First published: Fri Dec 31 2004(Updated: )
Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 and Gateway Security 320, 360, and 360R running firmware before 622 uses a default read/write SNMP community string, which allows remote attackers to alter the firewall's configuration file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Symantec Gateway Security 360 | ||
Symantec Firewall VPN Appliance 200 | ||
Symantec Nexland Wavebase Firewall Appliance | ||
Symantec Gateway Security | ||
Symantec Nexland Pro400 Firewall Appliance | ||
Symantec Gateway Security 360 | ||
Symantec Nexland Pro800Turbo Firewall Appliance | ||
Symantec Nexland Pro800 Firewall Appliance | ||
Symantec Nexland Pro100 Firewall Appliance | ||
Symantec Firewall VPN Appliance 200R | ||
Symantec Nexland ISB SOHO Firewall Appliance | ||
Symantec Firewall VPN Appliance 100 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1474 is considered a critical vulnerability due to the potential for remote attackers to change firewall configurations.
To fix CVE-2004-1474, update your Symantec firewall or VPN appliances firmware to version 1.63 or later for the applicable models.
CVE-2004-1474 affects several models including the Symantec Firewall VPN Appliance 100, 200, 200R, and the Gateway Security 320, 360, 360R running outdated firmware.
Yes, the vulnerability in CVE-2004-1474 allows remote attackers to exploit the default SNMP community string.
The impact of CVE-2004-1474 on your network could be significant, as it allows unauthorized changes to firewall settings which could lead to loss of security and data.