392 – Security controls bypass or absence - Firewall
Description
The firewall security verifications either do not exist or can be bypassed.
Impact
Bypass security validations to perform different attacks.
Recommendation
Guarantee that firewall security mechanisms and access rules are active and cannot be bypassed.
Threat
Anonymous attacker from the Internet.
Expected Remediation Time
Score 4.0
Default score using CVSS 4.0. It may change depending on the context of the src.
Base 4.0
- Attack vector: N
- Attack complexity: H
- Attack Requirements: N
- Privileges required: N
- User interaction: N
- Confidentiality (VC): N
- Integrity (VI): L
- Availability (VA): N
- Confidentiality (SC): N
- Integrity (SI): N
- Availability (SA): N
Threat 4.0
- Exploit maturity: A