ID

VAR-200208-0171


CVE

CVE-2002-0528


TITLE

WatchGuard SOHO Firewall rules IP Limit loss vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-200208-189

DESCRIPTION

Watchguard SOHO firewall 5.0.35 unpredictably disables certain IP restrictions for customized services that were set before the administrator upgrades to 5.0.35, which could allow remote attackers to bypass the intended access control rules. SoHo firewall is a hardware firewall solution distributed and maintained by WatchGuard. A problem introduced into the 5.0.35 firmware causes the dropping of arbitrary firewall rules. When a user configures IP restrictions on certain IP addresses, the firewall may drop restriction entries arbitrarily. This could allow a remote user unintended access to a supposedly secure network

Trust: 1.26

sources: NVD: CVE-2002-0528 // BID: 4491 // VULHUB: VHN-4920

AFFECTED PRODUCTS

vendor:watchguardmodel:soho firewallscope:eqversion:5.0.35

Trust: 1.9

vendor:watchguardmodel:soho firewall ascope:neversion:5.0.35

Trust: 0.3

sources: BID: 4491 // CNNVD: CNNVD-200208-189 // NVD: CVE-2002-0528

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2002-0528
value: HIGH

Trust: 1.0

CNNVD: CNNVD-200208-189
value: CRITICAL

Trust: 0.6

VULHUB: VHN-4920
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2002-0528
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-4920
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-4920 // CNNVD: CNNVD-200208-189 // NVD: CVE-2002-0528

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2002-0528

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200208-189

TYPE

Design Error

Trust: 0.9

sources: BID: 4491 // CNNVD: CNNVD-200208-189

EXTERNAL IDS

db:BIDid:4491

Trust: 2.0

db:NVDid:CVE-2002-0528

Trust: 2.0

db:CNNVDid:CNNVD-200208-189

Trust: 0.7

db:VULNWATCHid:20020410 [VULNWATCH] KPMG-2002008: WATCHGUARD SOHO IP RESTRICTIONS FLAW

Trust: 0.6

db:XFid:8814

Trust: 0.6

db:BUGTRAQid:20020410 KPMG-2002008: WATCHGUARD SOHO IP RESTRICTIONS FLAW

Trust: 0.6

db:VULHUBid:VHN-4920

Trust: 0.1

sources: VULHUB: VHN-4920 // BID: 4491 // CNNVD: CNNVD-200208-189 // NVD: CVE-2002-0528

REFERENCES

url:http://www.securityfocus.com/bid/4491

Trust: 2.7

url:http://online.securityfocus.com/archive/1/266948

Trust: 2.7

url:http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0009.html

Trust: 2.7

url:http://www.iss.net/security_center/static/8814.php

Trust: 2.7

url:http://www.watchguard.com/

Trust: 0.3

sources: VULHUB: VHN-4920 // BID: 4491 // CNNVD: CNNVD-200208-189 // NVD: CVE-2002-0528

CREDITS

Peter Gründl※ pgrundl@kpmg.dk

Trust: 0.6

sources: CNNVD: CNNVD-200208-189

SOURCES

db:VULHUBid:VHN-4920
db:BIDid:4491
db:CNNVDid:CNNVD-200208-189
db:NVDid:CVE-2002-0528

LAST UPDATE DATE

2024-11-22T23:11:39.608000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-4920date:2008-09-05T00:00:00
db:BIDid:4491date:2009-07-11T11:56:00
db:CNNVDid:CNNVD-200208-189date:2005-10-20T00:00:00
db:NVDid:CVE-2002-0528date:2024-11-20T23:39:17.917

SOURCES RELEASE DATE

db:VULHUBid:VHN-4920date:2002-08-12T00:00:00
db:BIDid:4491date:2002-04-10T00:00:00
db:CNNVDid:CNNVD-200208-189date:2002-04-10T00:00:00
db:NVDid:CVE-2002-0528date:2002-08-12T04:00:00