Synology DiskStation Manager (DSM) before 6.2.3-25426-2 does not set the Secure flag for the session cookie in an HTTPS session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an HTTP session.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2020-20157 | Synology DiskStation Manager (DSM) before 6.2.3-25426-2 does not set the Secure flag for the session cookie in an HTTPS session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an HTTP session. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
Link | Providers |
---|---|
https://www.synology.com/security/advisory/Synology_SA_20_18 |
![]() ![]() |
History
Tue, 14 Jan 2025 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:o:synology:diskstation_manager:*:*:*:*:*:*:*:* |

Status: PUBLISHED
Assigner: synology
Published:
Updated: 2024-09-16T23:10:20.265Z
Reserved: 2020-10-22T00:00:00
Link: CVE-2020-27650

No data.

Status : Modified
Published: 2020-10-29T09:15:12.793
Modified: 2025-01-14T19:29:55.853
Link: CVE-2020-27650

No data.

No data.