Radware Cloud Web App Firewall Vulnerability Let Attackers Bypass Filters
Security researchers have uncovered critical vulnerabilities in Radware’s Cloud Web Application Firewall (WAF) that could allow attackers to completely bypass security filters, potentially exposing underlying web applications to various attacks. The vulnerabilities, tracked as CVE-2024-56523 and CVE-2024-56524, were publicly disclosed by CERT/CC on May 7, 2025, raising significant concerns for organizations relying on this security […] The post Radware Cloud Web App Firewall Vulnerability Let Attackers Bypass Filters appeared first on Cyber Security News.
Security researchers have uncovered critical vulnerabilities in Radware’s Cloud Web Application Firewall (WAF) that could allow attackers to completely bypass security filters, potentially exposing underlying web applications to various attacks.
The vulnerabilities, tracked as CVE-2024-56523 and CVE-2024-56524, were publicly disclosed by CERT/CC on May 7, 2025, raising significant concerns for organizations relying on this security solution.
Radware Cloud Web Application Firewall Vulnerability
Researchers discovered two distinct methods to circumvent Radware’s Cloud WAF protections. The first vulnerability (CVE-2024-56523) involves sending specially crafted HTTP GET requests containing random data in the request body.
When formatted in this specific manner, the WAF fails to properly filter the request, allowing potentially malicious content to reach the protected application.
The second vulnerability (CVE-2024-56524) exploits an insufficient validation of user-supplied input when processing special characters. By adding certain special characters to requests, attackers can cause the firewall to fail its filtering function, allowing various payloads to bypass security controls and reach the underlying web application.
“This represents a significant security issue for organizations relying solely on WAF technology for their application security posture,” noted security experts familiar with the matter.
VulDB has classified the vulnerability as critical with a CVSS meta-temperature score of 5.3, indicating moderate severity but notable risk. The most concerning aspect is that attackers with knowledge of these vulnerabilities could deliver malicious inputs directly to web applications that would normally be blocked by the WAF.
Security experts emphasize that WAFs serve as a critical defense against numerous web-based threats by blocking, filtering, and monitoring traffic.
Their primary purpose is to mitigate the risk of data breaches by preventing unauthorized data exposure. These bypass techniques potentially undermine this essential security layer.
According to CERT/CC, the vulnerabilities appear to have been fixed in recent updates. However, as of the disclosure date, Radware has reportedly not acknowledged the findings when security researcher Oriol Gegundez initially reported them.
Japanese security publication Security NEXT reported that while CERT/CC indicates the issues may be patched, detailed information about the vulnerabilities remains limited due to the lack of vendor response.
Cybersecurity experts recommend that organizations using Radware Cloud WAF ensure they are running the latest version of the product and implement additional security layers as part of a defense-in-depth strategy.
Oriol Gegundez originally reported the vulnerabilities, and Kevin Stephens and Ben Koo prepared the security advisory documentation.
Setting Up SOC Team? – Download Free Ultimate SIEM Pricing Guide (PDF) For Your SOC Team -> Free Download
The post Radware Cloud Web App Firewall Vulnerability Let Attackers Bypass Filters appeared first on Cyber Security News.