Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Radware Says Recently Disclosed WAF Bypasses Were Patched in 2023

Radware Says Recently Disclosed WAF Bypasses Were Patched in 2023

Posted on May 13, 2025May 13, 2025 By CWS

Cybersecurity and software supply options supplier Radware has clarified that the vulnerabilities disclosed final week had been addressed again in 2023. 

An advisory printed on Might 7 by the CERT Coordination Heart (CERT/CC) at Carnegie Mellon College revealed that the Radware Cloud Internet Utility Firewall (WAF) was weak to a few filter bypass strategies that might enable risk actors to conduct assaults with out being blocked by the firewall.

The advisory describes CVE-2024-56523 and CVE-2024-56524, which may have been exploited to bypass the Radware Cloud WAF utilizing specifically crafted HTTP requests.

One technique concerned including random knowledge within the request physique with an HTTP GET technique. The second technique concerned including a particular character to the request, which brought about the firewall to fail to filter the request and allowed numerous sorts of payloads to cross by to the underlying net software.

Researcher Oriol Gegundez has been credited for reporting these points to the seller. 

CERT/CC indicated that the vulnerabilities have been fastened, however famous that “Radware had not acknowledged the reporter’s findings once they had been initially disclosed”. As well as, CERT/CC stated it had not obtained any assertion from the seller. 

Radware additionally didn’t reply to SecurityWeek’s request for clarifications when contacted final week. 

On Sunday, two days after SecurityWeek coated the vulnerabilities, Radware reached out to make clear that each points talked about within the CERT/CC advisory had been addressed by its R&D staff shortly after they had been reported to the corporate in 2023.  Commercial. Scroll to proceed studying.

“One difficulty was instantly resolved upon notification, because it didn’t affect prospects’ resolution configuration,” Radware defined. “Decision of the second difficulty included releasing and making use of a signature globally to all Radware prospects and cloud purposes. As well as, we supplied corresponding configuration tips which weren’t enforced globally because of required enter from particular person prospects. For that motive, the configuration replace has been made obtainable to prospects upon request.”

“We respect the accountable disclosure from the reporter and are dedicated to evolving the safety of our options,” the corporate stated.

Associated: RSA Convention 2025 Announcement Abstract

Associated: macOS Sequoia Replace Fixes Safety Software program Compatibility Points

Associated: ESET Vulnerability Exploited for Stealthy Malware Execution

Security Week News Tags:Bypasses, Disclosed, Patched, Radware, WAF

Post navigation

Previous Post: Marks & Spencer Says Data Stolen in Ransomware Attack
Next Post: SAP Patches Another Critical NetWeaver Vulnerability

Related Posts

Neon Cyber Emerges from Stealth, Shining a Light into the Browser Neon Cyber Emerges from Stealth, Shining a Light into the Browser Security Week News
364,000 Impacted by Data Breach at LexisNexis Risk Solutions 364,000 Impacted by Data Breach at LexisNexis Risk Solutions Security Week News
Ransomware Losses Climb as AI Pushes Phishing to New Heights Ransomware Losses Climb as AI Pushes Phishing to New Heights Security Week News
RTX Confirms Airport Services Hit by Ransomware RTX Confirms Airport Services Hit by Ransomware Security Week News
SonicWall Says Recent Attacks Don’t Involve Zero-Day Vulnerability SonicWall Says Recent Attacks Don’t Involve Zero-Day Vulnerability Security Week News
175,000 Exposed Ollama Hosts Could Enable LLM Abuse 175,000 Exposed Ollama Hosts Could Enable LLM Abuse Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News