First published: Thu Oct 29 2020(Updated: )
Synology DiskStation Manager (DSM) before 6.2.3-25426-2 does not set the Secure flag for the session cookie in an HTTPS session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an HTTP session.
Credit: security@synology.com security@synology.com
Affected Software | Affected Version | How to fix |
---|---|---|
Synology DiskStation Manager | >=6.2<6.2.3-25426-2 | |
Synology SkyNAS Firmware | <6.2.3-25426 | |
synology skynas | ||
Synology DiskStation Manager | >=6.2<6.2.3-25426-2 | |
All of | ||
Synology SkyNAS Firmware | <6.2.3-25426 | |
synology skynas |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-27650 is a vulnerability in Synology DiskStation Manager (DSM) before version 6.2.3-25426-2 that does not set the Secure flag for the session cookie in an HTTPS session.
CVE-2020-27650 makes it easier for remote attackers to capture the session cookie by intercepting its transmission within an HTTP session.
Synology DiskStation Manager (DSM) versions before 6.2.3-25426-2 are affected by CVE-2020-27650.
CVE-2020-27650 has a severity level of medium (3.7).
To fix CVE-2020-27650, users should update to version 6.2.3-25426-2 or later of Synology DiskStation Manager (DSM).