Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 and Gateway Security 320, 360, and 360R running firmware before 622 uses a default read/write SNMP community string, which allows remote attackers to alter the firewall's configuration file.
References
Link | Resource |
---|---|
http://securityresponse.symantec.com/avcenter/security/Content/2004.09.22.html | Patch Vendor Advisory |
http://www.kb.cert.org/vuls/id/173910 | Patch Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/11237 | Patch |
http://www.osvdb.org/10206 | |
http://secunia.com/advisories/12635 | |
http://marc.info/?l=bugtraq&m=109588376426070&w=2 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17471 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2004-12-30 21:00
Updated : 2017-07-10 18:31
NVD link : CVE-2004-1474
Mitre link : CVE-2004-1474
JSON object : View
CWE
Products Affected
symantec
- nexland_isb_soho_firewall_appliance
- nexland_pro400_firewall_appliance
- firewall_vpn_appliance_200r
- nexland_wavebase_firewall_appliance
- firewall_vpn_appliance_200
- gateway_security_320
- nexland_pro800_firewall_appliance
- nexland_pro800turbo_firewall_appliance
- nexland_pro100_firewall_appliance
- gateway_security_360r
- gateway_security_360
- firewall_vpn_appliance_100