CVE-2024-56523

Radware Cloud Web Application Firewall (WAF) before 2025-05-07 allows remote attackers to bypass firewall filters by placing random data in the HTTP request body when using the HTTP GET method.
References
Link Resource
https://radware.com/solutions/cloud-security/ Product
https://www.kb.cert.org/vuls/id/722229 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

cpe:2.3:a:radware:cloud_waf:*:*:*:*:*:*:*:*

History

01 Jul 2025, 20:03

Type Values Removed Values Added
First Time Radware cloud Waf
Radware
CPE cpe:2.3:a:radware:cloud_waf:*:*:*:*:*:*:*:*
References () https://radware.com/solutions/cloud-security/ - () https://radware.com/solutions/cloud-security/ - Product
References () https://www.kb.cert.org/vuls/id/722229 - () https://www.kb.cert.org/vuls/id/722229 - Third Party Advisory, US Government Resource
Summary
  • (es) Radware Cloud Web Application Firewall (WAF) anterior al 7 de mayo de 2025 permite a atacantes remotos eludir los filtros del firewall colocando datos aleatorios en el cuerpo de la solicitud HTTP cuando se utiliza el método HTTP GET.

12 May 2025, 22:15

Type Values Removed Values Added
CWE CWE-444
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.1

12 May 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-12 15:15

Updated : 2025-07-01 20:03


NVD link : CVE-2024-56523

Mitre link : CVE-2024-56523

CVE.ORG link : CVE-2024-56523


JSON object : View

Products Affected

radware

  • cloud_waf
CWE
CWE-444

Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')