var-200208-0171
Vulnerability from variot

Watchguard SOHO firewall 5.0.35 unpredictably disables certain IP restrictions for customized services that were set before the administrator upgrades to 5.0.35, which could allow remote attackers to bypass the intended access control rules. SoHo firewall is a hardware firewall solution distributed and maintained by WatchGuard. A problem introduced into the 5.0.35 firmware causes the dropping of arbitrary firewall rules. When a user configures IP restrictions on certain IP addresses, the firewall may drop restriction entries arbitrarily. This could allow a remote user unintended access to a supposedly secure network

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200208-0171",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "soho firewall",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "watchguard",
        "version": "5.0.35"
      },
      {
        "model": "soho firewall a",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "watchguard",
        "version": "5.0.35"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "4491"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200208-189"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0528"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Peter Gr\u00fcndl\u203b pgrundl@kpmg.dk",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200208-189"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2002-0528",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2002-0528",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.0,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-4920",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2002-0528",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200208-189",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-4920",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-4920"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200208-189"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0528"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Watchguard SOHO firewall 5.0.35 unpredictably disables certain IP restrictions for customized services that were set before the administrator upgrades to 5.0.35, which could allow remote attackers to bypass the intended access control rules. SoHo firewall is a hardware firewall solution distributed and maintained by WatchGuard. \nA problem introduced into the 5.0.35 firmware causes the dropping of arbitrary firewall rules.  When a user configures IP restrictions on certain IP addresses, the firewall may drop restriction entries arbitrarily.  This could allow a remote user unintended access to a supposedly secure network",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2002-0528"
      },
      {
        "db": "BID",
        "id": "4491"
      },
      {
        "db": "VULHUB",
        "id": "VHN-4920"
      }
    ],
    "trust": 1.26
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "4491",
        "trust": 2.0
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0528",
        "trust": 2.0
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200208-189",
        "trust": 0.7
      },
      {
        "db": "VULNWATCH",
        "id": "20020410 [VULNWATCH] KPMG-2002008: WATCHGUARD SOHO IP RESTRICTIONS FLAW",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "8814",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20020410 KPMG-2002008: WATCHGUARD SOHO IP RESTRICTIONS FLAW",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-4920",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-4920"
      },
      {
        "db": "BID",
        "id": "4491"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200208-189"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0528"
      }
    ]
  },
  "id": "VAR-200208-0171",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-4920"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-22T23:11:39.608000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2002-0528"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.7,
        "url": "http://www.securityfocus.com/bid/4491"
      },
      {
        "trust": 2.7,
        "url": "http://online.securityfocus.com/archive/1/266948"
      },
      {
        "trust": 2.7,
        "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0009.html"
      },
      {
        "trust": 2.7,
        "url": "http://www.iss.net/security_center/static/8814.php"
      },
      {
        "trust": 0.3,
        "url": "http://www.watchguard.com/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-4920"
      },
      {
        "db": "BID",
        "id": "4491"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200208-189"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0528"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-4920"
      },
      {
        "db": "BID",
        "id": "4491"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200208-189"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0528"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2002-08-12T00:00:00",
        "db": "VULHUB",
        "id": "VHN-4920"
      },
      {
        "date": "2002-04-10T00:00:00",
        "db": "BID",
        "id": "4491"
      },
      {
        "date": "2002-04-10T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200208-189"
      },
      {
        "date": "2002-08-12T04:00:00",
        "db": "NVD",
        "id": "CVE-2002-0528"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2008-09-05T00:00:00",
        "db": "VULHUB",
        "id": "VHN-4920"
      },
      {
        "date": "2009-07-11T11:56:00",
        "db": "BID",
        "id": "4491"
      },
      {
        "date": "2005-10-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200208-189"
      },
      {
        "date": "2024-11-20T23:39:17.917000",
        "db": "NVD",
        "id": "CVE-2002-0528"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200208-189"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "WatchGuard SOHO Firewall rules IP Limit loss vulnerability",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200208-189"
      }
    ],
    "trust": 0.6
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Design Error",
    "sources": [
      {
        "db": "BID",
        "id": "4491"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200208-189"
      }
    ],
    "trust": 0.9
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.