Description
Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 and Gateway Security 320, 360, and 360R running firmware before 622 allow remote attackers to bypass filtering and determine whether the device is running services such as tftpd, snmpd, or isakmp via a UDP port scan with a source port of UDP 53.
Product(s):
- Symantec Firewall VPN Appliance 100
- Symantec Firewall_VPN Appliance 100
- Symantec Firewall VPN Appliance 200
- Symantec Firewall_VPN Appliance 200
- Symantec Firewall VPN Appliance 200R
- Symantec Firewall_VPN Appliance 200R
- Symantec Gateway Security 320
- Symantec Gateway Security 360
- Symantec Gateway Security 360R
- Symantec Nexland ISB SOHO Firewall Appliance
- Symantec Nexland Pro100 Firewall Appliance
- Symantec Nexland Pro400 Firewall Appliance
- Symantec Nexland Pro800 Firewall Appliance
- Symantec Nexland Pro800Turbo Firewall Appliance
- Symantec Nexland Pro800turbo Firewall Appliance
- Symantec Nexland WaveBase Firewall Appliance
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2004-1473, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2004-1473 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.