ID CVE-2002-1937
Summary Symantec Firewall/VPN Appliance 100 through 200R hardcodes the administrator's MAC address inside the firewall's configuration, which allows remote attackers to spoof the administrator's MAC address and perform an ARP poisoning man-in-the-middle attack to obtain the administrator's password.
References
Vulnerable Configurations
  • cpe:2.3:h:symantec:firewall_vpn_appliance_100:*:*:*:*:*:*:*:*
    cpe:2.3:h:symantec:firewall_vpn_appliance_100:*:*:*:*:*:*:*:*
  • cpe:2.3:h:symantec:firewall_vpn_appliance_200:*:*:*:*:*:*:*:*
    cpe:2.3:h:symantec:firewall_vpn_appliance_200:*:*:*:*:*:*:*:*
  • cpe:2.3:h:symantec:firewall_vpn_appliance_200r:*:*:*:*:*:*:*:*
    cpe:2.3:h:symantec:firewall_vpn_appliance_200r:*:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 05-09-2008 - 20:31)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:P/A:N
refmap via4
bugtraq
  • 20021022 Re: Sniffing Administrator's Password in Symantec Firewall/VPN Appliance V. 200R
  • 20021022 Sniffing Administrator's Password in Symantec Firewall/VPN Appliance V. 200R
xf firewallvpn-arp-mitm(10442)
Last major update 05-09-2008 - 20:31
Published 31-12-2002 - 05:00
Last modified 05-09-2008 - 20:31
Back to Top