First published: Thu Oct 29 2020(Updated: )
Synology Router Manager (SRM) before 1.2.4-8081 does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.
Credit: security@synology.com
Affected Software | Affected Version | How to fix |
---|---|---|
Synology Router Manager | >=1.2<1.2.4-8081 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-27658 is a vulnerability in Synology Router Manager (SRM) that allows remote attackers to obtain potentially sensitive information via script access to the session cookie.
CVE-2020-27658 affects Synology Router Manager versions before 1.2.4-8081 by not including the HTTPOnly flag in the Set-Cookie header for the session cookie.
CVE-2020-27658 has a severity rating of high with a CVSS score of 6.1.
Remote attackers can exploit CVE-2020-27658 by using script access to the session cookie, which allows them to obtain potentially sensitive information.
Yes, you can find more information about CVE-2020-27658 at the following references: [Synology Security Advisory](https://www.synology.com/security/advisory/Synology_SA_20_14), [TALOS Intelligence](https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1086).