Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-h3mh-3qjr-q9rg

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 and Gateway Security 320, 360, and 360R running firmware before 622 allow remote attackers to bypass filtering and determine whether the device is running services such as tftpd, snmpd, or isakmp via a UDP port scan with a source port of UDP 53.

Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 and Gateway Security 320, 360, and 360R running firmware before 622 allow remote attackers to bypass filtering and determine whether the device is running services such as tftpd, snmpd, or isakmp via a UDP port scan with a source port of UDP 53.

EPSS

Процентиль: 82%
0.0188
Низкий

Связанные уязвимости

nvd
больше 20 лет назад

Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 and Gateway Security 320, 360, and 360R running firmware before 622 allow remote attackers to bypass filtering and determine whether the device is running services such as tftpd, snmpd, or isakmp via a UDP port scan with a source port of UDP 53.

EPSS

Процентиль: 82%
0.0188
Низкий