First published: Thu Oct 29 2020(Updated: )
Synology Router Manager (SRM) before 1.2.4-8081 does not set the Secure flag for the session cookie in an HTTPS session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an HTTP session.
Credit: security@synology.com
Affected Software | Affected Version | How to fix |
---|---|---|
Synology Router Manager | >=1.2<1.2.4-8081 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-27651 is a vulnerability in Synology Router Manager (SRM) before version 1.2.4-8081, which does not set the Secure flag for the session cookie in an HTTPS session, making it easier for remote attackers to capture the cookie.
CVE-2020-27651 allows remote attackers to capture the session cookie in an HTTPS session, compromising the security of Synology Router Manager.
CVE-2020-27651 has a severity rating of high with a CVSS score of 8.1.
To mitigate CVE-2020-27651, users should update Synology Router Manager to version 1.2.4-8081 or higher, which sets the Secure flag for the session cookie in an HTTPS session.
You can find more information about CVE-2020-27651 in the Synology Security Advisory at https://www.synology.com/security/advisory/Synology_SA_20_14 and in the vulnerability report published by Talos Intelligence at https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1059.