First published: Fri Dec 31 2004(Updated: )
Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 and Gateway Security 320, 360, and 360R running firmware before 622 allow remote attackers to bypass filtering and determine whether the device is running services such as tftpd, snmpd, or isakmp via a UDP port scan with a source port of UDP 53.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Symantec Gateway Security 360 | ||
Symantec Firewall VPN Appliance 200 | ||
Symantec Nexland Wavebase Firewall Appliance | ||
Symantec Gateway Security | ||
Symantec Nexland Pro400 Firewall Appliance | ||
Symantec Gateway Security 360 | ||
Symantec Nexland Pro800Turbo Firewall Appliance | ||
Symantec Nexland Pro800 Firewall Appliance | ||
Symantec Nexland Pro100 Firewall Appliance | ||
Symantec Firewall VPN Appliance 200R | ||
Symantec Nexland ISB SOHO Firewall Appliance | ||
Symantec Firewall VPN Appliance 100 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1473 has a medium severity due to the ability of remote attackers to bypass filtering and enumerate services.
To fix CVE-2004-1473, upgrade the affected Symantec firewall and VPN appliances to firmware version 1.63 or later.
CVE-2004-1473 affects Symantec Enterprise Firewall/VPN Appliances 100, 200, 200R, and Gateway Security 320, 360, 360R running outdated firmware.
The impact of CVE-2004-1473 is that it allows attackers to gain information about running services on the affected devices, potentially aiding further attacks.
To verify if your device is vulnerable to CVE-2004-1473, check if it is running a firmware version prior to 1.63 or 622 for the specific models listed.