CVE-2004-1474
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
31/12/2004
Last modified:
03/04/2025
Description
Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 and Gateway Security 320, 360, and 360R running firmware before 622 uses a default read/write SNMP community string, which allows remote attackers to alter the firewall's configuration file.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:h:symantec:firewall_vpn_appliance_100:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:symantec:firewall_vpn_appliance_200:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:symantec:firewall_vpn_appliance_200r:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:symantec:gateway_security_320:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:symantec:gateway_security_360:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:symantec:gateway_security_360r:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:symantec:nexland_isb_soho_firewall_appliance:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:symantec:nexland_pro100_firewall_appliance:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:symantec:nexland_pro400_firewall_appliance:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:symantec:nexland_pro800_firewall_appliance:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:symantec:nexland_pro800turbo_firewall_appliance:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:symantec:nexland_wavebase_firewall_appliance:*:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://marc.info/?l=bugtraq&m=109588376426070&w=2
- http://secunia.com/advisories/12635
- http://securityresponse.symantec.com/avcenter/security/Content/2004.09.22.html
- http://www.kb.cert.org/vuls/id/173910
- http://www.osvdb.org/10206
- http://www.securityfocus.com/bid/11237
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17471
- http://marc.info/?l=bugtraq&m=109588376426070&w=2
- http://secunia.com/advisories/12635
- http://securityresponse.symantec.com/avcenter/security/Content/2004.09.22.html
- http://www.kb.cert.org/vuls/id/173910
- http://www.osvdb.org/10206
- http://www.securityfocus.com/bid/11237
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17471



