Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2002-1979

Опубликовано: 31 дек. 2002
Источник: nvd
CVSS2: 7.5
EPSS Низкий

Описание

WatchGuard SOHO products running firmware 5.1.6 and earlier, and Vclass/RSSA using 3.2 SP1 and earlier, allows remote attackers to bypass firewall rules by sending a PASV command string as the argument of another command to an FTP server, which generates a response that contains the string, causing IPFilter to treat the response as if it were a legitimate PASV command from the server.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:h:watchguard:legacy_rssa:*:*:*:*:*:*:*:*
Версия до 3.2_sp1 (включая)
cpe:2.3:h:watchguard:soho:*:*:*:*:*:*:*:*
Версия до 5.1.6 (включая)
cpe:2.3:h:watchguard:vclass:*:*:*:*:*:*:*:*
Версия до 3.2_sp1 (включая)

EPSS

Процентиль: 45%
0.00222
Низкий

7.5 High

CVSS2

Дефекты

CWE-20

Связанные уязвимости

github
больше 3 лет назад

WatchGuard SOHO products running firmware 5.1.6 and earlier, and Vclass/RSSA using 3.2 SP1 and earlier, allows remote attackers to bypass firewall rules by sending a PASV command string as the argument of another command to an FTP server, which generates a response that contains the string, causing IPFilter to treat the response as if it were a legitimate PASV command from the server.

EPSS

Процентиль: 45%
0.00222
Низкий

7.5 High

CVSS2

Дефекты

CWE-20