ID CVE-2002-1047 Type cve Reporter NVD Modified 2008-09-05T16:29:38
Description
The FTP service in Watchguard Soho Firewall 5.0.35a allows remote attackers to gain privileges with a correct password but an incorrect user name.
{"href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-1047", "history": [], "references": ["http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0139.html", "http://www.iss.net/security_center/static/9511.php"], "lastseen": "2016-09-03T03:31:44", "bulletinFamily": "NVD", "title": "CVE-2002-1047", "cpe": ["cpe:/h:watchguard:soho_firewall:5.0.35a"], "viewCount": 0, "id": "CVE-2002-1047", "hash": "a9d7214562ea2ce7d9c1da140218dcc6d4b7b750f704458aa7ccb04df3e1127c", "description": "The FTP service in Watchguard Soho Firewall 5.0.35a allows remote attackers to gain privileges with a correct password but an incorrect user name.", "edition": 1, "assessment": {"name": "", "href": "", "system": ""}, "cvelist": ["CVE-2002-1047"], "scanner": [], "modified": "2008-09-05T16:29:38", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "objectVersion": "1.2", "reporter": "NVD", "type": "cve", "published": "2002-10-04T00:00:00", "enchantments": {"vulnersScore": 3.3}}
{"result": {"osvdb": [{"id": "OSVDB:4407", "type": "osvdb", "title": "WatchGuard Firebox SOHO Insecure FTP Authentication", "description": "## Vulnerability Description\nWatchGuard Firebox SOHO contains a flaw that may allow a remote attacker to gain access to the FTP service. The issue is due to the FTP service not requiring a valid user name to log in. This allows an attacker to more easily brute force a valid password without the need of a matching account. If compromised, the firewall configuration and other sensitive information could be downloaded.\n## Solution Description\nCurrently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workaround:\n1) Log on to the firewall http management service\n2) Select \"Firewall Options\"\n3) Make sure there is a tick next to the field\n \"Do not allow FTP access to Trusted Network interface\"\n\n## Short Description\nWatchGuard Firebox SOHO contains a flaw that may allow a remote attacker to gain access to the FTP service. The issue is due to the FTP service not requiring a valid user name to log in. This allows an attacker to more easily brute force a valid password without the need of a matching account. If compromised, the firewall configuration and other sensitive information could be downloaded.\n## Manual Testing Notes\nftp -n [victim]\nquote pass <your password>\nls\nget wg.cfg\nquit\n## References:\nVendor URL: http://www.watchguard.com/\nMail List Post: http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0139.html\nISS X-Force ID: 9511\n[CVE-2002-1047](https://vulners.com/cve/CVE-2002-1047)\n", "published": "2002-07-01T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://vulners.com/osvdb/OSVDB:4407", "cvelist": ["CVE-2002-1047"], "lastseen": "2017-04-28T13:19:59"}]}}