Critical Security Flaws in Radware Cloud WAF Risk Filter Bypass: Patch Now
On May 7, 2025, CERT/CC exposed two high-risk vulnerabilities in Radware’s Cloud Web Application Firewall (WAF). Designated as CVE-2024-56523 and CVE-2024-56524, these flaws allow attackers to bypass security filters, enabling malicious requests to reach protected web applications.
The vulnerabilities stem from improper handling of specific HTTP requests:
These exploits undermine the core purpose of a WAF—blocking unauthorized traffic—by allowing threats like SQL injection or cross-site scripting (XSS) to reach backend systems.
CERT/CC suggests the vulnerabilities may already be patched but notes Radware has not publicly acknowledged or detailed fixes as of the advisory’s release. This lack of communication raises concerns for organizations relying on Radware’s cloud WAF for protection.
A compromised WAF leaves web applications exposed to:
While CERT/CC has not observed active exploitation, WAF bypass techniques are highly prized by cybercriminals, making preemptive mitigation critical.
WAFs are a frontline defense—ensure yours isn’t a backdoor. Prioritize investigating CVE-2024-56523 and CVE-2024-56524 to maintain robust web application security.