Vulnerability Name: | CVE-2002-1937 (CCN-10442) | ||||||||
Assigned: | 2002-10-22 | ||||||||
Published: | 2002-10-22 | ||||||||
Updated: | 2008-09-05 | ||||||||
Summary: | Symantec Firewall/VPN Appliance 100 through 200R hardcodes the administrator's MAC address inside the firewall's configuration, which allows remote attackers to spoof the administrator's MAC address and perform an ARP poisoning man-in-the-middle attack to obtain the administrator's password. | ||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Bypass Security | ||||||||
References: | Source: BUGTRAQ Type: UNKNOWN 20021022 Sniffing Administrator's Password in Symantec Firewall/VPN Appliance V. 200R Source: CCN Type: BugTraq Mailing List, Tue Oct 22 2002 - 04:16:58 CDT Sniffing Administrator's Password in Symantec Firewall/VPN Appliance V. 200R Source: BUGTRAQ Type: UNKNOWN 20021022 Re: Sniffing Administrator's Password in Symantec Firewall/VPN Appliance V. 200R Source: CCN Type: BugTraq Mailing List, Tue Oct 22 2002 - 14:51:06 CDT Re: Sniffing Administrator's Password in Symantec Firewall/VPN Appliance V. 200R Source: MITRE Type: CNA CVE-2002-1937 Source: XF Type: UNKNOWN firewallvpn-arp-mitm(10442) Source: CCN Type: OSVDB ID: 59900 Symantec Firewall / VPN Appliance Hardcoded Administrator MAC Address Weakness Source: XF Type: UNKNOWN firewallvpn-arp-mitm(10442) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |