Lucene search

K
cve[email protected]CVE-2004-1022
HistoryJan 10, 2005 - 5:00 a.m.

CVE-2004-1022

2005-01-1005:00:00
web.nvd.nist.gov
22
cve-2004-1022
kerio winroute firewall
serverfirewall
mailserver
symmetric encryption
password decryption
nvd

7 High

AI Score

Confidence

Low

2.1 Low

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

0.0004 Low

EPSS

Percentile

12.4%

Kerio Winroute Firewall before 6.0.7, ServerFirewall before 1.0.1, and MailServer before 6.0.5 use symmetric encryption for user passwords, which allows attackers to decrypt the user database and obtain the passwords by extracting the secret key from within the software.

Affected configurations

NVD
Node
keriokerio_mailserverMatch5.0
OR
keriokerio_mailserverMatch5.1
OR
keriokerio_mailserverMatch5.1.1
OR
keriokerio_mailserverMatch5.6.3
OR
keriokerio_mailserverMatch5.6.4
OR
keriokerio_mailserverMatch5.6.5
OR
keriokerio_mailserverMatch5.7.0
OR
keriokerio_mailserverMatch5.7.1
OR
keriokerio_mailserverMatch5.7.2
OR
keriokerio_mailserverMatch5.7.3
OR
keriokerio_mailserverMatch5.7.4
OR
keriokerio_mailserverMatch5.7.5
OR
keriokerio_mailserverMatch5.7.6
OR
keriokerio_mailserverMatch5.7.7
OR
keriokerio_mailserverMatch5.7.8
OR
keriokerio_mailserverMatch5.7.9
OR
keriokerio_mailserverMatch5.7.10
OR
keriokerio_mailserverMatch6.0
OR
keriokerio_mailserverMatch6.0.1
OR
keriokerio_mailserverMatch6.0.2
OR
keriokerio_mailserverMatch6.0.3
OR
keriokerio_mailserverMatch6.0.4
OR
kerioserverfirewallMatch1.0
OR
keriowinroute_firewallMatch5.0.1
OR
keriowinroute_firewallMatch5.0.2
OR
keriowinroute_firewallMatch5.0.3
OR
keriowinroute_firewallMatch5.0.4
OR
keriowinroute_firewallMatch5.0.5
OR
keriowinroute_firewallMatch5.0.6
OR
keriowinroute_firewallMatch5.0.7
OR
keriowinroute_firewallMatch5.0.8
OR
keriowinroute_firewallMatch5.0.9
OR
keriowinroute_firewallMatch5.1
OR
keriowinroute_firewallMatch5.1.1
OR
keriowinroute_firewallMatch5.1.2
OR
keriowinroute_firewallMatch5.1.3
OR
keriowinroute_firewallMatch5.1.4
OR
keriowinroute_firewallMatch5.1.5
OR
keriowinroute_firewallMatch5.1.6
OR
keriowinroute_firewallMatch5.1.7
OR
keriowinroute_firewallMatch5.1.8
OR
keriowinroute_firewallMatch5.1.9
OR
keriowinroute_firewallMatch5.1.10
OR
keriowinroute_firewallMatch5.10
OR
keriowinroute_firewallMatch6.0
OR
keriowinroute_firewallMatch6.0.1
OR
keriowinroute_firewallMatch6.0.2
OR
keriowinroute_firewallMatch6.0.3
OR
keriowinroute_firewallMatch6.0.4
OR
keriowinroute_firewallMatch6.0.5
OR
keriowinroute_firewallMatch6.0.6
OR
keriowinroute_firewallMatch6.0.7
OR
keriowinroute_firewallMatch6.0.8

7 High

AI Score

Confidence

Low

2.1 Low

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

0.0004 Low

EPSS

Percentile

12.4%

Related for CVE-2004-1022