发布时间 :2002-10-04 00:00:00
修订时间 :2008-09-05 16:29:38

[原文]The FTP service in Watchguard Soho Firewall 5.0.35a allows remote attackers to gain privileges with a correct password but an incorrect user name.

[CNNVD]Watchguard Soho Firewall FTP加密问题漏洞(CNNVD-200210-113)

        Watchguard Soho Firewall 5.0.35a的FTP服务存在漏洞。远程攻击者可以利用该漏洞获取用户名不正确但密码正确的权限。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(VENDOR_ADVISORY)  XF  firebox-soho-ftp-insecure(9511)
(VENDOR_ADVISORY)  VULNWATCH  20020701 [VulnWatch] KPMG-2002027: Watchguard Soho FTP authentication flaw

- 漏洞信息

Watchguard Soho Firewall FTP加密问题漏洞
高危 未知
2002-10-04 00:00:00 2005-10-20 00:00:00
        Watchguard Soho Firewall 5.0.35a的FTP服务存在漏洞。远程攻击者可以利用该漏洞获取用户名不正确但密码正确的权限。

- 公告与补丁


- 漏洞信息

WatchGuard Firebox SOHO Insecure FTP Authentication
Remote / Network Access Authentication Management
Loss of Confidentiality, Loss of Integrity
Exploit Public

- 漏洞描述

WatchGuard Firebox SOHO contains a flaw that may allow a remote attacker to gain access to the FTP service. The issue is due to the FTP service not requiring a valid user name to log in. This allows an attacker to more easily brute force a valid password without the need of a matching account. If compromised, the firewall configuration and other sensitive information could be downloaded.

- 时间线

2002-07-01 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workaround: 1) Log on to the firewall http management service 2) Select "Firewall Options" 3) Make sure there is a tick next to the field "Do not allow FTP access to Trusted Network interface"

- 相关参考

- 漏洞作者