CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
AI Score
Confidence
Low
EPSS
Percentile
78.0%
WatchGuard SOHO products running firmware 5.1.6 and earlier, and Vclass/RSSA using 3.2 SP1 and earlier, allows remote attackers to bypass firewall rules by sending a PASV command string as the argument of another command to an FTP server, which generates a response that contains the string, causing IPFilter to treat the response as if it were a legitimate PASV command from the server.
Vendor | Product | Version | CPE |
---|---|---|---|
watchguard | legacy_rssa | * | cpe:2.3:h:watchguard:legacy_rssa:*:*:*:*:*:*:*:* |
watchguard | soho | * | cpe:2.3:h:watchguard:soho:*:*:*:*:*:*:*:* |
watchguard | vclass | * | cpe:2.3:h:watchguard:vclass:*:*:*:*:*:*:*:* |