. Attackers can craft a malicious web page that automatically submits a form to create a new super user…

more

account with full administrative privileges when a logged-in user visits the page.

Deeper analysisAI

CVE-2020-36908 is a cross-site request forgery (CSRF) vulnerability, classified under CWE-352, affecting the SnapGear Management Console SG560 version 3.1.5. The flaw enables attackers to perform unauthorized administrative actions without the consent of a legitimate user. It has a CVSS v3.1 base score of 5.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N), rated as medium severity.

An attacker can exploit this vulnerability by crafting a malicious web page that automatically submits a form to the vulnerable console, creating a new super user account with full administrative privileges. This requires a logged-in administrative user to visit the attacker's malicious page, such as through social engineering like phishing links or compromised websites. No special privileges are needed by the attacker (PR:N), and exploitation occurs over the network with low complexity.

Advisories and references, including those from IBM X-Force Exchange, Packet Storm, Exploit-DB, VulnCheck, and Zero Science, document the issue but do not specify patches or detailed mitigation steps in the provided information. Security practitioners should consult these sources for vendor guidance on updates or workarounds, such as implementing CSRF tokens or restricting administrative access.

Details

CWE(s)

Affected Products

securecomputing
snapgear sg560 firmware
3.1.5

CVEs Like This One

CVE-2020-36909Same product: Securecomputing Snapgear Sg560
CVE-2026-28495Shared CWE-352
CVE-2025-22343Shared CWE-352
CVE-2025-30564Shared CWE-352
CVE-2025-26543Shared CWE-352
CVE-2025-25907Shared CWE-352
CVE-2025-31616Shared CWE-352
CVE-2025-31449Shared CWE-352
CVE-2026-5791Shared CWE-352
CVE-2025-23990Shared CWE-352

References