CVE-2004-1474

Severity

50%

Complexity

99%

Confidentiality

48%

Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 and Gateway Security 320, 360, and 360R running firmware before 622 uses a default read/write SNMP community string, which allows remote attackers to alter the firewall's configuration file.

Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 and Gateway Security 320, 360, and 360R running firmware before 622 uses a default read/write SNMP community string, which allows remote attackers to alter the firewall's configuration file.

CVSS 2.0 Base Score 5. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:N).

Overview

Type

Symantec

First reported 20 years ago

2004-12-31 05:00:00

Last updated 7 years ago

2017-07-11 01:31:00

Affected Software

Symantec Firewall_VPN Appliance 100

Symantec Firewall_VPN Appliance 200

Symantec Firewall_VPN Appliance 200R

Symantec Gateway Security 320

Symantec Gateway Security 360

Symantec Gateway Security 360R

Symantec Nexland ISB SOHO Firewall Appliance

Symantec Nexland Pro100 Firewall Appliance

Symantec Nexland Pro400 Firewall Appliance

Symantec Nexland Pro800 Firewall Appliance

Symantec Nexland Pro800turbo Firewall Appliance

Symantec Nexland WaveBase Firewall Appliance

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.