The firewall security verifications either do not exist or can be bypassed.
Bypass security validations to perform different attacks.
Guarantee that firewall security mechanisms and access rules are active and cannot be bypassed.
Anonymous attacker from the Internet.
⌚ 60 minutes.
Default score using CVSS 3.1. It may change depending on the context of the src.
Default score using CVSS 4.0. It may change depending on the context of the src.
The firewall is safely configured over a secure port
gateway: "My gateway name"
firewall_service:
enabled: true
policy: 'drop'
log_default_action: true
firewall_rules:
- :id: '1'
:enabled: true
:description: 'disallow_connections'
:policy: 'disallow'
:destination_port_range: '5353'
:destination_ip: '00.01.02.03'
:source_port_range: '5353'
:source_ip: 'Any'
The firewall configuration allows insecure port connections through its configuration files
gateway: "My gateway name"
firewall_service:
enabled: true
policy: 'drop'
log_default_action: true
firewall_rules:
- :id: '1'
:enabled: true
:description: 'allow_connections'
:policy: 'allow'
:destination_port_range: '*'
:destination_ip: '00.01.02.03'
:source_port_range: '*'
:source_ip: 'Any'