Description
Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 and Gateway Security 320, 360, and 360R running firmware before 622 uses a default read/write SNMP community string, which allows remote attackers to alter the firewall's configuration file.
Product(s):
- Symantec Firewall VPN Appliance 100
- Symantec Firewall_VPN Appliance 100
- Symantec Firewall VPN Appliance 200
- Symantec Firewall_VPN Appliance 200
- Symantec Firewall VPN Appliance 200R
- Symantec Firewall_VPN Appliance 200R
- Symantec Gateway Security 320
- Symantec Gateway Security 360
- Symantec Gateway Security 360R
- Symantec Nexland ISB SOHO Firewall Appliance
- Symantec Nexland Pro100 Firewall Appliance
- Symantec Nexland Pro400 Firewall Appliance
- Symantec Nexland Pro800 Firewall Appliance
- Symantec Nexland Pro800Turbo Firewall Appliance
- Symantec Nexland Pro800turbo Firewall Appliance
- Symantec Nexland WaveBase Firewall Appliance
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2004-1474, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2004-1474 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.