Vulnerability Name: CVE-2004-1473 (CCN-17470) Assigned: 2004-09-22 Published: 2004-09-22 Updated: 2017-07-11 Summary: Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 and Gateway Security 320, 360, and 360R running firmware before 622 allow remote attackers to bypass filtering and determine whether the device is running services such as tftpd, snmpd, or isakmp via a UDP port scan with a source port of UDP 53. CVSS v3 Severity: 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): NoneAvailibility (A): None
CVSS v2 Severity: 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): NoneAvailibility (A): None
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): NoneAvailibility (A): None
Vulnerability Type: CWE-Other Vulnerability Consequences: Obtain Information References: Source: CCN Type: BugTraq Mailing List, Wed Sep 22 2004 - 13:50:12 CDTMultiple Vulnerabilities in Symantec Enterprise Firewall/Gateway Security Products Source: MITRE Type: CNACVE-2004-1473 Source: MITRE Type: CNACVE-2004-1474 Source: BUGTRAQ Type: UNKNOWN20040922 Multiple Vulnerabilities in Symantec Enterprise Firewall/Gateway Security Products Source: CCN Type: SA12635Symantec Firewall/VPN Products Multiple Vulnerabilities Source: SECUNIA Type: UNKNOWN12635 Source: CCN Type: Symantec Security Response SYM04-013Symantec Enterprise Firewall/VPN and Gateway Security 300 Series Appliances Multiple Issues Source: CONFIRM Type: Patch, Vendor Advisoryhttp://securityresponse.symantec.com/avcenter/security/Content/2004.09.22.html Source: CCN Type: US-CERT VU#173910Multiple Symantec security appliances do not allow the SNMP read-write community string to be changed Source: CCN Type: US-CERT VU#329230Multiple Symantec security appliances fail to properly filter port 53/udp traffic Source: CERT-VN Type: Patch, Third Party Advisory, US Government ResourceVU#329230 Source: OSVDB Type: UNKNOWN10205 Source: CCN Type: OSVDB ID: 10205Symantec Firewall/Gateway UDP Port 53 Filter Bypass Source: CCN Type: OSVDB ID: 10206Symantec Firewall/Gateway Default SNMP String Allows Device Configuration Disclosure/Modification Source: BID Type: UNKNOWN11237 Source: CCN Type: BID-11237Symantec Enterprise Firewall/VPN Appliance Multiple Remote Vulnerabilities Source: XF Type: UNKNOWNsymantec-udp-obtain-info(17470) Source: XF Type: UNKNOWNsymantec-udp-obtain-info(17470) Vulnerable Configuration: Configuration 1 :cpe:/h:symantec:firewall_vpn_appliance_100:*:*:*:*:*:*:*:* OR cpe:/h:symantec:firewall_vpn_appliance_200:*:*:*:*:*:*:*:* OR cpe:/h:symantec:firewall_vpn_appliance_200r:*:*:*:*:*:*:*:* OR cpe:/h:symantec:gateway_security_320:*:*:*:*:*:*:*:* OR cpe:/h:symantec:gateway_security_360:*:*:*:*:*:*:*:* OR cpe:/h:symantec:gateway_security_360r:*:*:*:*:*:*:*:* OR cpe:/h:symantec:nexland_isb_soho_firewall_appliance:*:*:*:*:*:*:*:* OR cpe:/h:symantec:nexland_pro100_firewall_appliance:*:*:*:*:*:*:*:* OR cpe:/h:symantec:nexland_pro400_firewall_appliance:*:*:*:*:*:*:*:* OR cpe:/h:symantec:nexland_pro800_firewall_appliance:*:*:*:*:*:*:*:* OR cpe:/h:symantec:nexland_pro800turbo_firewall_appliance:*:*:*:*:*:*:*:* OR cpe:/h:symantec:nexland_wavebase_firewall_appliance:*:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/h:symantec:firewall_vpn_appliance_100:*:*:*:*:*:*:*:* OR cpe:/h:symantec:firewall_vpn_appliance_200:*:*:*:*:*:*:*:* OR cpe:/h:symantec:firewall_vpn_appliance_200r:*:*:*:*:*:*:*:* OR cpe:/h:symantec:gateway_security:360:*:*:*:*:*:*:* OR cpe:/h:symantec:gateway_security:360r:*:*:*:*:*:*:* AND cpe:/h:symantec:nexland_isb_soho_firewall_appliance:*:*:*:*:*:*:*:* OR cpe:/h:symantec:nexland_pro100_firewall_appliance:*:*:*:*:*:*:*:* OR cpe:/h:symantec:nexland_pro400_firewall_appliance:*:*:*:*:*:*:*:* OR cpe:/h:symantec:nexland_pro800_firewall_appliance:*:*:*:*:*:*:*:* OR cpe:/h:symantec:nexland_pro800turbo_firewall_appliance:*:*:*:*:*:*:*:* OR cpe:/h:symantec:nexland_wavebase_firewall_appliance:*:*:*:*:*:*:*:* Denotes that component is vulnerable BACK
symantec firewall vpn appliance 100 *
symantec firewall vpn appliance 200 *
symantec firewall vpn appliance 200r *
symantec gateway security 320 *
symantec gateway security 360 *
symantec gateway security 360r *
symantec nexland isb soho firewall appliance *
symantec nexland pro100 firewall appliance *
symantec nexland pro400 firewall appliance *
symantec nexland pro800 firewall appliance *
symantec nexland pro800turbo firewall appliance *
symantec nexland wavebase firewall appliance *
symantec firewall vpn appliance 100 *
symantec firewall vpn appliance 200 *
symantec firewall vpn appliance 200r *
symantec gateway security 360
symantec gateway security 360r
symantec nexland isb soho firewall appliance *
symantec nexland pro100 firewall appliance *
symantec nexland pro400 firewall appliance *
symantec nexland pro800 firewall appliance *
symantec nexland pro800turbo firewall appliance *
symantec nexland wavebase firewall appliance *