// For flags

CVE-2020-13259

RAD SecFlow-1v SF_0290_2.3.01.26 - Cross-Site Request Forgery (Reboot)

Severity Score

8.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

3
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in the web-based management interface of RAD SecFlow-1v os-image SF_0290_2.3.01.26 could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web UI on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the affected user. This could be exploited in conjunction with CVE-2020-13260.

Una vulnerabilidad en la interfaz de administración basada en web de RAD SecFlow-1v os-image versión SF_0290_2.3.01.26, podría permitir a un atacante remoto no autenticado conducir un ataque de tipo cross-site request forgery (CSRF) en un sistema afectado. La vulnerabilidad es debido a las protecciones de CSRF insuficientes para la Interfaz de Usuario Web en un dispositivo afectado. Un atacante podría explotar esta vulnerabilidad al persuadir a un usuario de la interfaz para que siga un enlace malicioso. Una explotación con éxito podría permitir al atacante realizar acciones arbitrarias con el nivel de privilegio del usuario afectado. Esto podría ser explotado en conjunto con CVE-2020-13260

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-05-21 CVE Reserved
  • 2020-09-16 CVE Published
  • 2023-01-09 First Exploit
  • 2024-08-04 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-352: Cross-Site Request Forgery (CSRF)
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Rad
Search vendor "Rad"
Secflow-1v Firmware
Search vendor "Rad" for product "Secflow-1v Firmware"
os-image_sf_0290_2.3.01.26
Search vendor "Rad" for product "Secflow-1v Firmware" and version "os-image_sf_0290_2.3.01.26"
-
Affected
in Rad
Search vendor "Rad"
Secflow-1v
Search vendor "Rad" for product "Secflow-1v"
--
Safe