Security controls bypass or absence - Firewall
Description
The firewall security verifications either do not exist or can be bypassed.
Impact
Bypass security validations to perform different attacks.
Recommendation
Guarantee that firewall security mechanisms and access rules are active and cannot be bypassed.
Threat
Anonymous attacker from the Internet.
Expected Remediation Time
⏱️ 60 minutes.
Requirements
062 - Define standard configurations266 - Disable insecure functionalities273 - Define a fixed security suiteFixes
Score
Default score using CVSS 4.0. It may change depending on the context of the src.
Base 4.0
Attack vector
N
Attack complexity
H
Attack requirements
N
Privileges required
N
User interaction
N
Confidentiality (VC)
N
Integrity (VI)
L
Availability (VA)
N
Confidentiality (SC)
N
Integrity (SI)
N
Availability (SA)
N
Threat 4.0
Exploit maturity
A
Vector string
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:A