First published: Tue Feb 16 2021(Updated: )
Sensitive Cookie in HTTPS Session Without 'Secure' Attribute vulnerability in (GTA) GoToAppliance of Secomea GateManager could allow an attacker to gain access to sensitive cookies. This issue affects: Secomea GateManager all versions prior to 9.3.
Credit: VulnerabilityReporting@secomea.com
Affected Software | Affected Version | How to fix |
---|---|---|
Secomea Gatemanager 4250 Firmware | ||
Secomea GateManager | ||
Secomea Gatemanager | ||
Secomea GateManager | ||
Secomea GateManager | ||
Secomea GateManager | ||
Secomea Gatemanager 8250 Firmware | <9.3 | |
Secomea Gatemanager 8250 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2020-29024.
The severity of CVE-2020-29024 is medium with a severity value of 5.3.
CVE-2020-29024 affects Secomea GateManager all versions prior to 9.3.
An attacker can exploit CVE-2020-29024 to gain access to sensitive cookies by leveraging the missing 'Secure' attribute in the HTTPS session.
Yes, a fix is available for CVE-2020-29024. It is recommended to update to Secomea GateManager version 9.3 or later.