Synology DiskStation Manager (DSM) before 6.2.3-25426-2 does not set the Secure flag for the session cookie in an HTTPS session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an HTTP session.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-20157 | Synology DiskStation Manager (DSM) before 6.2.3-25426-2 does not set the Secure flag for the session cookie in an HTTPS session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an HTTP session. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://www.synology.com/security/advisory/Synology_SA_20_18 |
|
History
Tue, 14 Jan 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:o:synology:diskstation_manager:*:*:*:*:*:*:*:* |
Status: PUBLISHED
Assigner: synology
Published:
Updated: 2024-09-16T23:10:20.265Z
Reserved: 2020-10-22T00:00:00
Link: CVE-2020-27650
No data.
Status : Modified
Published: 2020-10-29T09:15:12.793
Modified: 2025-01-14T19:29:55.853
Link: CVE-2020-27650
No data.
OpenCVE Enrichment
No data.
EUVD