CVE-2024-56523

9.1 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to bypass Radware Cloud WAF filters by sending HTTP GET requests with random data in the request body. Attackers can evade security controls to potentially access protected resources. Organizations using affected Radware Cloud WAF versions are impacted.

💻 Affected Systems

Products:
  • Radware Cloud Web Application Firewall
Versions: All versions before 2025-05-07
Operating Systems: Cloud-based service
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all configurations using HTTP GET method filtering. The vulnerability is in the WAF's request parsing logic.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete firewall bypass allowing attackers to directly attack backend applications, potentially leading to data breaches, unauthorized access, or service disruption.

🟠

Likely Case

Attackers evade specific WAF rules to exploit known vulnerabilities in protected web applications, leading to data exposure or system compromise.

🟢

If Mitigated

Limited impact with proper defense-in-depth controls, where backend applications have their own security measures and monitoring detects anomalous requests.

🌐 Internet-Facing: HIGH - Directly affects internet-facing WAFs that protect web applications from external threats.
🏢 Internal Only: MEDIUM - Internal WAF deployments could be exploited by attackers who have gained internal network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP request manipulation required. No authentication needed as it targets the WAF itself.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2025-05-07 or later

Vendor Advisory: https://radware.com/solutions/cloud-security/

Restart Required: No

Instructions:

1. Log into Radware Cloud WAF management console. 2. Check current version. 3. If before 2025-05-07, contact Radware support for update. 4. Apply the update through the cloud management interface.

🔧 Temporary Workarounds

Block HTTP GET with body

all

Configure WAF rules to reject or block HTTP GET requests containing request bodies

Configure custom WAF rule: IF request.method = GET AND request.body_exists = TRUE THEN block

Strict content-type validation

all

Enforce that GET requests must not have content-type headers typically used with request bodies

Configure rule: IF request.method = GET AND (content-type = application/x-www-form-urlencoded OR content-type = multipart/form-data OR content-type = application/json) THEN block

🧯 If You Can't Patch

  • Implement additional network filtering to block HTTP GET requests with request bodies at load balancer or proxy level
  • Enable enhanced logging and monitoring for GET requests with body content and implement alerting

🔍 How to Verify

Check if Vulnerable:

Send HTTP GET request with random data in body to protected endpoint and check if WAF blocks expected malicious payloads

Check Version:

Check version in Radware Cloud WAF management console under System Information

Verify Fix Applied:

After update, test with same GET request with body - WAF should properly process or block based on configured rules

📡 Detection & Monitoring

Log Indicators:

  • HTTP GET requests with request body content
  • WAF rule bypass events
  • Unusual GET request patterns with body data

Network Indicators:

  • HTTP GET requests with Content-Length > 0
  • GET requests with body payloads
  • Multiple GET requests with varying body content

SIEM Query:

http.method:GET AND http.request_body:* AND NOT (http.response_code:400 OR http.response_code:411)

🔗 References

📤 Share & Export