{"api_version":"1","generated_at":"2026-04-23T10:40:13+00:00","cve":"CVE-2004-1473","urls":{"html":"https://cve.report/CVE-2004-1473","api":"https://cve.report/api/cve/CVE-2004-1473.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2004-1473","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2004-1473"},"summary":{"title":"CVE-2004-1473","description":"Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 and Gateway Security 320, 360, and 360R running firmware before 622 allow remote attackers to bypass filtering and determine whether the device is running services such as tftpd, snmpd, or isakmp via a UDP port scan with a source port of UDP 53.","state":"PUBLISHED","assigner":"mitre","published_at":"2004-12-31 05:00:00","updated_at":"2025-04-03 01:03:51"},"problem_types":["NVD-CWE-Other","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"5","severity":"","vector":"AV:N/AC:L/Au:N/C:P/I:N/A:N","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"}}],"references":[{"url":"http://www.securityfocus.com/bid/11237","name":"http://www.securityfocus.com/bid/11237","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Symantec Enterprise Firewall/VPN Appliance Multiple Remote Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://securityresponse.symantec.com/avcenter/security/Content/2004.09.22.html","name":"http://securityresponse.symantec.com/avcenter/security/Content/2004.09.22.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Symantec Clientless VPN Gateway 4400 Series v5.0 Hotfix","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.osvdb.org/10205","name":"http://www.osvdb.org/10205","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/17470","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/17470","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.kb.cert.org/vuls/id/329230","name":"http://www.kb.cert.org/vuls/id/329230","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"],"title":"US-CERT Vulnerability Note VU#329230","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=109588376426070&w=2","name":"http://marc.info/?l=bugtraq&m=109588376426070&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"'Multiple Vulnerabilities in Symantec Enterprise Firewall/Gateway Security Products' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/12635","name":"http://secunia.com/advisories/12635","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Secunia - Advisories - Symantec Firewall/VPN Products Multiple Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2004-1473","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2004-1473","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2004","cve_id":"1473","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"symantec","cpe5":"firewall_vpn_appliance_100","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"1473","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"symantec","cpe5":"firewall_vpn_appliance_200","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"1473","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"symantec","cpe5":"firewall_vpn_appliance_200r","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"1473","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"symantec","cpe5":"gateway_security_320","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"1473","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"symantec","cpe5":"gateway_security_360","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"1473","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"symantec","cpe5":"gateway_security_360r","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"1473","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"symantec","cpe5":"nexland_isb_soho_firewall_appliance","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"1473","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"symantec","cpe5":"nexland_pro100_firewall_appliance","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"1473","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"symantec","cpe5":"nexland_pro400_firewall_appliance","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"1473","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"symantec","cpe5":"nexland_pro800turbo_firewall_appliance","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"1473","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"symantec","cpe5":"nexland_pro800_firewall_appliance","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"1473","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"symantec","cpe5":"nexland_wavebase_firewall_appliance","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-08T00:53:23.948Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"symantec-udp-obtain-info(17470)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/17470"},{"name":"12635","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/12635"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://securityresponse.symantec.com/avcenter/security/Content/2004.09.22.html"},{"name":"20040922 Multiple Vulnerabilities in Symantec Enterprise Firewall/Gateway Security Products","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=109588376426070&w=2"},{"name":"11237","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/11237"},{"name":"10205","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/10205"},{"name":"VU#329230","tags":["third-party-advisory","x_refsource_CERT-VN","x_transferred"],"url":"http://www.kb.cert.org/vuls/id/329230"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2004-09-22T00:00:00.000Z","descriptions":[{"lang":"en","value":"Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 and Gateway Security 320, 360, and 360R running firmware before 622 allow remote attackers to bypass filtering and determine whether the device is running services such as tftpd, snmpd, or isakmp via a UDP port scan with a source port of UDP 53."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-07-10T14:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"symantec-udp-obtain-info(17470)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/17470"},{"name":"12635","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/12635"},{"tags":["x_refsource_CONFIRM"],"url":"http://securityresponse.symantec.com/avcenter/security/Content/2004.09.22.html"},{"name":"20040922 Multiple Vulnerabilities in Symantec Enterprise Firewall/Gateway Security Products","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://marc.info/?l=bugtraq&m=109588376426070&w=2"},{"name":"11237","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/11237"},{"name":"10205","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/10205"},{"name":"VU#329230","tags":["third-party-advisory","x_refsource_CERT-VN"],"url":"http://www.kb.cert.org/vuls/id/329230"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2004-1473","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 and Gateway Security 320, 360, and 360R running firmware before 622 allow remote attackers to bypass filtering and determine whether the device is running services such as tftpd, snmpd, or isakmp via a UDP port scan with a source port of UDP 53."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"symantec-udp-obtain-info(17470)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/17470"},{"name":"12635","refsource":"SECUNIA","url":"http://secunia.com/advisories/12635"},{"name":"http://securityresponse.symantec.com/avcenter/security/Content/2004.09.22.html","refsource":"CONFIRM","url":"http://securityresponse.symantec.com/avcenter/security/Content/2004.09.22.html"},{"name":"20040922 Multiple Vulnerabilities in Symantec Enterprise Firewall/Gateway Security Products","refsource":"BUGTRAQ","url":"http://marc.info/?l=bugtraq&m=109588376426070&w=2"},{"name":"11237","refsource":"BID","url":"http://www.securityfocus.com/bid/11237"},{"name":"10205","refsource":"OSVDB","url":"http://www.osvdb.org/10205"},{"name":"VU#329230","refsource":"CERT-VN","url":"http://www.kb.cert.org/vuls/id/329230"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2004-1473","datePublished":"2005-02-13T05:00:00.000Z","dateReserved":"2005-02-13T00:00:00.000Z","dateUpdated":"2024-08-08T00:53:23.948Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2004-12-31 05:00:00","lastModifiedDate":"2025-04-03 01:03:51","problem_types":["NVD-CWE-Other","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:symantec:firewall_vpn_appliance_100:*:*:*:*:*:*:*:*","matchCriteriaId":"E5851263-81A6-40AE-8486-E919D5279CC7"},{"vulnerable":true,"criteria":"cpe:2.3:h:symantec:firewall_vpn_appliance_200:*:*:*:*:*:*:*:*","matchCriteriaId":"0E0D3199-365E-4D26-8D23-6492832EF096"},{"vulnerable":true,"criteria":"cpe:2.3:h:symantec:firewall_vpn_appliance_200r:*:*:*:*:*:*:*:*","matchCriteriaId":"5081F382-CC20-4C7B-A3F8-08FAF31012D9"},{"vulnerable":true,"criteria":"cpe:2.3:h:symantec:gateway_security_320:*:*:*:*:*:*:*:*","matchCriteriaId":"391E553B-0A8C-4934-8B7C-DD6C0F9FF1A7"},{"vulnerable":true,"criteria":"cpe:2.3:h:symantec:gateway_security_360:*:*:*:*:*:*:*:*","matchCriteriaId":"DEDE5E45-0984-4F8B-8FCE-52E0FBA3DEEC"},{"vulnerable":true,"criteria":"cpe:2.3:h:symantec:gateway_security_360r:*:*:*:*:*:*:*:*","matchCriteriaId":"0896A267-AE1E-47C1-9C75-67A238727F45"},{"vulnerable":true,"criteria":"cpe:2.3:h:symantec:nexland_isb_soho_firewall_appliance:*:*:*:*:*:*:*:*","matchCriteriaId":"7EACDC99-3B80-47D8-8BC4-A21CA0BC234B"},{"vulnerable":true,"criteria":"cpe:2.3:h:symantec:nexland_pro100_firewall_appliance:*:*:*:*:*:*:*:*","matchCriteriaId":"99238614-0234-4550-84FB-8B1C7B8CE1E6"},{"vulnerable":true,"criteria":"cpe:2.3:h:symantec:nexland_pro400_firewall_appliance:*:*:*:*:*:*:*:*","matchCriteriaId":"380A5A63-588D-4427-A513-147841B3FB57"},{"vulnerable":true,"criteria":"cpe:2.3:h:symantec:nexland_pro800_firewall_appliance:*:*:*:*:*:*:*:*","matchCriteriaId":"CF31AD20-099E-4323-AE18-40C52878454A"},{"vulnerable":true,"criteria":"cpe:2.3:h:symantec:nexland_pro800turbo_firewall_appliance:*:*:*:*:*:*:*:*","matchCriteriaId":"E9707BBB-8095-451D-80C7-BAC923BCB786"},{"vulnerable":true,"criteria":"cpe:2.3:h:symantec:nexland_wavebase_firewall_appliance:*:*:*:*:*:*:*:*","matchCriteriaId":"4D072C1C-FC87-4986-9320-EFD9F58F192C"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2004","CveId":"1473","Ordinal":"1","Title":"CVE-2004-1473","CVE":"CVE-2004-1473","Year":"2004"},"notes":[{"CveYear":"2004","CveId":"1473","Ordinal":"1","NoteData":"Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 and Gateway Security 320, 360, and 360R running firmware before 622 allow remote attackers to bypass filtering and determine whether the device is running services such as tftpd, snmpd, or isakmp via a UDP port scan with a source port of UDP 53.","Type":"Description","Title":"CVE-2004-1473"},{"CveYear":"2004","CveId":"1473","Ordinal":"2","NoteData":"2005-02-13","Type":"Other","Title":"Published"},{"CveYear":"2004","CveId":"1473","Ordinal":"3","NoteData":"2017-07-10","Type":"Other","Title":"Modified"}]}}}