Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 and Gateway Security 320, 360, and 360R running firmware before 622 allow remote attackers to bypass filtering and determine whether the device is running services such as tftpd, snmpd, or isakmp via a UDP port scan with a source port of UDP 53.

Project Subscriptions

Vendors Products
Symantec Subscribe
Firewall Vpn Appliance 100 Subscribe
Firewall Vpn Appliance 200 Subscribe
Firewall Vpn Appliance 200r Subscribe
Gateway Security 320 Subscribe
Gateway Security 360 Subscribe
Gateway Security 360r Subscribe
Nexland Isb Soho Firewall Appliance Subscribe
Nexland Pro100 Firewall Appliance Subscribe
Nexland Pro400 Firewall Appliance Subscribe
Nexland Pro800 Firewall Appliance Subscribe
Nexland Pro800turbo Firewall Appliance Subscribe
Nexland Wavebase Firewall Appliance Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2004-1467 Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 and Gateway Security 320, 360, and 360R running firmware before 622 allow remote attackers to bypass filtering and determine whether the device is running services such as tftpd, snmpd, or isakmp via a UDP port scan with a source port of UDP 53.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-08T00:53:23.948Z

Reserved: 2005-02-13T00:00:00

Link: CVE-2004-1473

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2004-12-31T05:00:00.000

Modified: 2025-04-03T01:03:51.193

Link: CVE-2004-1473

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses