search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Symantec Firewall/VPN appliance vulnerable to DoS via UDP port scan

Vulnerability Note VU#441078

Original Release Date: 2004-10-20 | Last Revised: 2004-10-20


A vulnerability in the Symantec Firewall/VPN appliance could allow an attacker to cause a denial-of-service condition.


The Symantec Firewall/VPN appliance supports a number of services that utilize the UDP protocol including tftpd, snmpd, and isakmp. There is a vulnerability in the Firewall/VPN appliance that allows a UDP port scan on the WAN interface against all ports (i.e. 1-65535) to cause the device to stop responding. In order to regain functionality, the device must be powered off and back on.

Affected Products:

    • Symantec Firewall/VPN Appliance 100 (firmware builds prior to build 1.63)
    • Symantec Firewall/VPN Appliance 200/200R (firmware builds prior to build 1.63)


A remote, unauthenticated attacker could cause a denial-of-service condition.


Upgrade FirmwareAccording to the Symantec Advisory, product specific firmware and hotfixes are available via the Symantec Enterprise Support site.

Vendor Information


Symantec Corporation Affected

Updated:  October 20, 2004



Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.


Please refer to Symantec Advisory SYM04-013.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

CVSS Metrics

Group Score Vector



This vulnerability was reported by Symantec. Symantec credits Mike Sues and the Rigel Kent Security & Advisory Services for discovering the vulnerability.

This document was written by Damon Morda.

Other Information

CVE IDs: None
Severity Metric: 5.78
Date Public: 2004-09-22
Date First Published: 2004-10-20
Date Last Updated: 2004-10-20 14:37 UTC
Document Revision: 8

Sponsored by CISA.