Description
Synology DiskStation Manager (DSM) before 6.2.3-25426-2 does not set the Secure flag for the session cookie in an HTTPS session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an HTTP session.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-20157 | Synology DiskStation Manager (DSM) before 6.2.3-25426-2 does not set the Secure flag for the session cookie in an HTTPS session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an HTTP session. |
References
| Link | Providers |
|---|---|
| https://www.synology.com/security/advisory/Synology_SA_20_18 |
|
History
Tue, 14 Jan 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:o:synology:diskstation_manager:*:*:*:*:*:*:*:* |
Status: PUBLISHED
Assigner: synology
Published:
Updated: 2024-09-16T23:10:20.265Z
Reserved: 2020-10-22T00:00:00.000Z
Link: CVE-2020-27650
No data.
Status : Modified
Published: 2020-10-29T09:15:12.793
Modified: 2025-01-14T19:29:55.853
Link: CVE-2020-27650
No data.
OpenCVE Enrichment
No data.
EUVD