Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2004-1473


Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 and Gateway Security 320, 360, and 360R running firmware before 622 allow remote attackers to bypass filtering and determine whether the device is running services such as tftpd, snmpd, or isakmp via a UDP port scan with a source port of UDP 53.


Published

2004-12-31T05:00:00.000

Last Modified

2025-04-03T01:03:51.193

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 5.0 (MEDIUM)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:N/A:N

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: NONE
  • Availability Impact: NONE
Exploitability Score

10.0

Impact Score

2.9

Weaknesses
  • Type: Primary
    NVD-CWE-Other

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Hardware symantec firewall_vpn_appliance_100 * Yes
Hardware symantec firewall_vpn_appliance_200 * Yes
Hardware symantec firewall_vpn_appliance_200r * Yes
Hardware symantec gateway_security_320 * Yes
Hardware symantec gateway_security_360 * Yes
Hardware symantec gateway_security_360r * Yes
Hardware symantec nexland_isb_soho_firewall_appliance * Yes
Hardware symantec nexland_pro100_firewall_appliance * Yes
Hardware symantec nexland_pro400_firewall_appliance * Yes
Hardware symantec nexland_pro800_firewall_appliance * Yes
Hardware symantec nexland_pro800turbo_firewall_appliance * Yes
Hardware symantec nexland_wavebase_firewall_appliance * Yes

References