Описание
Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 and Gateway Security 320, 360, and 360R running firmware before 622 uses a default read/write SNMP community string, which allows remote attackers to alter the firewall's configuration file.
Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 and Gateway Security 320, 360, and 360R running firmware before 622 uses a default read/write SNMP community string, which allows remote attackers to alter the firewall's configuration file.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2004-1474
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17471
- http://marc.info/?l=bugtraq&m=109588376426070&w=2
- http://secunia.com/advisories/12635
- http://securityresponse.symantec.com/avcenter/security/Content/2004.09.22.html
- http://www.kb.cert.org/vuls/id/173910
- http://www.osvdb.org/10206
- http://www.securityfocus.com/bid/11237
EPSS
CVE ID
Связанные уязвимости
Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 and Gateway Security 320, 360, and 360R running firmware before 622 uses a default read/write SNMP community string, which allows remote attackers to alter the firewall's configuration file.
EPSS