Radware Cloud Web Application Firewall (WAF) before 2025-05-07 allows remote attackers to bypass firewall filters by placing random data in the HTTP request body when using the HTTP GET method.
References
Link | Resource |
---|---|
https://radware.com/solutions/cloud-security/ | Product |
https://www.kb.cert.org/vuls/id/722229 | Third Party Advisory US Government Resource |
Configurations
History
01 Jul 2025, 20:03
Type | Values Removed | Values Added |
---|---|---|
First Time |
Radware cloud Waf
Radware |
|
CPE | cpe:2.3:a:radware:cloud_waf:*:*:*:*:*:*:*:* | |
References | () https://radware.com/solutions/cloud-security/ - Product | |
References | () https://www.kb.cert.org/vuls/id/722229 - Third Party Advisory, US Government Resource | |
Summary |
|
12 May 2025, 22:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-444 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.1 |
12 May 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-12 15:15
Updated : 2025-07-01 20:03
NVD link : CVE-2024-56523
Mitre link : CVE-2024-56523
CVE.ORG link : CVE-2024-56523
JSON object : View
Products Affected
radware
- cloud_waf
CWE
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')