Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 and Gateway Security 320, 360, and 360R running firmware before 622 allow remote attackers to bypass filtering and determine whether the device is running services such as tftpd, snmpd, or isakmp via a UDP port scan with a source port of UDP 53.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Symantec
Subscribe
|
Firewall Vpn Appliance 100
Subscribe
Firewall Vpn Appliance 200
Subscribe
Firewall Vpn Appliance 200r
Subscribe
Gateway Security 320
Subscribe
Gateway Security 360
Subscribe
Gateway Security 360r
Subscribe
Nexland Isb Soho Firewall Appliance
Subscribe
Nexland Pro100 Firewall Appliance
Subscribe
Nexland Pro400 Firewall Appliance
Subscribe
Nexland Pro800 Firewall Appliance
Subscribe
Nexland Pro800turbo Firewall Appliance
Subscribe
Nexland Wavebase Firewall Appliance
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2004-1467 | Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 and Gateway Security 320, 360, and 360R running firmware before 622 allow remote attackers to bypass filtering and determine whether the device is running services such as tftpd, snmpd, or isakmp via a UDP port scan with a source port of UDP 53. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-08T00:53:23.948Z
Reserved: 2005-02-13T00:00:00
Link: CVE-2004-1473
No data.
Status : Deferred
Published: 2004-12-31T05:00:00.000
Modified: 2025-04-03T01:03:51.193
Link: CVE-2004-1473
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD