Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 05 Mar 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Exagate sysguard 3001 Firmware
|
|
| CPEs | cpe:2.3:o:exagate:sysguard_3001_firmware:6001:*:*:*:*:*:*:* | |
| Vendors & Products |
Exagate sysguard 3001 Firmware
|
Fri, 06 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Exagate
Exagate sysguard 6001 |
|
| Vendors & Products |
Exagate
Exagate sysguard 6001 |
Thu, 05 Feb 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 05 Feb 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Exagate SYSGuard 6001 contains a cross-site request forgery vulnerability that allows attackers to create unauthorized admin accounts through a crafted HTML form. Attackers can trick users into submitting a malicious form to /kulyon.php that adds a new user with administrative privileges without the victim's consent. | |
| Title | Exagate Sysguard 6001 - Cross-Site Request Forgery (Add Admin) | |
| Weaknesses | CWE-352 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-07T14:05:21.988Z
Reserved: 2026-02-03T16:27:45.308Z
Link: CVE-2020-37144
Updated: 2026-02-05T17:38:30.212Z
Status : Deferred
Published: 2026-02-05T17:16:10.067
Modified: 2026-04-15T00:35:42.020
Link: CVE-2020-37144
No data.
OpenCVE Enrichment
Updated: 2026-02-06T12:05:34Z