Description
Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 and Gateway Security 320, 360, and 360R running firmware before 622 allow remote attackers to bypass filtering and determine whether the device is running services such as tftpd, snmpd, or isakmp via a UDP port scan with a source port of UDP 53.
Published: 2005-02-13
Score: 5.0 Medium
EPSS: 1.9% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2004-1467 Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 and Gateway Security 320, 360, and 360R running firmware before 622 allow remote attackers to bypass filtering and determine whether the device is running services such as tftpd, snmpd, or isakmp via a UDP port scan with a source port of UDP 53.
History

No history.

Subscriptions

Symantec Firewall Vpn Appliance 100 Firewall Vpn Appliance 200 Firewall Vpn Appliance 200r Gateway Security 320 Gateway Security 360 Gateway Security 360r Nexland Isb Soho Firewall Appliance Nexland Pro100 Firewall Appliance Nexland Pro400 Firewall Appliance Nexland Pro800 Firewall Appliance Nexland Pro800turbo Firewall Appliance Nexland Wavebase Firewall Appliance
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-08T00:53:23.948Z

Reserved: 2005-02-13T00:00:00.000Z

Link: CVE-2004-1473

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2004-12-31T05:00:00.000

Modified: 2025-04-03T01:03:51.193

Link: CVE-2004-1473

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses