All the vulnerabilites related to HUAWEI - WS5200-12
cve-2020-9069
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en | x_refsource_CONFIRM |
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | HUAWEI | Anne-AL00 |
Version: earlier than 9.1.0.331(C675E9R1P3T8) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T10:19:19.496Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Anne-AL00", vendor: "HUAWEI", versions: [ { status: "affected", version: "earlier than 9.1.0.331(C675E9R1P3T8)", }, ], }, { product: "Berkeley-L09", vendor: "HUAWEI", versions: [ { status: "affected", version: "earlier than 10.0.1.1(C675R1)", }, ], }, { product: "CD16-10", vendor: "HUAWEI", versions: [ { status: "affected", version: "earlier than 10.0.2.8", }, ], }, { product: "CD17-10", vendor: "HUAWEI", versions: [ { status: "affected", version: "earlier than 10.0.2.8", }, ], }, { product: "CD17-16", vendor: "HUAWEI", versions: [ { status: "affected", version: "earlier than 10.0.2.8", }, ], }, { product: "CD18-10", vendor: "HUAWEI", versions: [ { status: "affected", version: "earlier than 10.0.2.8", }, ], }, { product: "CD18-16", vendor: "HUAWEI", versions: [ { status: "affected", version: "earlier than 10.0.2.8", }, ], }, { product: "Columbia-TL00B", vendor: "HUAWEI", versions: [ { status: "affected", version: "earlier than 9.0.0.187(C01E181R1P20T8)", }, ], }, { product: "E6878-370", vendor: "HUAWEI", versions: [ { status: "affected", version: "earlier than 10.0.5.1(H610SP10C00)", }, ], }, { product: "HUAWEI P30 lite", vendor: "HUAWEI", versions: [ { status: "affected", version: "earlier than 10.0.0.185(C605E3R1P3)", }, { status: "affected", version: "earlier than 10.0.0.197(C432E8R2P7)", }, ], }, { product: "HUAWEI nova 4e", vendor: "HUAWEI", versions: [ { status: "affected", version: "earlier than 10.0.0.158(C00E64R1P9)", }, ], }, { product: "Honor 10 Lite", vendor: "HUAWEI", versions: [ { status: "affected", version: "9.0.1.113(C675E11R1P12)", }, ], }, { product: "LelandP-L22A", vendor: "HUAWEI", versions: [ { status: "affected", version: "earlier than 9.1.0.166(C675E5R1P4T8)", }, ], }, { product: "Marie-AL00AX", vendor: "HUAWEI", versions: [ { status: "affected", version: "earlier than 10.0.0.158(C00E64R1P9)", }, ], }, { product: "Marie-AL00AY", vendor: "HUAWEI", versions: [ { status: "affected", version: "earlier than 10.0.0.158(C00E64R1P9)", }, ], }, { product: "Marie-AL00BX", vendor: "HUAWEI", versions: [ { status: "affected", version: "earlier than 10.0.0.158(C00E64R1P9)", }, ], }, { product: "Marie-L03BX", vendor: "HUAWEI", versions: [ { status: "affected", version: "earlier than 10.0.0.188(C605E5R1P1)", }, ], }, { product: "Marie-L21BX", vendor: "HUAWEI", versions: [ { status: "affected", version: "earlier than 10.0.0.188(C432E4R4P1)", }, { status: "affected", version: "earlier than 10.0.0.188(C461E5R3P1)", }, ], }, { product: "Marie-L22BX", vendor: "HUAWEI", versions: [ { status: "affected", version: "earlier than 10.0.0.188(C636E3R3P1)", }, ], }, { product: "Marie-L23BX", vendor: "HUAWEI", versions: [ { status: "affected", version: "earlier than 10.0.0.188(C605E5R1P1)", }, ], }, { product: "TC5200-16", vendor: "HUAWEI", versions: [ { status: "affected", version: "earlier than 10.0.2.8", }, ], }, { product: "WS5200-11", vendor: "HUAWEI", versions: [ { status: "affected", version: "earlier than 10.0.2.8", }, ], }, { product: "WS5200-12", vendor: "HUAWEI", versions: [ { status: "affected", version: "earlier than 10.0.2.23", }, ], }, { product: "WS5200-16", vendor: "HUAWEI", versions: [ { status: "affected", version: "earlier than 10.0.2.8", }, ], }, { product: "WS5200-17", vendor: "HUAWEI", versions: [ { status: "affected", version: "earlier than 10.0.2.23", }, ], }, { product: "WS5800-10", vendor: "HUAWEI", versions: [ { status: "affected", version: "earlier than 10.0.3.27", }, ], }, { product: "WS6500-10", vendor: "HUAWEI", versions: [ { status: "affected", version: "earlier than 10.0.2.8", }, ], }, { product: "WS6500-16", vendor: "HUAWEI", versions: [ { status: "affected", version: "earlier than 10.0.2.8", }, ], }, ], descriptions: [ { lang: "en", value: "There is an information leakage vulnerability in some Huawei products. An unauthenticated, adjacent attacker could exploit this vulnerability to decrypt data. Successful exploitation may leak information randomly. Affected product versions include: Anne-AL00 Versions earlier than 9.1.0.331(C675E9R1P3T8); Berkeley-L09 Versions earlier than 10.0.1.1(C675R1); CD16-10 Versions earlier than 10.0.2.8; CD17-10 Versions earlier than 10.0.2.8; CD17-16 Versions earlier than 10.0.2.8; CD18-10 Versions earlier than 10.0.2.8; CD18-16 Versions earlier than 10.0.2.8; Columbia-TL00B Versions earlier than 9.0.0.187(C01E181R1P20T8); E6878-370 Versions earlier than 10.0.5.1(H610SP10C00); HUAWEI P30 lite Versions earlier than 10.0.0.185(C605E3R1P3), Versions earlier than 10.0.0.197(C432E8R2P7); HUAWEI nova 4e Versions earlier than 10.0.0.158(C00E64R1P9); Honor 10 Lite 9.0.1.113(C675E11R1P12); LelandP-L22A Versions earlier than 9.1.0.166(C675E5R1P4T8); Marie-AL00AX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00AY Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00BX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-L03BX Versions earlier than 10.0.0.188(C605E5R1P1); Marie-L21BX Versions earlier than 10.0.0.188(C432E4R4P1), Versions earlier than 10.0.0.188(C461E5R3P1); Marie-L22BX Versions earlier than 10.0.0.188(C636E3R3P1); Marie-L23BX Versions earlier than 10.0.0.188(C605E5R1P1); TC5200-16 Versions earlier than 10.0.2.8; WS5200-11 Versions earlier than 10.0.2.8; WS5200-12 Versions earlier than 10.0.2.23; WS5200-16 Versions earlier than 10.0.2.8; WS5200-17 Versions earlier than 10.0.2.23; WS5800-10 Versions earlier than 10.0.3.27; WS6500-10 Versions earlier than 10.0.2.8; WS6500-16 Versions earlier than 10.0.2.8", }, ], problemTypes: [ { descriptions: [ { description: "Information Leakage", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-05-29T22:23:46", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2020-9069", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Anne-AL00", version: { version_data: [ { version_value: "earlier than 9.1.0.331(C675E9R1P3T8)", }, ], }, }, { product_name: "Berkeley-L09", version: { version_data: [ { version_value: "earlier than 10.0.1.1(C675R1)", }, ], }, }, { product_name: "CD16-10", version: { version_data: [ { version_value: "earlier than 10.0.2.8", }, ], }, }, { product_name: "CD17-10", version: { version_data: [ { version_value: "earlier than 10.0.2.8", }, ], }, }, { product_name: "CD17-16", version: { version_data: [ { version_value: "earlier than 10.0.2.8", }, ], }, }, { product_name: "CD18-10", version: { version_data: [ { version_value: "earlier than 10.0.2.8", }, ], }, }, { product_name: "CD18-16", version: { version_data: [ { version_value: "earlier than 10.0.2.8", }, ], }, }, { product_name: "Columbia-TL00B", version: { version_data: [ { version_value: "earlier than 9.0.0.187(C01E181R1P20T8)", }, ], }, }, { product_name: "E6878-370", version: { version_data: [ { version_value: "earlier than 10.0.5.1(H610SP10C00)", }, ], }, }, { product_name: "HUAWEI P30 lite", version: { version_data: [ { version_value: "earlier than 10.0.0.185(C605E3R1P3)", }, { version_value: "earlier than 10.0.0.197(C432E8R2P7)", }, ], }, }, { product_name: "HUAWEI nova 4e", version: { version_data: [ { version_value: "earlier than 10.0.0.158(C00E64R1P9)", }, ], }, }, { product_name: "Honor 10 Lite", version: { version_data: [ { version_value: "9.0.1.113(C675E11R1P12)", }, ], }, }, { product_name: "LelandP-L22A", version: { version_data: [ { version_value: "earlier than 9.1.0.166(C675E5R1P4T8)", }, ], }, }, { product_name: "Marie-AL00AX", version: { version_data: [ { version_value: "earlier than 10.0.0.158(C00E64R1P9)", }, ], }, }, { product_name: "Marie-AL00AY", version: { version_data: [ { version_value: "earlier than 10.0.0.158(C00E64R1P9)", }, ], }, }, { product_name: "Marie-AL00BX", version: { version_data: [ { version_value: "earlier than 10.0.0.158(C00E64R1P9)", }, ], }, }, { product_name: "Marie-L03BX", version: { version_data: [ { version_value: "earlier than 10.0.0.188(C605E5R1P1)", }, ], }, }, { product_name: "Marie-L21BX", version: { version_data: [ { version_value: "earlier than 10.0.0.188(C432E4R4P1)", }, { version_value: "earlier than 10.0.0.188(C461E5R3P1)", }, ], }, }, { product_name: "Marie-L22BX", version: { version_data: [ { version_value: "earlier than 10.0.0.188(C636E3R3P1)", }, ], }, }, { product_name: "Marie-L23BX", version: { version_data: [ { version_value: "earlier than 10.0.0.188(C605E5R1P1)", }, ], }, }, { product_name: "TC5200-16", version: { version_data: [ { version_value: "earlier than 10.0.2.8", }, ], }, }, { product_name: "WS5200-11", version: { version_data: [ { version_value: "earlier than 10.0.2.8", }, ], }, }, { product_name: "WS5200-12", version: { version_data: [ { version_value: "earlier than 10.0.2.23", }, ], }, }, { product_name: "WS5200-16", version: { version_data: [ { version_value: "earlier than 10.0.2.8", }, ], }, }, { product_name: "WS5200-17", version: { version_data: [ { version_value: "earlier than 10.0.2.23", }, ], }, }, { product_name: "WS5800-10", version: { version_data: [ { version_value: "earlier than 10.0.3.27", }, ], }, }, { product_name: "WS6500-10", version: { version_data: [ { version_value: "earlier than 10.0.2.8", }, ], }, }, { product_name: "WS6500-16", version: { version_data: [ { version_value: "earlier than 10.0.2.8", }, ], }, }, ], }, vendor_name: "HUAWEI", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "There is an information leakage vulnerability in some Huawei products. An unauthenticated, adjacent attacker could exploit this vulnerability to decrypt data. Successful exploitation may leak information randomly. Affected product versions include: Anne-AL00 Versions earlier than 9.1.0.331(C675E9R1P3T8); Berkeley-L09 Versions earlier than 10.0.1.1(C675R1); CD16-10 Versions earlier than 10.0.2.8; CD17-10 Versions earlier than 10.0.2.8; CD17-16 Versions earlier than 10.0.2.8; CD18-10 Versions earlier than 10.0.2.8; CD18-16 Versions earlier than 10.0.2.8; Columbia-TL00B Versions earlier than 9.0.0.187(C01E181R1P20T8); E6878-370 Versions earlier than 10.0.5.1(H610SP10C00); HUAWEI P30 lite Versions earlier than 10.0.0.185(C605E3R1P3), Versions earlier than 10.0.0.197(C432E8R2P7); HUAWEI nova 4e Versions earlier than 10.0.0.158(C00E64R1P9); Honor 10 Lite 9.0.1.113(C675E11R1P12); LelandP-L22A Versions earlier than 9.1.0.166(C675E5R1P4T8); Marie-AL00AX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00AY Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00BX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-L03BX Versions earlier than 10.0.0.188(C605E5R1P1); Marie-L21BX Versions earlier than 10.0.0.188(C432E4R4P1), Versions earlier than 10.0.0.188(C461E5R3P1); Marie-L22BX Versions earlier than 10.0.0.188(C636E3R3P1); Marie-L23BX Versions earlier than 10.0.0.188(C605E5R1P1); TC5200-16 Versions earlier than 10.0.2.8; WS5200-11 Versions earlier than 10.0.2.8; WS5200-12 Versions earlier than 10.0.2.23; WS5200-16 Versions earlier than 10.0.2.8; WS5200-17 Versions earlier than 10.0.2.23; WS5800-10 Versions earlier than 10.0.3.27; WS6500-10 Versions earlier than 10.0.2.8; WS6500-16 Versions earlier than 10.0.2.8", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Information Leakage", }, ], }, ], }, references: { reference_data: [ { name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en", refsource: "CONFIRM", url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2020-9069", datePublished: "2020-05-21T14:19:31", dateReserved: "2020-02-18T00:00:00", dateUpdated: "2024-08-04T10:19:19.496Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-9122
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en | x_refsource_MISC |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | HiRouter-CD30-10;HiRouter-CT31-10;WS5200-12;WS5281-10;WS5800-10;WS7100-10;WS7200-10 |
Version: 10.0.2.5 Version: 10.0.2.20 Version: 10.0.1.9 Version: 10.0.5.10 Version: 10.0.3.25 Version: 10.0.5.21 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T10:19:20.187Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "HiRouter-CD30-10;HiRouter-CT31-10;WS5200-12;WS5281-10;WS5800-10;WS7100-10;WS7200-10", vendor: "n/a", versions: [ { status: "affected", version: "10.0.2.5", }, { status: "affected", version: "10.0.2.20", }, { status: "affected", version: "10.0.1.9", }, { status: "affected", version: "10.0.5.10", }, { status: "affected", version: "10.0.3.25", }, { status: "affected", version: "10.0.5.21", }, ], }, ], descriptions: [ { lang: "en", value: "Some Huawei products have an insufficient input verification vulnerability. Attackers can exploit this vulnerability in the LAN to cause service abnormal on affected devices.Affected product versions include:HiRouter-CD30-10 version 10.0.2.5;HiRouter-CT31-10 version 10.0.2.20;WS5200-12 version 10.0.1.9;WS5281-10 version 10.0.5.10;WS5800-10 version 10.0.3.25;WS7100-10 version 10.0.5.21;WS7200-10 version 10.0.5.21.", }, ], problemTypes: [ { descriptions: [ { description: "Insufficient Input Verification", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-10-12T13:37:31", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2020-9122", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "HiRouter-CD30-10;HiRouter-CT31-10;WS5200-12;WS5281-10;WS5800-10;WS7100-10;WS7200-10", version: { version_data: [ { version_value: "10.0.2.5", }, { version_value: "10.0.2.20", }, { version_value: "10.0.1.9", }, { version_value: "10.0.5.10", }, { version_value: "10.0.3.25", }, { version_value: "10.0.5.21", }, { version_value: "10.0.5.21", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Some Huawei products have an insufficient input verification vulnerability. Attackers can exploit this vulnerability in the LAN to cause service abnormal on affected devices.Affected product versions include:HiRouter-CD30-10 version 10.0.2.5;HiRouter-CT31-10 version 10.0.2.20;WS5200-12 version 10.0.1.9;WS5281-10 version 10.0.5.10;WS5800-10 version 10.0.3.25;WS7100-10 version 10.0.5.21;WS7200-10 version 10.0.5.21.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Insufficient Input Verification", }, ], }, ], }, references: { reference_data: [ { name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en", refsource: "MISC", url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2020-9122", datePublished: "2020-10-12T13:37:31", dateReserved: "2020-02-18T00:00:00", dateUpdated: "2024-08-04T10:19:20.187Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
var-202005-0971
Vulnerability from variot
There is an information leakage vulnerability in some Huawei products. An unauthenticated, adjacent attacker could exploit this vulnerability to decrypt data. Successful exploitation may leak information randomly. Affected product versions include: Anne-AL00 Versions earlier than 9.1.0.331(C675E9R1P3T8); Berkeley-L09 Versions earlier than 10.0.1.1(C675R1); CD16-10 Versions earlier than 10.0.2.8; CD17-10 Versions earlier than 10.0.2.8; CD17-16 Versions earlier than 10.0.2.8; CD18-10 Versions earlier than 10.0.2.8; CD18-16 Versions earlier than 10.0.2.8; Columbia-TL00B Versions earlier than 9.0.0.187(C01E181R1P20T8); E6878-370 Versions earlier than 10.0.5.1(H610SP10C00); HUAWEI P30 lite Versions earlier than 10.0.0.185(C605E3R1P3), Versions earlier than 10.0.0.197(C432E8R2P7); HUAWEI nova 4e Versions earlier than 10.0.0.158(C00E64R1P9); Honor 10 Lite 9.0.1.113(C675E11R1P12); LelandP-L22A Versions earlier than 9.1.0.166(C675E5R1P4T8); Marie-AL00AX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00AY Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00BX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-L03BX Versions earlier than 10.0.0.188(C605E5R1P1); Marie-L21BX Versions earlier than 10.0.0.188(C432E4R4P1), Versions earlier than 10.0.0.188(C461E5R3P1); Marie-L22BX Versions earlier than 10.0.0.188(C636E3R3P1); Marie-L23BX Versions earlier than 10.0.0.188(C605E5R1P1); TC5200-16 Versions earlier than 10.0.2.8; WS5200-11 Versions earlier than 10.0.2.8; WS5200-12 Versions earlier than 10.0.2.23; WS5200-16 Versions earlier than 10.0.2.8; WS5200-17 Versions earlier than 10.0.2.23; WS5800-10 Versions earlier than 10.0.3.27; WS6500-10 Versions earlier than 10.0.2.8; WS6500-16 Versions earlier than 10.0.2.8. Huawei Anne-AL00 and other products are products of China's Huawei company. Huawei Anne-AL00 is a smartphone. Honor 10 Lite is a smartphone. Huawei TC5200-16 is a wireless router
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202005-0971", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "marie-l21bx <=10.0.0.188", scope: null, trust: 1.2, vendor: "huawei", version: null, }, { model: "lelandp-l22a", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.166\\(c675e5r1p4t8\\)", }, { model: "anne-al00", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.331\\(c675e9r1p3t8\\)", }, { model: "honor 10 lite", scope: "lt", trust: 1, vendor: "huawei", version: "10.0.0.182\\(c675e17r2p2\\)", }, { model: "ws5200-16", scope: "lt", trust: 1, vendor: "huawei", version: "10.0.2.8", }, { model: "cd18-10", scope: "lt", trust: 1, vendor: "huawei", version: "10.0.2.8", }, { model: "ws6500-10", scope: "lt", trust: 1, vendor: "huawei", version: "10.0.2.8", }, { model: "e6878-370", scope: "lt", trust: 1, vendor: "huawei", version: "10.0.5.1\\(h610sp10c00\\)", }, { model: "cd18-16", scope: "lt", trust: 1, vendor: "huawei", version: "10.0.2.8", }, { model: "cd17-10", scope: "lt", trust: 1, vendor: "huawei", version: "10.0.2.8", }, { model: "ws5200-17", scope: "lt", trust: 1, vendor: "huawei", version: "10.0.2.23", }, { model: "columbia-tl00b", scope: "lt", trust: 1, vendor: "huawei", version: "9.0.0.187\\(c01e181r1p20t8\\)", }, { model: "cd16-10", scope: "lt", trust: 1, vendor: "huawei", version: "10.0.2.8", }, { model: "ws5200-11", scope: "lt", trust: 1, vendor: "huawei", version: "10.0.2.8", }, { model: "ws5200-11", scope: "lt", trust: 1, vendor: "huawei", version: "10.0.2.23", }, { model: "tc5200-16", scope: "lt", trust: 1, vendor: "huawei", version: "10.0.2.8", }, { model: "cd17-16", scope: "lt", trust: 1, vendor: "huawei", version: "10.0.2.8", }, { model: "ws6500-16", scope: "lt", trust: 1, vendor: "huawei", version: "10.0.2.8", }, { model: "berkeley-l09", scope: "lt", trust: 1, vendor: "huawei", version: "10.0.1.1\\(c675r1\\)", }, { model: "ws5800-10", scope: "lt", trust: 1, vendor: "huawei", version: "10.0.3.27", }, { model: "anne-al00", scope: "eq", trust: 0.8, vendor: "huawei", version: "9.1.0.331(c675e9r1p3t8)", }, { model: "berkeley-l09", scope: "eq", trust: 0.8, vendor: "huawei", version: "10.0.1.1(c675r1)", }, { model: "cd16-10", scope: "eq", trust: 0.8, vendor: "huawei", version: "10.0.2.8", }, { model: "cd17-10", scope: "eq", trust: 0.8, vendor: "huawei", version: "10.0.2.8", }, { model: "cd17-16", scope: "eq", trust: 0.8, vendor: "huawei", version: "10.0.2.8", }, { model: "cd18-10", scope: "eq", trust: 0.8, vendor: "huawei", version: "10.0.2.8", }, { model: "cd18-16", scope: "eq", trust: 0.8, vendor: "huawei", version: "10.0.2.8", }, { model: "columbia-tl00b", scope: "eq", trust: 0.8, vendor: "huawei", version: "9.0.0.187(c01e181r1p20t8)", }, { model: "e6878-370", scope: "eq", trust: 0.8, vendor: "huawei", version: "10.0.5.1(h610sp10c00)", }, { model: "honor 10 lite", scope: "eq", trust: 0.8, vendor: "huawei", version: "9.0.1.113(c675e11r1p12)", }, { model: "anne-al00 <=9.1.0.331", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "berkeley-l09 <=10.0.1.1", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "cd16-10", scope: "lte", trust: 0.6, vendor: "huawei", version: "<=10.0.2.8", }, { model: "cd17-10", scope: "lte", trust: 0.6, vendor: "huawei", version: "<=10.0.2.8", }, { model: "cd17-16", scope: "lte", trust: 0.6, vendor: "huawei", version: "<=10.0.2.8", }, { model: "cd18-10", scope: "lte", trust: 0.6, vendor: "huawei", version: "<=10.0.2.8", }, { model: "cd18-16", scope: "lte", trust: 0.6, vendor: "huawei", version: "<=10.0.2.8", }, { model: "columbia-tl00b <=9.0.0.187", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "e6878-370 <=10.0.5.1", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "p30 lite <=10.0.0.185", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "p30 lite <=10.0.0.197", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "nova 4e <=10.0.0.158", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "honor lite 9.0.1.113", scope: "eq", trust: 0.6, vendor: "huawei", version: "10", }, { model: "lelandp-l22a <=9.1.0.166", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "marie-al00ax <=10.0.0.158", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "marie-al00bx <=10.0.0.158", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "marie-l22bx <=10.0.0.188", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "marie-l23bx <=10.0.0.188", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "tc5200-16", scope: "lte", trust: 0.6, vendor: "huawei", version: "<=10.0.2.8", }, { model: "ws5200-11", scope: "lte", trust: 0.6, vendor: "huawei", version: "<=10.0.2.8", }, { model: "ws5200-12", scope: "lte", trust: 0.6, vendor: "huawei", version: "<=10.0.2.23", }, { model: "ws5200-16", scope: "lte", trust: 0.6, vendor: "huawei", version: "<=10.0.2.8", }, { model: "ws5200-17", scope: "lte", trust: 0.6, vendor: "huawei", version: "<=10.0.2.23", }, { model: "ws5800-10", scope: "lte", trust: 0.6, vendor: "huawei", version: "<=10.0.3.27", }, { model: "ws6500-10", scope: "lte", trust: 0.6, vendor: "huawei", version: "<=10.0.2.8", }, { model: "ws6500-16", scope: "lte", trust: 0.6, vendor: "huawei", version: "<=10.0.2.8", }, ], sources: [ { db: "CNVD", id: "CNVD-2020-36726", }, { db: "JVNDB", id: "JVNDB-2020-005593", }, { db: "NVD", id: "CVE-2020-9069", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:anne-al00_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.331\\(c675e9r1p3t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:anne-al00:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:berkeley-l09_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "10.0.1.1\\(c675r1\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:berkeley-l09:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:cd16-10_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "10.0.2.8", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:cd16-10:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:cd17-10_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "10.0.2.8", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:cd17-10:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:cd17-16_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "10.0.2.8", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:cd17-16:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:cd18-10_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "10.0.2.8", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:cd18-10:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:cd18-16_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "10.0.2.8", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:cd18-16:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:columbia-tl00b_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.0.0.187\\(c01e181r1p20t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:columbia-tl00b:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:e6878-370_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "10.0.5.1\\(h610sp10c00\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:e6878-370:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:honor_10_lite_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "10.0.0.182\\(c675e17r2p2\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:honor_10_lite:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:lelandp-l22a_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.166\\(c675e5r1p4t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:lelandp-l22a:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:tc5200-16_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "10.0.2.8", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:tc5200-16:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ws5200-11_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "10.0.2.8", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ws5200-11:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ws5200-11_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "10.0.2.23", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ws5200-11:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ws5200-16_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "10.0.2.8", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ws5200-16:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ws5200-17_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "10.0.2.23", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ws5200-17:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ws5800-10_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "10.0.3.27", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ws5800-10:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ws6500-10_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "10.0.2.8", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ws6500-10:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ws6500-16_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "10.0.2.8", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ws6500-16:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2020-9069", }, ], }, cve: "CVE-2020-9069", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: false, accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", author: "NVD", availabilityImpact: "NONE", baseScore: 3.3, confidentialityImpact: "PARTIAL", exploitabilityScore: 6.5, impactScore: 2.9, integrityImpact: "NONE", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "LOW", trust: 1, userInteractionRequired: false, vectorString: "AV:A/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Low", accessVector: "Adjacent Network", authentication: "None", author: "NVD", availabilityImpact: "None", baseScore: 3.3, confidentialityImpact: "Partial", exploitabilityScore: null, id: "JVNDB-2020-005593", impactScore: null, integrityImpact: "None", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "Low", trust: 0.8, userInteractionRequired: null, vectorString: "AV:A/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", author: "CNVD", availabilityImpact: "NONE", baseScore: 3.3, confidentialityImpact: "PARTIAL", exploitabilityScore: 6.5, id: "CNVD-2020-36726", impactScore: 2.9, integrityImpact: "NONE", severity: "LOW", trust: 0.6, vectorString: "AV:A/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", author: "NVD", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", exploitabilityScore: 2.8, impactScore: 3.6, integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, { attackComplexity: "Low", attackVector: "Adjacent Network", author: "NVD", availabilityImpact: "None", baseScore: 6.5, baseSeverity: "Medium", confidentialityImpact: "High", exploitabilityScore: null, id: "JVNDB-2020-005593", impactScore: null, integrityImpact: "None", privilegesRequired: "None", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2020-9069", trust: 1, value: "MEDIUM", }, { author: "NVD", id: "JVNDB-2020-005593", trust: 0.8, value: "Medium", }, { author: "CNVD", id: "CNVD-2020-36726", trust: 0.6, value: "LOW", }, { author: "CNNVD", id: "CNNVD-202005-1099", trust: 0.6, value: "MEDIUM", }, ], }, ], sources: [ { db: "CNVD", id: "CNVD-2020-36726", }, { db: "JVNDB", id: "JVNDB-2020-005593", }, { db: "NVD", id: "CVE-2020-9069", }, { db: "CNNVD", id: "CNNVD-202005-1099", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "There is an information leakage vulnerability in some Huawei products. An unauthenticated, adjacent attacker could exploit this vulnerability to decrypt data. Successful exploitation may leak information randomly. Affected product versions include: Anne-AL00 Versions earlier than 9.1.0.331(C675E9R1P3T8); Berkeley-L09 Versions earlier than 10.0.1.1(C675R1); CD16-10 Versions earlier than 10.0.2.8; CD17-10 Versions earlier than 10.0.2.8; CD17-16 Versions earlier than 10.0.2.8; CD18-10 Versions earlier than 10.0.2.8; CD18-16 Versions earlier than 10.0.2.8; Columbia-TL00B Versions earlier than 9.0.0.187(C01E181R1P20T8); E6878-370 Versions earlier than 10.0.5.1(H610SP10C00); HUAWEI P30 lite Versions earlier than 10.0.0.185(C605E3R1P3), Versions earlier than 10.0.0.197(C432E8R2P7); HUAWEI nova 4e Versions earlier than 10.0.0.158(C00E64R1P9); Honor 10 Lite 9.0.1.113(C675E11R1P12); LelandP-L22A Versions earlier than 9.1.0.166(C675E5R1P4T8); Marie-AL00AX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00AY Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00BX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-L03BX Versions earlier than 10.0.0.188(C605E5R1P1); Marie-L21BX Versions earlier than 10.0.0.188(C432E4R4P1), Versions earlier than 10.0.0.188(C461E5R3P1); Marie-L22BX Versions earlier than 10.0.0.188(C636E3R3P1); Marie-L23BX Versions earlier than 10.0.0.188(C605E5R1P1); TC5200-16 Versions earlier than 10.0.2.8; WS5200-11 Versions earlier than 10.0.2.8; WS5200-12 Versions earlier than 10.0.2.23; WS5200-16 Versions earlier than 10.0.2.8; WS5200-17 Versions earlier than 10.0.2.23; WS5800-10 Versions earlier than 10.0.3.27; WS6500-10 Versions earlier than 10.0.2.8; WS6500-16 Versions earlier than 10.0.2.8. Huawei Anne-AL00 and other products are products of China's Huawei company. Huawei Anne-AL00 is a smartphone. Honor 10 Lite is a smartphone. Huawei TC5200-16 is a wireless router", sources: [ { db: "NVD", id: "CVE-2020-9069", }, { db: "JVNDB", id: "JVNDB-2020-005593", }, { db: "CNVD", id: "CNVD-2020-36726", }, ], trust: 2.16, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2020-9069", trust: 3, }, { db: "JVNDB", id: "JVNDB-2020-005593", trust: 0.8, }, { db: "CNVD", id: "CNVD-2020-36726", trust: 0.6, }, { db: "CNNVD", id: "CNNVD-202005-1099", trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2020-36726", }, { db: "JVNDB", id: "JVNDB-2020-005593", }, { db: "NVD", id: "CVE-2020-9069", }, { db: "CNNVD", id: "CNNVD-202005-1099", }, ], }, id: "VAR-202005-0971", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "CNVD", id: "CNVD-2020-36726", }, ], trust: 1.3640656644, }, iot_taxonomy: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { category: [ "IoT", ], sub_category: null, trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2020-36726", }, ], }, last_update_date: "2023-12-18T13:12:58.319000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "huawei-sa-20200520-01-leakage", trust: 0.8, url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en", }, { title: "Patch for Multiple Huawei product information disclosure vulnerabilities (CNVD-2020-36726)", trust: 0.6, url: "https://www.cnvd.org.cn/patchinfo/show/224779", }, { title: "Multiple Huawei Product information disclosure vulnerability repair measures", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=119391", }, ], sources: [ { db: "CNVD", id: "CNVD-2020-36726", }, { db: "JVNDB", id: "JVNDB-2020-005593", }, { db: "CNNVD", id: "CNNVD-202005-1099", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "NVD-CWE-noinfo", trust: 1, }, { problemtype: "CWE-200", trust: 0.8, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2020-005593", }, { db: "NVD", id: "CVE-2020-9069", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 2, url: "https://nvd.nist.gov/vuln/detail/cve-2020-9069", }, { trust: 1.6, url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en", }, { trust: 0.8, url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-9069", }, { trust: 0.6, url: "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20200520-01-leakage-cn", }, ], sources: [ { db: "CNVD", id: "CNVD-2020-36726", }, { db: "JVNDB", id: "JVNDB-2020-005593", }, { db: "NVD", id: "CVE-2020-9069", }, { db: "CNNVD", id: "CNNVD-202005-1099", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CNVD", id: "CNVD-2020-36726", }, { db: "JVNDB", id: "JVNDB-2020-005593", }, { db: "NVD", id: "CVE-2020-9069", }, { db: "CNNVD", id: "CNNVD-202005-1099", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2020-07-07T00:00:00", db: "CNVD", id: "CNVD-2020-36726", }, { date: "2020-06-18T00:00:00", db: "JVNDB", id: "JVNDB-2020-005593", }, { date: "2020-05-21T15:15:10.123000", db: "NVD", id: "CVE-2020-9069", }, { date: "2020-05-20T00:00:00", db: "CNNVD", id: "CNNVD-202005-1099", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2020-07-07T00:00:00", db: "CNVD", id: "CNVD-2020-36726", }, { date: "2020-06-18T00:00:00", db: "JVNDB", id: "JVNDB-2020-005593", }, { date: "2021-07-21T11:39:23.747000", db: "NVD", id: "CVE-2020-9069", }, { date: "2020-07-30T00:00:00", db: "CNNVD", id: "CNNVD-202005-1099", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote or local", sources: [ { db: "CNNVD", id: "CNNVD-202005-1099", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "plural Huawei Information leakage vulnerabilities in products", sources: [ { db: "JVNDB", id: "JVNDB-2020-005593", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "information disclosure", sources: [ { db: "CNNVD", id: "CNNVD-202005-1099", }, ], trust: 0.6, }, }
var-202010-1178
Vulnerability from variot
Some Huawei products have an insufficient input verification vulnerability. Attackers can exploit this vulnerability in the LAN to cause service abnormal on affected devices.Affected product versions include:HiRouter-CD30-10 version 10.0.2.5;HiRouter-CT31-10 version 10.0.2.20;WS5200-12 version 10.0.1.9;WS5281-10 version 10.0.5.10;WS5800-10 version 10.0.3.25;WS7100-10 version 10.0.5.21;WS7200-10 version 10.0.5.21. plural Huawei The product contains an input verification vulnerability.Denial of service (DoS) It may be put into a state. Huawei HiRouter-CD30-10, etc. are all wireless routers of China's Huawei (Huawei) company
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202010-1178", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "ws7200-10", scope: "gte", trust: 1, vendor: "huawei", version: "10.0.5.21", }, { model: "ws5281-10", scope: "lt", trust: 1, vendor: "huawei", version: "10.0.5.32", }, { model: "ws5200-12", scope: "gte", trust: 1, vendor: "huawei", version: "10.0.1.9", }, { model: "hirouter-ct31-10", scope: "lt", trust: 1, vendor: "huawei", version: "10.0.2.37", }, { model: "hirouter-cd30-10", scope: "lt", trust: 1, vendor: "huawei", version: "10.0.5.7", }, { model: "ws5800-10", scope: "lt", trust: 1, vendor: "huawei", version: "10.0.3.33", }, { model: "ws7100-10", scope: "lt", trust: 1, vendor: "huawei", version: "10.0.5.37", }, { model: "ws5800-10", scope: "gte", trust: 1, vendor: "huawei", version: "10.0.3.25", }, { model: "ws5281-10", scope: "gte", trust: 1, vendor: "huawei", version: "10.0.5.10", }, { model: "hirouter-cd30-10", scope: "gte", trust: 1, vendor: "huawei", version: "10.0.2.5", }, { model: "hirouter-ct31-10", scope: "gte", trust: 1, vendor: "huawei", version: "10.0.2.20", }, { model: "ws7200-10", scope: "lt", trust: 1, vendor: "huawei", version: "10.0.5.37", }, { model: "ws5200-12", scope: "lte", trust: 1, vendor: "huawei", version: "10.0.5.6", }, { model: "ws7100-10", scope: "gte", trust: 1, vendor: "huawei", version: "10.0.5.21", }, { model: "hirouter-cd30-10", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "hirouter-ct31-10", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ws5200-12", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ws5281-10", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ws5800-10", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ws7100-10", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ws7200-10", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "hirouter-ct31-10", scope: "eq", trust: 0.6, vendor: "huawei", version: "10.0.2.20", }, { model: "ws5800-10", scope: "eq", trust: 0.6, vendor: "huawei", version: "10.0.3.25", }, { model: "hirouter-cd30-10", scope: "eq", trust: 0.6, vendor: "huawei", version: "10.0.2.5", }, { model: "ws5200-12", scope: "eq", trust: 0.6, vendor: "huawei", version: "10.0.1.9", }, { model: "ws5281-10", scope: "eq", trust: 0.6, vendor: "huawei", version: "10.0.5.10", }, { model: "ws7100-10", scope: "eq", trust: 0.6, vendor: "huawei", version: "10.0.5.21", }, { model: "ws7200-10", scope: "eq", trust: 0.6, vendor: "huawei", version: "10.0.5.21", }, ], sources: [ { db: "CNVD", id: "CNVD-2020-68353", }, { db: "JVNDB", id: "JVNDB-2020-012148", }, { db: "NVD", id: "CVE-2020-9122", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:hirouter-cd30-10_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "10.0.5.7", versionStartIncluding: "10.0.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:hirouter-cd30-10:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:hirouter-ct31-10_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "10.0.2.37", versionStartIncluding: "10.0.2.20", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:hirouter-ct31-10:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ws5200-12_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "10.0.5.6", versionStartIncluding: "10.0.1.9", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ws5200-12:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ws5281-10_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "10.0.5.32", versionStartIncluding: "10.0.5.10", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ws5281-10:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ws5800-10_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "10.0.3.33", versionStartIncluding: "10.0.3.25", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ws5800-10:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ws7100-10_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "10.0.5.37", versionStartIncluding: "10.0.5.21", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ws7100-10:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ws7200-10_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "10.0.5.37", versionStartIncluding: "10.0.5.21", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ws7200-10:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2020-9122", }, ], }, cve: "CVE-2020-9122", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: false, accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", author: "NVD", availabilityImpact: "PARTIAL", baseScore: 3.3, confidentialityImpact: "NONE", exploitabilityScore: 6.5, impactScore: 2.9, integrityImpact: "NONE", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "LOW", trust: 1, userInteractionRequired: false, vectorString: "AV:A/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Low", accessVector: "Adjacent Network", authentication: "None", author: "NVD", availabilityImpact: "Partial", baseScore: 3.3, confidentialityImpact: "None", exploitabilityScore: null, id: "CVE-2020-9122", impactScore: null, integrityImpact: "None", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "Low", trust: 0.9, userInteractionRequired: null, vectorString: "AV:A/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", author: "CNVD", availabilityImpact: "PARTIAL", baseScore: 3.3, confidentialityImpact: "NONE", exploitabilityScore: 6.5, id: "CNVD-2020-68353", impactScore: 2.9, integrityImpact: "NONE", severity: "LOW", trust: 0.6, vectorString: "AV:A/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", author: "NVD", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", exploitabilityScore: 2.8, impactScore: 3.6, integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, { attackComplexity: "Low", attackVector: "Adjacent Network", author: "NVD", availabilityImpact: "High", baseScore: 6.5, baseSeverity: "Medium", confidentialityImpact: "None", exploitabilityScore: null, id: "CVE-2020-9122", impactScore: null, integrityImpact: "None", privilegesRequired: "None", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2020-9122", trust: 1.8, value: "MEDIUM", }, { author: "CNVD", id: "CNVD-2020-68353", trust: 0.6, value: "LOW", }, { author: "CNNVD", id: "CNNVD-202009-1682", trust: 0.6, value: "MEDIUM", }, { author: "VULMON", id: "CVE-2020-9122", trust: 0.1, value: "LOW", }, ], }, ], sources: [ { db: "CNVD", id: "CNVD-2020-68353", }, { db: "VULMON", id: "CVE-2020-9122", }, { db: "JVNDB", id: "JVNDB-2020-012148", }, { db: "NVD", id: "CVE-2020-9122", }, { db: "CNNVD", id: "CNNVD-202009-1682", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Some Huawei products have an insufficient input verification vulnerability. Attackers can exploit this vulnerability in the LAN to cause service abnormal on affected devices.Affected product versions include:HiRouter-CD30-10 version 10.0.2.5;HiRouter-CT31-10 version 10.0.2.20;WS5200-12 version 10.0.1.9;WS5281-10 version 10.0.5.10;WS5800-10 version 10.0.3.25;WS7100-10 version 10.0.5.21;WS7200-10 version 10.0.5.21. plural Huawei The product contains an input verification vulnerability.Denial of service (DoS) It may be put into a state. Huawei HiRouter-CD30-10, etc. are all wireless routers of China's Huawei (Huawei) company", sources: [ { db: "NVD", id: "CVE-2020-9122", }, { db: "JVNDB", id: "JVNDB-2020-012148", }, { db: "CNVD", id: "CNVD-2020-68353", }, { db: "VULMON", id: "CVE-2020-9122", }, ], trust: 2.25, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2020-9122", trust: 3.1, }, { db: "JVNDB", id: "JVNDB-2020-012148", trust: 0.8, }, { db: "CNVD", id: "CNVD-2020-68353", trust: 0.6, }, { db: "CNNVD", id: "CNNVD-202009-1682", trust: 0.6, }, { db: "VULMON", id: "CVE-2020-9122", trust: 0.1, }, ], sources: [ { db: "CNVD", id: "CNVD-2020-68353", }, { db: "VULMON", id: "CVE-2020-9122", }, { db: "JVNDB", id: "JVNDB-2020-012148", }, { db: "NVD", id: "CVE-2020-9122", }, { db: "CNNVD", id: "CNNVD-202009-1682", }, ], }, id: "VAR-202010-1178", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "CNVD", id: "CNVD-2020-68353", }, ], trust: 1.2815476428571428, }, iot_taxonomy: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { category: [ "Network device", ], sub_category: null, trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2020-68353", }, ], }, last_update_date: "2023-12-18T13:47:21.525000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "huawei-sa-20200930-01-verification", trust: 0.8, url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en", }, { title: "Patch for Input verification vulnerabilities in multiple Huawei products (CNVD-2020-68353)", trust: 0.6, url: "https://www.cnvd.org.cn/patchinfo/show/241531", }, { title: "HUAWEI Glory routing Pro 2 Enter the fix for the verification error vulnerability", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=131161", }, ], sources: [ { db: "CNVD", id: "CNVD-2020-68353", }, { db: "JVNDB", id: "JVNDB-2020-012148", }, { db: "CNNVD", id: "CNNVD-202009-1682", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-20", trust: 1, }, { problemtype: "Incorrect input confirmation (CWE-20) [NVD Evaluation ]", trust: 0.8, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2020-012148", }, { db: "NVD", id: "CVE-2020-9122", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 2.3, url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en", }, { trust: 1.4, url: "https://nvd.nist.gov/vuln/detail/cve-2020-9122", }, { trust: 0.6, url: "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20200930-01-verification-cn", }, { trust: 0.1, url: "https://cwe.mitre.org/data/definitions/20.html", }, { trust: 0.1, url: "https://nvd.nist.gov", }, { trust: 0.1, url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/189273", }, ], sources: [ { db: "CNVD", id: "CNVD-2020-68353", }, { db: "VULMON", id: "CVE-2020-9122", }, { db: "JVNDB", id: "JVNDB-2020-012148", }, { db: "NVD", id: "CVE-2020-9122", }, { db: "CNNVD", id: "CNNVD-202009-1682", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CNVD", id: "CNVD-2020-68353", }, { db: "VULMON", id: "CVE-2020-9122", }, { db: "JVNDB", id: "JVNDB-2020-012148", }, { db: "NVD", id: "CVE-2020-9122", }, { db: "CNNVD", id: "CNNVD-202009-1682", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2020-12-02T00:00:00", db: "CNVD", id: "CNVD-2020-68353", }, { date: "2020-10-12T00:00:00", db: "VULMON", id: "CVE-2020-9122", }, { date: "2021-04-26T00:00:00", db: "JVNDB", id: "JVNDB-2020-012148", }, { date: "2020-10-12T14:15:14.387000", db: "NVD", id: "CVE-2020-9122", }, { date: "2020-09-30T00:00:00", db: "CNNVD", id: "CNNVD-202009-1682", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2020-12-02T00:00:00", db: "CNVD", id: "CNVD-2020-68353", }, { date: "2020-10-16T00:00:00", db: "VULMON", id: "CVE-2020-9122", }, { date: "2021-04-26T07:54:00", db: "JVNDB", id: "JVNDB-2020-012148", }, { date: "2020-10-16T15:42:46.857000", db: "NVD", id: "CVE-2020-9122", }, { date: "2021-08-16T00:00:00", db: "CNNVD", id: "CNNVD-202009-1682", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote or local", sources: [ { db: "CNNVD", id: "CNNVD-202009-1682", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "plural Huawei Product input verification vulnerabilities", sources: [ { db: "JVNDB", id: "JVNDB-2020-012148", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "input validation error", sources: [ { db: "CNNVD", id: "CNNVD-202009-1682", }, ], trust: 0.6, }, }