Vulnerability Details CVE-2004-1474
Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 and Gateway Security 320, 360, and 360R running firmware before 622 uses a default read/write SNMP community string, which allows remote attackers to alter the firewall's configuration file.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.045
EPSS Ranking 88.5%
CVSS Severity
CVSS v2 Score 5.0
Products affected by CVE-2004-1474
-
cpe:2.3:h:symantec:firewall_vpn_appliance_100:-
-
cpe:2.3:h:symantec:firewall_vpn_appliance_200:-
-
cpe:2.3:h:symantec:firewall_vpn_appliance_200r:-
-
cpe:2.3:h:symantec:gateway_security_320:-
-
cpe:2.3:h:symantec:gateway_security_360:-
-
cpe:2.3:h:symantec:gateway_security_360r:-
-
cpe:2.3:h:symantec:nexland_isb_soho_firewall_appliance:-
-
cpe:2.3:h:symantec:nexland_pro100_firewall_appliance:-
-
cpe:2.3:h:symantec:nexland_pro400_firewall_appliance:-
-
cpe:2.3:h:symantec:nexland_pro800_firewall_appliance:-
-
cpe:2.3:h:symantec:nexland_pro800turbo_firewall_appliance:-
-
cpe:2.3:h:symantec:nexland_wavebase_firewall_appliance:-