Vulnerability Details : CVE-2004-1474
Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 and Gateway Security 320, 360, and 360R running firmware before 622 uses a default read/write SNMP community string, which allows remote attackers to alter the firewall's configuration file.
Exploit prediction scoring system (EPSS) score for CVE-2004-1474
Probability of exploitation activity in the next 30 days: 0.64%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 77 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2004-1474
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST |
References for CVE-2004-1474
- http://www.securityfocus.com/bid/11237
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/17471
-
http://securityresponse.symantec.com/avcenter/security/Content/2004.09.22.html
Patch;Vendor Advisory
- http://marc.info/?l=bugtraq&m=109588376426070&w=2
-
http://www.kb.cert.org/vuls/id/173910
Patch;Third Party Advisory;US Government Resource
Products affected by CVE-2004-1474
- cpe:2.3:h:symantec:firewall_vpn_appliance_100:*:*:*:*:*:*:*:*
- cpe:2.3:h:symantec:firewall_vpn_appliance_200:*:*:*:*:*:*:*:*
- cpe:2.3:h:symantec:firewall_vpn_appliance_200r:*:*:*:*:*:*:*:*
- cpe:2.3:h:symantec:nexland_isb_soho_firewall_appliance:*:*:*:*:*:*:*:*
- cpe:2.3:h:symantec:nexland_pro100_firewall_appliance:*:*:*:*:*:*:*:*
- cpe:2.3:h:symantec:nexland_pro400_firewall_appliance:*:*:*:*:*:*:*:*
- cpe:2.3:h:symantec:nexland_pro800_firewall_appliance:*:*:*:*:*:*:*:*
- cpe:2.3:h:symantec:nexland_pro800turbo_firewall_appliance:*:*:*:*:*:*:*:*
- cpe:2.3:h:symantec:nexland_wavebase_firewall_appliance:*:*:*:*:*:*:*:*
- cpe:2.3:h:symantec:gateway_security_320:*:*:*:*:*:*:*:*
- cpe:2.3:h:symantec:gateway_security_360:*:*:*:*:*:*:*:*
- cpe:2.3:h:symantec:gateway_security_360r:*:*:*:*:*:*:*:*