First published: Mon Mar 15 2004(Updated: )
Symantec FireWall/VPN Appliance model 200 records a cleartext password for the password administration page, which may be cached on the administrator's local system or in a proxy, which allows attackers to steal the password and gain privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Symantec Firewall VPN Appliance 200 | ||
Symantec Firewall Vpn Appliance 200r | ||
Symantec Firewall VPN Appliance 100 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0190 is considered a high-severity vulnerability due to the potential for unauthorized access through the exposure of cleartext passwords.
To remediate CVE-2004-0190, you should update the Symantec FireWall/VPN Appliance to the latest version that addresses this vulnerability.
CVE-2004-0190 can significantly compromise network security by allowing attackers to gain administrative access through stolen passwords.
CVE-2004-0190 affects the Symantec Firewall/VPN Appliance models 100, 200, and 200r.
Organizations using the affected Symantec FireWall/VPN Appliance models may be vulnerable to CVE-2004-0190 if they have not applied security updates.