- Description
- WatchGuard SOHO products running firmware 5.1.6 and earlier, and Vclass/RSSA using 3.2 SP1 and earlier, allows remote attackers to bypass firewall rules by sending a PASV command string as the argument of another command to an FTP server, which generates a response that contains the string, causing IPFilter to treat the response as if it were a legitimate PASV command from the server.
- Source
- cve@mitre.org
- NVD status
- Analyzed
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
- nvd@nist.gov
- CWE-20
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:watchguard:legacy_rssa:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "39A02CDD-085D-4351-B28C-5141005116DE",
"versionEndIncluding": "3.2_sp1"
},
{
"criteria": "cpe:2.3:h:watchguard:soho:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "A96FC683-AA27-426C-8D5F-46673722A06F",
"versionEndIncluding": "5.1.6"
},
{
"criteria": "cpe:2.3:h:watchguard:vclass:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "15144365-AD24-4654-A513-AF0D864ED38F",
"versionEndIncluding": "3.2_sp1"
}
],
"operator": "OR"
}
]
}
]