SecGate3600, a network firewall product developed by NSFOCUS, contains a sensitive information disclosure vulnerability in the /cgi-bin/authUser/authManageSet.cgi endpoint. The affected component fails to enforce authentication checks on POST requests to retrieve user data. An unauthenticated remote attacker can exploit this flaw to obtain sensitive information, including user identifiers and configuration details, by sending crafted requests to the vulnerable endpoint. An affected version range is undefined. Exploitation evidence was first observed by the Shadowserver Foundation on 2024-06-18 UTC.
References
Link | Resource |
---|---|
https://github.com/jjjj1029056414/selfpoc/blob/main/wangshen-SecGate3600-information-leakage.py | Exploit |
https://nsfocusglobal.com/products/next-gen-firewall-2/ | Product |
https://www.vulncheck.com/advisories/secgate3600-firewall-info-disc | Third Party Advisory |
https://www.vulncheck.com/advisories/secgate3600-firewall-info-disc | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
09 Sep 2025, 18:44
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:nsfocusglobal:secgate3600_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:nsfocusglobal:secgate3600:-:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
References | () https://github.com/jjjj1029056414/selfpoc/blob/main/wangshen-SecGate3600-information-leakage.py - Exploit | |
References | () https://nsfocusglobal.com/products/next-gen-firewall-2/ - Product | |
References | () https://www.vulncheck.com/advisories/secgate3600-firewall-info-disc - Third Party Advisory | |
First Time |
Nsfocusglobal
Nsfocusglobal secgate3600 Firmware Nsfocusglobal secgate3600 |
28 Aug 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) SecGate3600, a network firewall product developed by NSFOCUS, contains a sensitive information disclosure vulnerability in the /cgi-bin/authUser/authManageSet.cgi endpoint. The affected component fails to enforce authentication checks on POST requests to retrieve user data. An unauthenticated remote attacker can exploit this flaw to obtain sensitive information, including user identifiers and configuration details, by sending crafted requests to the vulnerable endpoint. An affected version range is undefined. Exploitation evidence was first observed by the Shadowserver Foundation on 2024-06-18 UTC. |
28 Aug 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.vulncheck.com/advisories/secgate3600-firewall-info-disc - |
27 Aug 2025, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-27 22:15
Updated : 2025-09-09 18:44
NVD link : CVE-2023-7308
Mitre link : CVE-2023-7308
CVE.ORG link : CVE-2023-7308
JSON object : View
Products Affected
nsfocusglobal
- secgate3600_firmware
- secgate3600