- Description
- Unspecified vulnerability in Arkoon FAST360 UTM appliances 3.0 through 3.0/29, 3.1, 3.2, and 3.3 allows remote attackers to bypass keyword filtering in the FAST HTTP module, and signatures in the IDPS HTTP module, via crafted URLs that are "misinterpreted."
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:arkoon:fast360:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "01FF24C5-A918-4D80-84BE-D420BA26439C",
"versionEndIncluding": "3.0_29"
},
{
"criteria": "cpe:2.3:a:arkoon:fast360:3.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "215869EF-4DD3-4B69-BBCB-24CB184C97A0"
},
{
"criteria": "cpe:2.3:a:arkoon:fast360:3.1:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "90E7CA1D-B402-40B2-A5D6-5004252C8DAA"
},
{
"criteria": "cpe:2.3:a:arkoon:fast360:3.2:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D85EF5DE-39B5-45C7-8032-75BE6B62AF9D"
},
{
"criteria": "cpe:2.3:a:arkoon:fast360:3.3:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "2ACF0F9B-E989-4813-9BDE-3DBF11C603A1"
}
],
"operator": "OR"
}
]
}
]