All the vulnerabilites related to huawei - ar
cve-2015-8086
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/76897 | vdb-entry, x_refsource_BID | |
http://www.huawei.com/en/psirt/security-advisories/hw-455876 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:13:30.981Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "76897", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/76897" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/psirt/security-advisories/hw-455876" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-09-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Huawei AR routers with software before V200R007C00SPC100; Quidway S9300 routers with software before V200R009C00; S12700 routers with software before V200R008C00SPC500; S9300, Quidway S5300, and S5300 routers with software before V200R007C00; and S5700 routers with software before V200R007C00SPC500 makes it easier for remote authenticated administrators to obtain encryption keys and ciphertext passwords via vectors related to key storage." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-25T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "76897", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/76897" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/psirt/security-advisories/hw-455876" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-8086", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Huawei AR routers with software before V200R007C00SPC100; Quidway S9300 routers with software before V200R009C00; S12700 routers with software before V200R008C00SPC500; S9300, Quidway S5300, and S5300 routers with software before V200R007C00; and S5700 routers with software before V200R007C00SPC500 makes it easier for remote authenticated administrators to obtain encryption keys and ciphertext passwords via vectors related to key storage." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "76897", "refsource": "BID", "url": "http://www.securityfocus.com/bid/76897" }, { "name": "http://www.huawei.com/en/psirt/security-advisories/hw-455876", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/psirt/security-advisories/hw-455876" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-8086", "datePublished": "2016-10-03T21:00:00", "dateReserved": "2015-11-06T00:00:00", "dateUpdated": "2024-08-06T08:13:30.981Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-8085
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/76897 | vdb-entry, x_refsource_BID | |
http://www.huawei.com/en/psirt/security-advisories/hw-455876 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:13:30.940Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "76897", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/76897" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/psirt/security-advisories/hw-455876" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-09-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Huawei AR routers with software before V200R007C00SPC100; Quidway S9300 routers with software before V200R009C00; S12700 routers with software before V200R008C00SPC500; S9300, Quidway S5300, and S5300 routers with software before V200R007C00; and S5700 routers with software before V200R007C00SPC500 make it easier for remote authenticated administrators to obtain and decrypt passwords by leveraging selection of a reversible encryption algorithm." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-25T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "76897", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/76897" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/psirt/security-advisories/hw-455876" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-8085", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Huawei AR routers with software before V200R007C00SPC100; Quidway S9300 routers with software before V200R009C00; S12700 routers with software before V200R008C00SPC500; S9300, Quidway S5300, and S5300 routers with software before V200R007C00; and S5700 routers with software before V200R007C00SPC500 make it easier for remote authenticated administrators to obtain and decrypt passwords by leveraging selection of a reversible encryption algorithm." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "76897", "refsource": "BID", "url": "http://www.securityfocus.com/bid/76897" }, { "name": "http://www.huawei.com/en/psirt/security-advisories/hw-455876", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/psirt/security-advisories/hw-455876" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-8085", "datePublished": "2016-10-03T21:00:00", "dateReserved": "2015-11-06T00:00:00", "dateUpdated": "2024-08-06T08:13:30.940Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-201609-0563
Vulnerability from variot
Format string vulnerability in Huawei AR100, AR120, AR150, AR200, AR500, AR550, AR1200, AR2200, AR2500, AR3200, and AR3600 routers with software before V200R007C00SPC900 and NetEngine 16EX routers with software before V200R007C00SPC900 allows remote authenticated users to cause a denial of service via format string specifiers in vectors involving partial commands. Huawei AR120 is an AR series enterprise router product of China Huawei. A remote attacker could exploit the vulnerability to cause a denial of service. The following products and versions are affected: AR100, AR120, AR150, AR200, AR500, AR550, AR1200, AR2200, AR2500, AR3200, AR3600 V200R005, V200R006, V200R007C00, NetEngine 16EX V200R005, V200R00000, V20
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201609-0563", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ar", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r005" }, { "model": "netengine 16ex", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r006" }, { "model": "ar", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r006" }, { "model": "netengine 16ex", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r007c00" }, { "model": "netengine 16ex", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r005" }, { "model": "ar", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r007c00" }, { "model": "ar router", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r007c00spc900" }, { "model": "ar100", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "ar120", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "ar1200", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "ar150", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "ar200", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "ar2200", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "ar2500", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "ar3200", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "ar3600", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "ar500", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "ar550", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "netengine 16ex", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "netengine 16ex", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r007c00spc900" }, { "model": "ar100 200r005", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ar100 200r006", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ar100 200r007c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ar120 200r005", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ar120 200r006", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ar120 200r007c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ar150 200r005", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ar150 200r006", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ar150 200r007c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ar200 200r005", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ar200 200r006", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ar200 200r007c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ar550 200r005", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ar550 200r006", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ar550 200r007c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ar500 200r005", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ar500 200r006", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ar500 200r007c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ar1200 200r005", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ar1200 200r006", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ar1200 200r007c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ar2200 200r005", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ar2200 200r006", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ar2200 200r007c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ar3600 200r005", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ar3600 200r006", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ar3600 200r007c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ar2500 200r005", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ar2500 200r006", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ar2500 200r007c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ar3200 200r005", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ar3200 200r006", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ar3200 200r007c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "netengine 16ex 200r007c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "netengine 16ex 200r006", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "netengine 16ex 200r005", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "netengine 16ex v200r007c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "netengine 16ex v200r006", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "netengine 16ex v200r005", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar550 v200r007c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar550 v200r006", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar550 v200r005", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar500 v200r007c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar500 v200r006", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar500 v200r005", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar3600 v200r007c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar3600 v200r006", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar3600 v200r005", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar3200 v200r007c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar3200 v200r006", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar3200 v200r005", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar2500 v200r007c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar2500 v200r006", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar2500 v200r005", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar2200 v200r007c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar2200 v200r006", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar2200 v200r005", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar200 v200r007c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar200 v200r006", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar200 v200r005", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar150 v200r007c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar150 v200r006", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar150 v200r005", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar1200 v200r007c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar1200 v200r006", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar1200 v200r005", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar120 v200r007c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar120 v200r006", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar120 v200r005", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar100 v200r007c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar100 v200r006", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar100 v200r005", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "netengine 16ex v200r007c00spc900", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar550 v200r007c00spc900", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar500 v200r007c00spc900", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar3600 v200r007c00spc900", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar3200 v200r007c00spc900", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar2500 v200r007c00spc900", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar2200 v200r007c00spc900", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar200 v200r007c00spc900", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar150 v200r007c00spc900", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar1200 v200r007c00spc900", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar120 v200r007c00spc900", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar100 v200r007c00spc900", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-06762" }, { "db": "BID", "id": "92618" }, { "db": "JVNDB", "id": "JVNDB-2016-005045" }, { "db": "NVD", "id": "CVE-2016-6901" }, { "db": "CNNVD", "id": "CNNVD-201608-454" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:ar_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ar_firmware:v200r005:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ar_firmware:v200r006:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:ar2500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:huawei:ar100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:huawei:ar550:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:huawei:ar120:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:huawei:ar500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:netengine_16ex_firmware:v200r006:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:netengine_16ex_firmware:v200r005:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:netengine_16ex_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:netengine_16ex:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2016-6901" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei", "sources": [ { "db": "BID", "id": "92618" }, { "db": "CNNVD", "id": "CNNVD-201608-454" } ], "trust": 0.9 }, "cve": "CVE-2016-6901", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 6.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2016-6901", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "CNVD-2016-06762", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "VHN-95721", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2016-6901", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2016-6901", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2016-06762", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201608-454", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-95721", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-06762" }, { "db": "VULHUB", "id": "VHN-95721" }, { "db": "JVNDB", "id": "JVNDB-2016-005045" }, { "db": "NVD", "id": "CVE-2016-6901" }, { "db": "CNNVD", "id": "CNNVD-201608-454" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Format string vulnerability in Huawei AR100, AR120, AR150, AR200, AR500, AR550, AR1200, AR2200, AR2500, AR3200, and AR3600 routers with software before V200R007C00SPC900 and NetEngine 16EX routers with software before V200R007C00SPC900 allows remote authenticated users to cause a denial of service via format string specifiers in vectors involving partial commands. Huawei AR120 is an AR series enterprise router product of China Huawei. A remote attacker could exploit the vulnerability to cause a denial of service. The following products and versions are affected: AR100, AR120, AR150, AR200, AR500, AR550, AR1200, AR2200, AR2500, AR3200, AR3600 V200R005, V200R006, V200R007C00, NetEngine 16EX V200R005, V200R00000, V20", "sources": [ { "db": "NVD", "id": "CVE-2016-6901" }, { "db": "JVNDB", "id": "JVNDB-2016-005045" }, { "db": "CNVD", "id": "CNVD-2016-06762" }, { "db": "BID", "id": "92618" }, { "db": "VULHUB", "id": "VHN-95721" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-6901", "trust": 3.4 }, { "db": "BID", "id": "92618", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2016-005045", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201608-454", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-06762", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-95721", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-06762" }, { "db": "VULHUB", "id": "VHN-95721" }, { "db": "BID", "id": "92618" }, { "db": "JVNDB", "id": "JVNDB-2016-005045" }, { "db": "NVD", "id": "CVE-2016-6901" }, { "db": "CNNVD", "id": "CNNVD-201608-454" } ] }, "id": "VAR-201609-0563", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-06762" }, { "db": "VULHUB", "id": "VHN-95721" } ], "trust": 1.633045889375 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-06762" } ] }, "last_update_date": "2023-12-18T13:03:13.514000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "huawei-sa-20160824-01-vrp", "trust": 0.8, "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160824-01-vrp-en" }, { "title": "Patches for remotely formatted string vulnerabilities in various Huawei products", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/80766" }, { "title": "Multiple Huawei Product Remote Format String Vulnerability Fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=63777" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-06762" }, { "db": "JVNDB", "id": "JVNDB-2016-005045" }, { "db": "CNNVD", "id": "CNNVD-201608-454" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-95721" }, { "db": "JVNDB", "id": "JVNDB-2016-005045" }, { "db": "NVD", "id": "CVE-2016-6901" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://www.securityfocus.com/bid/92618" }, { "trust": 1.7, "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160824-01-vrp-en" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-6901" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-6901" }, { "trust": 0.3, "url": "http://www.huawei.com" }, { "trust": 0.3, "url": "http://www.huawei.com/en/psirt/security-advisories/2016/huawei-sa-20160824-01-vrp-en" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-06762" }, { "db": "VULHUB", "id": "VHN-95721" }, { "db": "BID", "id": "92618" }, { "db": "JVNDB", "id": "JVNDB-2016-005045" }, { "db": "NVD", "id": "CVE-2016-6901" }, { "db": "CNNVD", "id": "CNNVD-201608-454" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-06762" }, { "db": "VULHUB", "id": "VHN-95721" }, { "db": "BID", "id": "92618" }, { "db": "JVNDB", "id": "JVNDB-2016-005045" }, { "db": "NVD", "id": "CVE-2016-6901" }, { "db": "CNNVD", "id": "CNNVD-201608-454" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-08-26T00:00:00", "db": "CNVD", "id": "CNVD-2016-06762" }, { "date": "2016-09-26T00:00:00", "db": "VULHUB", "id": "VHN-95721" }, { "date": "2016-08-24T00:00:00", "db": "BID", "id": "92618" }, { "date": "2016-10-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-005045" }, { "date": "2016-09-26T16:59:08.040000", "db": "NVD", "id": "CVE-2016-6901" }, { "date": "2016-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201608-454" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-08-26T00:00:00", "db": "CNVD", "id": "CNVD-2016-06762" }, { "date": "2016-09-28T00:00:00", "db": "VULHUB", "id": "VHN-95721" }, { "date": "2016-08-24T00:00:00", "db": "BID", "id": "92618" }, { "date": "2016-10-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-005045" }, { "date": "2016-09-28T13:51:33.013000", "db": "NVD", "id": "CVE-2016-6901" }, { "date": "2016-09-27T00:00:00", "db": "CNNVD", "id": "CNNVD-201608-454" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201608-454" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Huawei AR Router and NetEngine 16EX Format string vulnerability in router software", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-005045" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201608-454" } ], "trust": 0.6 } }
var-201511-0200
Vulnerability from variot
Directory traversal vulnerability in the SFTP server in Huawei AR 120, 150, 160, 200, 500, 1200, 2200, 3200, and 3600 routers with software before V200R006SPH003 allows remote authenticated users to access arbitrary directories via unspecified vectors. Huawei AR Routers is an AR series router product from China Huawei. A directory traversal vulnerability exists in the Huawei AR router. An attacker could exploit this vulnerability to obtain sensitive information. Huawei AR series routers are Huawei's proprietary VRP-based next-generation enterprise routers that integrate routing, switching, 3G, WLAN, voice, and security functions. The following versions and products are affected: Huawei AR 120, 150, 160, 200, 500, 1200, 2200, 3200, 3600 versions earlier than V200R006C10
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201511-0200", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ar", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v200r006c10" }, { "model": "ar router", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r006sph003" }, { "model": "ar120", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "ar1200", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "ar150", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "ar160", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "ar200", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "ar2200", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "ar3200", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "ar3600", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "ar500", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "ar routers", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ar", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "150" }, { "model": "ar", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "200" }, { "model": "ar", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "1200" }, { "model": "ar", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "2200" }, { "model": "ar", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "3200" }, { "model": "ar", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "120" }, { "model": "ar", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "160" }, { "model": "ar", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "500" }, { "model": "ar", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "3600" }, { "model": "ar", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "v200r006c10" }, { "model": "ar1200 v200r006c10", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar1200 v200r006sph003", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07773" }, { "db": "CNVD", "id": "CNVD-2015-07794" }, { "db": "BID", "id": "77555" }, { "db": "JVNDB", "id": "JVNDB-2015-006027" }, { "db": "NVD", "id": "CVE-2015-8228" }, { "db": "CNNVD", "id": "CNNVD-201511-394" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:ar_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v200r006c10", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:ar160:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:huawei:ar200:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:huawei:ar500:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:huawei:ar150:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:huawei:ar1200:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:huawei:ar2200:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:huawei:ar3200:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:huawei:ar3600:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:huawei:ar120:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-8228" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei", "sources": [ { "db": "BID", "id": "77555" }, { "db": "CNNVD", "id": "CNNVD-201511-394" } ], "trust": 0.9 }, "cve": "CVE-2015-8228", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2015-8228", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2015-07773", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "CNVD-2015-07794", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "VHN-86189", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2015-8228", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2015-07773", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2015-07794", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201511-394", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-86189", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07773" }, { "db": "CNVD", "id": "CNVD-2015-07794" }, { "db": "VULHUB", "id": "VHN-86189" }, { "db": "JVNDB", "id": "JVNDB-2015-006027" }, { "db": "NVD", "id": "CVE-2015-8228" }, { "db": "CNNVD", "id": "CNNVD-201511-394" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Directory traversal vulnerability in the SFTP server in Huawei AR 120, 150, 160, 200, 500, 1200, 2200, 3200, and 3600 routers with software before V200R006SPH003 allows remote authenticated users to access arbitrary directories via unspecified vectors. Huawei AR Routers is an AR series router product from China Huawei. A directory traversal vulnerability exists in the Huawei AR router. An attacker could exploit this vulnerability to obtain sensitive information. Huawei AR series routers are Huawei\u0027s proprietary VRP-based next-generation enterprise routers that integrate routing, switching, 3G, WLAN, voice, and security functions. The following versions and products are affected: Huawei AR 120, 150, 160, 200, 500, 1200, 2200, 3200, 3600 versions earlier than V200R006C10", "sources": [ { "db": "NVD", "id": "CVE-2015-8228" }, { "db": "JVNDB", "id": "JVNDB-2015-006027" }, { "db": "CNVD", "id": "CNVD-2015-07773" }, { "db": "CNVD", "id": "CNVD-2015-07794" }, { "db": "BID", "id": "77555" }, { "db": "VULHUB", "id": "VHN-86189" } ], "trust": 3.06 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-8228", "trust": 3.1 }, { "db": "BID", "id": "77555", "trust": 1.5 }, { "db": "JVNDB", "id": "JVNDB-2015-006027", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201511-394", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2015-07773", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2015-07794", "trust": 0.6 }, { "db": "NSFOCUS", "id": "31618", "trust": 0.6 }, { "db": "SEEBUG", "id": "SSVID-89883", "trust": 0.1 }, { "db": "SEEBUG", "id": "SSVID-89929", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-86189", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07773" }, { "db": "CNVD", "id": "CNVD-2015-07794" }, { "db": "VULHUB", "id": "VHN-86189" }, { "db": "BID", "id": "77555" }, { "db": "JVNDB", "id": "JVNDB-2015-006027" }, { "db": "NVD", "id": "CVE-2015-8228" }, { "db": "CNNVD", "id": "CNNVD-201511-394" } ] }, "id": "VAR-201511-0200", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2015-07773" }, { "db": "CNVD", "id": "CNVD-2015-07794" }, { "db": "VULHUB", "id": "VHN-86189" } ], "trust": 2.1753561133333332 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 1.2 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07773" }, { "db": "CNVD", "id": "CNVD-2015-07794" } ] }, "last_update_date": "2023-12-18T13:39:13.375000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei-SA-20151111-01-AR", "trust": 0.8, "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-461676.htm" }, { "title": "Huawei AR router directory traversal vulnerability patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/67110" }, { "title": "Huawei AR router SFTP server directory traversal vulnerability patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/67214" }, { "title": "Huawei AR Repair measures for router directory traversal vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=58842" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07773" }, { "db": "CNVD", "id": "CNVD-2015-07794" }, { "db": "JVNDB", "id": "JVNDB-2015-006027" }, { "db": "CNNVD", "id": "CNNVD-201511-394" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-86189" }, { "db": "JVNDB", "id": "JVNDB-2015-006027" }, { "db": "NVD", "id": "CVE-2015-8228" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-461676.htm" }, { "trust": 1.2, "url": "http://www.securityfocus.com/bid/77555" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8228" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-8228" }, { "trust": 0.6, "url": "http://www.huawei.com/en/security/psirt/report-vulnerabilities/index.htm" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/31618" }, { "trust": 0.3, "url": "http://www.huawei.com" }, { "trust": 0.3, "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/archive/hw-461676.htm" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07773" }, { "db": "CNVD", "id": "CNVD-2015-07794" }, { "db": "VULHUB", "id": "VHN-86189" }, { "db": "BID", "id": "77555" }, { "db": "JVNDB", "id": "JVNDB-2015-006027" }, { "db": "NVD", "id": "CVE-2015-8228" }, { "db": "CNNVD", "id": "CNNVD-201511-394" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2015-07773" }, { "db": "CNVD", "id": "CNVD-2015-07794" }, { "db": "VULHUB", "id": "VHN-86189" }, { "db": "BID", "id": "77555" }, { "db": "JVNDB", "id": "JVNDB-2015-006027" }, { "db": "NVD", "id": "CVE-2015-8228" }, { "db": "CNNVD", "id": "CNNVD-201511-394" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-11-25T00:00:00", "db": "CNVD", "id": "CNVD-2015-07773" }, { "date": "2015-11-26T00:00:00", "db": "CNVD", "id": "CNVD-2015-07794" }, { "date": "2015-11-24T00:00:00", "db": "VULHUB", "id": "VHN-86189" }, { "date": "2015-11-11T00:00:00", "db": "BID", "id": "77555" }, { "date": "2015-11-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-006027" }, { "date": "2015-11-24T20:59:21.130000", "db": "NVD", "id": "CVE-2015-8228" }, { "date": "2015-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201511-394" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-11-25T00:00:00", "db": "CNVD", "id": "CNVD-2015-07773" }, { "date": "2015-11-26T00:00:00", "db": "CNVD", "id": "CNVD-2015-07794" }, { "date": "2015-11-25T00:00:00", "db": "VULHUB", "id": "VHN-86189" }, { "date": "2015-11-11T00:00:00", "db": "BID", "id": "77555" }, { "date": "2015-11-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-006027" }, { "date": "2015-11-25T18:31:29.490000", "db": "NVD", "id": "CVE-2015-8228" }, { "date": "2015-12-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201511-394" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201511-394" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei AR Router Directory Traversal Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2015-07773" }, { "db": "CNNVD", "id": "CNNVD-201511-394" } ], "trust": 1.2 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-201511-394" } ], "trust": 0.6 } }
var-201211-0541
Vulnerability from variot
Huawei Technologies Co., Ltd. is a private technology company headquartered in Shenzhen, Guangdong Province, China. It is a private technology company that manufactures and sells telecom equipment. It was founded in 1987 by Ren Zhengfei in Shenzhen, China. It is the world's largest provider of telecommunications network solutions. Two major telecommunications base station equipment suppliers. A local information disclosure vulnerability exists in multiple Huawei products. Local vulnerabilities can exploit this vulnerability to obtain sensitive information. Information obtained may aid in further attacks
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201211-0541", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "cx600 v600r003c00spc900", "scope": null, "trust": 1.2, "vendor": "huawei", "version": null }, { "model": "cx600 v600r001", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "me60 v600r002c07", "scope": "lte", "trust": 0.6, "vendor": "huawei", "version": "\u003c=" }, { "model": "ar", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "19" }, { "model": "ar", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "29" }, { "model": "ar r2207", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "49" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-6565" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Kurt Grutzmache", "sources": [ { "db": "BID", "id": "56533" }, { "db": "CNNVD", "id": "CNNVD-201211-300" } ], "trust": 0.9 }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei Technologies Co., Ltd. is a private technology company headquartered in Shenzhen, Guangdong Province, China. It is a private technology company that manufactures and sells telecom equipment. It was founded in 1987 by Ren Zhengfei in Shenzhen, China. It is the world\u0027s largest provider of telecommunications network solutions. Two major telecommunications base station equipment suppliers. A local information disclosure vulnerability exists in multiple Huawei products. Local vulnerabilities can exploit this vulnerability to obtain sensitive information. Information obtained may aid in further attacks", "sources": [ { "db": "CNVD", "id": "CNVD-2012-6565" }, { "db": "BID", "id": "56533" } ], "trust": 0.81 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "56533", "trust": 1.5 }, { "db": "CNVD", "id": "CNVD-2012-6565", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201211-300", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-6565" }, { "db": "BID", "id": "56533" }, { "db": "CNNVD", "id": "CNNVD-201211-300" } ] }, "id": "VAR-201211-0541", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2012-6565" } ], "trust": 1.347435888 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-6565" } ] }, "last_update_date": "2022-05-17T01:43:29.255000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patches for multiple Huawei products local information disclosure vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/25159" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-6565" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.2, "url": "http://www.securityfocus.com/bid/56533" }, { "trust": 0.3, "url": "http://www.huawei.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-6565" }, { "db": "BID", "id": "56533" }, { "db": "CNNVD", "id": "CNNVD-201211-300" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2012-6565" }, { "db": "BID", "id": "56533" }, { "db": "CNNVD", "id": "CNNVD-201211-300" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-11-20T00:00:00", "db": "CNVD", "id": "CNVD-2012-6565" }, { "date": "2012-11-13T00:00:00", "db": "BID", "id": "56533" }, { "date": "2012-11-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201211-300" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-11-20T00:00:00", "db": "CNVD", "id": "CNVD-2012-6565" }, { "date": "2012-11-13T00:00:00", "db": "BID", "id": "56533" }, { "date": "2012-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-201211-300" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "56533" }, { "db": "CNNVD", "id": "CNNVD-201211-300" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple Huawei Products Local Information Disclosure Vulnerabilities", "sources": [ { "db": "CNVD", "id": "CNVD-2012-6565" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201211-300" } ], "trust": 0.6 } }
var-201709-0089
Vulnerability from variot
Huawei S7700, S9700, S9300 before V200R07C00SPC500, and AR200, AR1200, AR2200, AR3200 before V200R005C20SPC200 allows attackers with physical access to the CF card to obtain sensitive information. plural Huawei The product contains an information disclosure vulnerability.Information may be obtained. Huawei S7700 is a product of China Huawei. The Huawei S7700, S9700, and S9300 are intelligent routing switches. Huawei AR200, AR1200, AR2200, and AR3200 are multi-service routers for enterprises. Multiple Huawei products are prone to a local information-disclosure vulnerability. Several Huawei products have security vulnerabilities. The following products and versions are affected: Huawei S7700 V200R005C20SPC200 previous version; S9700 V200R005C20SPC200 previous version; S9300 V200R005C20SPC200 previous version; AR200 V200R005C20SPC200 Version; AR1200 V200R005C20SPC200 Version; AR2200 V200R005C20SPC200 Version; AR3200 V200R005C20SPC200 Version
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201709-0089", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ar3200", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r003c01spc900" }, { "model": "ar3200", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r003c01spc500" }, { "model": "ar3200", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r003c01spc200" }, { "model": "ar200", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r003c01spc800" }, { "model": "ar3200", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r003c01spc300" }, { "model": "s9700", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r003c00spc500" }, { "model": "ar3200", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r003c01spc600" }, { "model": "ar3200", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r003c01spc100" }, { "model": "ar3200", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r003c00spc200" }, { "model": "ar3200", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r003c01spc800" }, { "model": "s9300", "scope": null, "trust": 1.4, "vendor": "huawei", "version": null }, { "model": "s7700", "scope": null, "trust": 1.4, "vendor": "huawei", "version": null }, { "model": "s9700", "scope": null, "trust": 1.4, "vendor": "huawei", "version": null }, { "model": "s9300", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00spc500" }, { "model": "ar3200", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00spc100" }, { "model": "s9300", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r006c00spc300" }, { "model": "s9700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r005c00spc300" }, { "model": "ar2200", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c01spc500" }, { "model": "s9300", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r006c00spc500" }, { "model": "s9300", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00spc100" }, { "model": "ar200", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c01spc600" }, { "model": "s9300", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00spc300" }, { "model": "ar2200", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c01spc200" }, { "model": "ar1200", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c01spc500" }, { "model": "ar2200", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c01spc300" }, { "model": "ar200", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c01spc100" }, { "model": "s7700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00spc500" }, { "model": "ar1200", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c01spc200" }, { "model": "s7700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r006c00spc300" }, { "model": "ar200", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00spc200" }, { "model": "ar1200", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c01spc300" }, { "model": "s7700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00spc100" }, { "model": "s7700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r006c00spc500" }, { "model": "s7700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00spc300" }, { "model": "ar2200", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c01spc600" }, { "model": "s9300", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r005c00spc300" }, { "model": "s9700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r006c00spc300" }, { "model": "ar200", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c01spc900" }, { "model": "ar200", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00spc100" }, { "model": "ar1200", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c01spc600" }, { "model": "s9700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00spc100" }, { "model": "ar2200", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c01spc100" }, { "model": "s9700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00spc300" }, { "model": "ar2200", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c01spc800" }, { "model": "s9700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r006c00spc500" }, { "model": "ar2200", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00spc200" }, { "model": "ar200", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c01spc500" }, { "model": "ar1200", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c01spc100" }, { "model": "ar1200", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c01spc800" }, { "model": "ar2200", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00spc100" }, { "model": "s7700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r005c00spc300" }, { "model": "ar1200", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00spc200" }, { "model": "ar2200", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c01spc900" }, { "model": "ar200", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c01spc200" }, { "model": "ar200", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c01spc300" }, { "model": "ar1200", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c01spc900" }, { "model": "ar1200", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00spc100" }, { "model": "ar1200", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "ar200", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "ar2200", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "ar3200", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "ar", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "200" }, { "model": "ar", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "1200" }, { "model": "ar", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "2200" }, { "model": "ar", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "3200" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07754" }, { "db": "JVNDB", "id": "JVNDB-2015-007987" }, { "db": "NVD", "id": "CVE-2015-7846" }, { "db": "CNNVD", "id": "CNNVD-201511-303" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r003c00spc500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r006c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r006c00spc500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r002c00spc100:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r002c00spc100:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r003c00spc500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r006c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r006c00spc500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r002c00spc100:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r006c00spc500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r003c00spc500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r006c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:ar200_firmware:v200r003c01spc500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ar200_firmware:v200r003c01spc600:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ar200_firmware:v200r003c01spc800:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ar200_firmware:v200r003c01spc900:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ar200_firmware:v200r003c00spc100:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ar200_firmware:v200r003c01spc100:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ar200_firmware:v200r003c01spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ar200_firmware:v200r003c00spc200:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ar200_firmware:v200r003c01spc200:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:ar1200_firmware:v200r003c00spc100:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ar1200_firmware:v200r003c00spc200:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ar1200_firmware:v200r003c01spc100:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ar1200_firmware:v200r003c01spc200:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ar1200_firmware:v200r003c01spc500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ar1200_firmware:v200r003c01spc800:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ar1200_firmware:v200r003c01spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ar1200_firmware:v200r003c01spc600:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ar1200_firmware:v200r003c01spc900:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:ar2200_firmware:v200r003c01spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ar2200_firmware:v200r003c01spc500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ar2200_firmware:v200r003c01spc600:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ar2200_firmware:v200r003c01spc800:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ar2200_firmware:v200r003c00spc200:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ar2200_firmware:v200r003c01spc200:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ar2200_firmware:v200r003c01spc900:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ar2200_firmware:v200r003c00spc100:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ar2200_firmware:v200r003c01spc100:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:ar3200_firmware:v200r003c00spc100:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ar3200_firmware:v200r003c00spc200:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ar3200_firmware:v200r003c01spc100:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ar3200_firmware:v200r003c01spc200:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ar3200_firmware:v200r003c01spc900:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ar3200_firmware:v200r003c01spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ar3200_firmware:v200r003c01spc600:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ar3200_firmware:v200r003c01spc500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ar3200_firmware:v200r003c01spc800:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-7846" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Mickey Shkatov from Intel Advanced Threat Research Team and Jesse Michael from Intel.", "sources": [ { "db": "BID", "id": "76173" }, { "db": "CNNVD", "id": "CNNVD-201511-303" } ], "trust": 0.9 }, "cve": "CVE-2015-7846", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 2.1, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2015-7846", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CNVD-2015-07754", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-85807", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Physical", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.6, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2015-7846", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2015-7846", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2015-07754", "trust": 0.6, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-201511-303", "trust": 0.6, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-85807", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07754" }, { "db": "VULHUB", "id": "VHN-85807" }, { "db": "JVNDB", "id": "JVNDB-2015-007987" }, { "db": "NVD", "id": "CVE-2015-7846" }, { "db": "CNNVD", "id": "CNNVD-201511-303" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei S7700, S9700, S9300 before V200R07C00SPC500, and AR200, AR1200, AR2200, AR3200 before V200R005C20SPC200 allows attackers with physical access to the CF card to obtain sensitive information. plural Huawei The product contains an information disclosure vulnerability.Information may be obtained. Huawei S7700 is a product of China Huawei. The Huawei S7700, S9700, and S9300 are intelligent routing switches. Huawei AR200, AR1200, AR2200, and AR3200 are multi-service routers for enterprises. Multiple Huawei products are prone to a local information-disclosure vulnerability. Several Huawei products have security vulnerabilities. The following products and versions are affected: Huawei S7700 V200R005C20SPC200 previous version; S9700 V200R005C20SPC200 previous version; S9300 V200R005C20SPC200 previous version; AR200 V200R005C20SPC200 Version; AR1200 V200R005C20SPC200 Version; AR2200 V200R005C20SPC200 Version; AR3200 V200R005C20SPC200 Version", "sources": [ { "db": "NVD", "id": "CVE-2015-7846" }, { "db": "JVNDB", "id": "JVNDB-2015-007987" }, { "db": "CNVD", "id": "CNVD-2015-07754" }, { "db": "BID", "id": "76173" }, { "db": "VULHUB", "id": "VHN-85807" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-7846", "trust": 3.4 }, { "db": "BID", "id": "76173", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2015-007987", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201511-303", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2015-07754", "trust": 0.6 }, { "db": "SEEBUG", "id": "SSVID-89913", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-85807", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07754" }, { "db": "VULHUB", "id": "VHN-85807" }, { "db": "BID", "id": "76173" }, { "db": "JVNDB", "id": "JVNDB-2015-007987" }, { "db": "NVD", "id": "CVE-2015-7846" }, { "db": "CNNVD", "id": "CNNVD-201511-303" } ] }, "id": "VAR-201709-0089", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2015-07754" }, { "db": "VULHUB", "id": "VHN-85807" } ], "trust": 1.2961073074999998 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07754" } ] }, "last_update_date": "2023-12-18T12:29:28.973000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei-SA-20150805-01-VRP", "trust": 0.8, "url": "http://www.huawei.com/en/psirt/security-advisories/hw-446634" }, { "title": "Patches for multiple Huawei router information disclosure vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/67061" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07754" }, { "db": "JVNDB", "id": "JVNDB-2015-007987" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-85807" }, { "db": "JVNDB", "id": "JVNDB-2015-007987" }, { "db": "NVD", "id": "CVE-2015-7846" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://www.securityfocus.com/bid/76173" }, { "trust": 1.7, "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-446634.htm" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7846" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7846" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07754" }, { "db": "VULHUB", "id": "VHN-85807" }, { "db": "JVNDB", "id": "JVNDB-2015-007987" }, { "db": "NVD", "id": "CVE-2015-7846" }, { "db": "CNNVD", "id": "CNNVD-201511-303" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2015-07754" }, { "db": "VULHUB", "id": "VHN-85807" }, { "db": "BID", "id": "76173" }, { "db": "JVNDB", "id": "JVNDB-2015-007987" }, { "db": "NVD", "id": "CVE-2015-7846" }, { "db": "CNNVD", "id": "CNNVD-201511-303" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-11-24T00:00:00", "db": "CNVD", "id": "CNVD-2015-07754" }, { "date": "2017-09-25T00:00:00", "db": "VULHUB", "id": "VHN-85807" }, { "date": "2015-08-05T00:00:00", "db": "BID", "id": "76173" }, { "date": "2017-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-007987" }, { "date": "2017-09-25T21:29:00.867000", "db": "NVD", "id": "CVE-2015-7846" }, { "date": "2015-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-201511-303" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-11-24T00:00:00", "db": "CNVD", "id": "CNVD-2015-07754" }, { "date": "2017-10-10T00:00:00", "db": "VULHUB", "id": "VHN-85807" }, { "date": "2015-12-07T22:16:00", "db": "BID", "id": "76173" }, { "date": "2017-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-007987" }, { "date": "2017-10-10T12:26:22.227000", "db": "NVD", "id": "CVE-2015-7846" }, { "date": "2015-11-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201511-303" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "76173" }, { "db": "CNNVD", "id": "CNNVD-201511-303" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Huawei Information disclosure vulnerability in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-007987" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201511-303" } ], "trust": 0.6 } }
var-201610-0307
Vulnerability from variot
Huawei AR routers with software before V200R007C00SPC100; Quidway S9300 routers with software before V200R009C00; S12700 routers with software before V200R008C00SPC500; S9300, Quidway S5300, and S5300 routers with software before V200R007C00; and S5700 routers with software before V200R007C00SPC500 makes it easier for remote authenticated administrators to obtain encryption keys and ciphertext passwords via vectors related to key storage. plural Huawei There is a vulnerability in the product software that allows the encryption key and ciphertext password to be obtained. Supplementary information : CWE Vulnerability type by CWE-326: Inadequate Encryption Strength ( Incorrect cipher strength ) Has been identified. Huawei AR Routers is an AR series router product from China Huawei. An information disclosure vulnerability exists in Huawei AR Routers. An attacker could exploit this vulnerability to obtain sensitive information. Huawei AR, etc. are routing switches of China Huawei (Huawei). Remote attackers can use the keystore to exploit this vulnerability to gain administrator privileges and crack hard-coded keys and ciphertext passwords. The following products and versions are affected: Huawei AR V200R001 , V200R002 , V200R003 , V200R005C10 , V200R005C20 , V200R005C30 ; Quidway S9300 V200R003C00SPC500 , V200R002C00SPC100 , V200R001C00SPC300 ; S12700 V200R006C00 , V200R005C00 ; S9300 V200R006C00SPC500 , V200R005C00SPC300 ; Quidway S5300 V200R001C00SPC300
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201610-0307", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "s9300", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r005c00spc300" }, { "model": "ar", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r005c20" }, { "model": "ar", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r005c10" }, { "model": "ar", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r001" }, { "model": "s5300", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s9300", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r006c00spc500" }, { "model": "ar", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r003" }, { "model": "s5300", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r006c00spc500" }, { "model": "ar", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r005c30" }, { "model": "s5300", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r005c00spc500" }, { "model": "s5700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00" }, { "model": "quidway s9300", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00spc100" }, { "model": "quidway s5300", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00spc300" }, { "model": "quidway s9300", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00spc300" }, { "model": "s5700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s5700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r005c00" }, { "model": "s5700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r006c00" }, { "model": "s5700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00" }, { "model": "ar", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r002" }, { "model": "quidway s9300", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00spc500" }, { "model": "s12700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r005c00" }, { "model": "s12700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r006c00" }, { "model": "ar", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "ar router", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r007c00spc100" }, { "model": "quidway s5300", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "quidway s5300", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r007c00" }, { "model": "quidway s9300", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "quidway s9300", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r009c00" }, { "model": "s12700", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s12700", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r008c00spc500" }, { "model": "s5300", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s5300", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r007c00" }, { "model": "s5700", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s5700", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r007c00spc500" }, { "model": "s9300", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s9300", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r007c00" }, { "model": "ar routers", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9300 v200r006c00spc500", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "s9300 v200r005c00spc300", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "s5700 v200r006c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "s5700 v200r005c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "s5700 v200r003c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "s5700 v200r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "s5700 v200r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "s5300li v200r006c00spc500", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "s5300 v200r005c00spc500", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "s5300 v200r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "s12700 v200r006c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "s12700 v200r005c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "quidway s9300 v200r003c00spc500", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "quidway s9300 v200r003c00spc300", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "quidway s9300 v200r002c00spc100", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "quidway s5300 v200r001c00spc300", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar v200r005c30", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar v200r005c20", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar v200r005c10", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar v200r003", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar v200r002", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar v200r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "s5700 v200r007c00spc500", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "s5300 v200r007c00", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "s12700 v200r008c00spc500", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "quidway s9300 v200r009c00", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "quidway s5300 v200r007c00", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar v200r007c00spc100", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07446" }, { "db": "BID", "id": "76897" }, { "db": "JVNDB", "id": "JVNDB-2015-007262" }, { "db": "NVD", "id": "CVE-2015-8086" }, { "db": "CNNVD", "id": "CNNVD-201511-337" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:quidway_s5300_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:quidway_s5300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:quidway_s9300_firmware:v200r002c00spc100:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:quidway_s9300_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:quidway_s9300_firmware:v200r003c00spc500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:quidway_s9300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r002c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r001c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s12700_firmware:v200r005c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s12700_firmware:v200r006c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:ar_firmware:v200r005c20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ar_firmware:v200r005c30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ar_firmware:v200r003:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ar_firmware:v200r005c10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ar_firmware:v200r001:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ar_firmware:v200r002:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:ar:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r002c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r006c00spc500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r005c00spc500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r006c00spc500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-8086" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "76897" } ], "trust": 0.3 }, "cve": "CVE-2015-8086", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2015-8086", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2015-07446", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "VHN-86047", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.2, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.9, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2015-8086", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2015-8086", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2015-07446", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201511-337", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-86047", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07446" }, { "db": "VULHUB", "id": "VHN-86047" }, { "db": "JVNDB", "id": "JVNDB-2015-007262" }, { "db": "NVD", "id": "CVE-2015-8086" }, { "db": "CNNVD", "id": "CNNVD-201511-337" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei AR routers with software before V200R007C00SPC100; Quidway S9300 routers with software before V200R009C00; S12700 routers with software before V200R008C00SPC500; S9300, Quidway S5300, and S5300 routers with software before V200R007C00; and S5700 routers with software before V200R007C00SPC500 makes it easier for remote authenticated administrators to obtain encryption keys and ciphertext passwords via vectors related to key storage. plural Huawei There is a vulnerability in the product software that allows the encryption key and ciphertext password to be obtained. Supplementary information : CWE Vulnerability type by CWE-326: Inadequate Encryption Strength ( Incorrect cipher strength ) Has been identified. Huawei AR Routers is an AR series router product from China Huawei. An information disclosure vulnerability exists in Huawei AR Routers. An attacker could exploit this vulnerability to obtain sensitive information. Huawei AR, etc. are routing switches of China Huawei (Huawei). Remote attackers can use the keystore to exploit this vulnerability to gain administrator privileges and crack hard-coded keys and ciphertext passwords. The following products and versions are affected: Huawei AR V200R001 , V200R002 , V200R003 , V200R005C10 , V200R005C20 , V200R005C30 ; Quidway S9300 V200R003C00SPC500 , V200R002C00SPC100 , V200R001C00SPC300 ; S12700 V200R006C00 , V200R005C00 ; S9300 V200R006C00SPC500 , V200R005C00SPC300 ; Quidway S5300 V200R001C00SPC300 ", "sources": [ { "db": "NVD", "id": "CVE-2015-8086" }, { "db": "JVNDB", "id": "JVNDB-2015-007262" }, { "db": "CNVD", "id": "CNVD-2015-07446" }, { "db": "BID", "id": "76897" }, { "db": "VULHUB", "id": "VHN-86047" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-8086", "trust": 3.4 }, { "db": "BID", "id": "76897", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2015-007262", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201511-337", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2015-07446", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-86047", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07446" }, { "db": "VULHUB", "id": "VHN-86047" }, { "db": "BID", "id": "76897" }, { "db": "JVNDB", "id": "JVNDB-2015-007262" }, { "db": "NVD", "id": "CVE-2015-8086" }, { "db": "CNNVD", "id": "CNNVD-201511-337" } ] }, "id": "VAR-201610-0307", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2015-07446" }, { "db": "VULHUB", "id": "VHN-86047" } ], "trust": 1.4761443282352942 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07446" } ] }, "last_update_date": "2023-12-18T12:51:29.977000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei-SA-20150930-01-Routers", "trust": 0.8, "url": "http://www.huawei.com/en/psirt/security-advisories/hw-455876" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-007262" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-326", "trust": 1.1 }, { "problemtype": "CWE-Other", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-86047" }, { "db": "JVNDB", "id": "JVNDB-2015-007262" }, { "db": "NVD", "id": "CVE-2015-8086" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://www.securityfocus.com/bid/76897" }, { "trust": 1.7, "url": "http://www.huawei.com/en/psirt/security-advisories/hw-455876" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8086" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-8086" }, { "trust": 0.3, "url": "http://www.huawei.com" }, { "trust": 0.3, "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/archive/hw-455876.htm" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07446" }, { "db": "VULHUB", "id": "VHN-86047" }, { "db": "BID", "id": "76897" }, { "db": "JVNDB", "id": "JVNDB-2015-007262" }, { "db": "NVD", "id": "CVE-2015-8086" }, { "db": "CNNVD", "id": "CNNVD-201511-337" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2015-07446" }, { "db": "VULHUB", "id": "VHN-86047" }, { "db": "BID", "id": "76897" }, { "db": "JVNDB", "id": "JVNDB-2015-007262" }, { "db": "NVD", "id": "CVE-2015-8086" }, { "db": "CNNVD", "id": "CNNVD-201511-337" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-11-12T00:00:00", "db": "CNVD", "id": "CNVD-2015-07446" }, { "date": "2016-10-03T00:00:00", "db": "VULHUB", "id": "VHN-86047" }, { "date": "2015-09-30T00:00:00", "db": "BID", "id": "76897" }, { "date": "2016-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-007262" }, { "date": "2016-10-03T21:59:04.893000", "db": "NVD", "id": "CVE-2015-8086" }, { "date": "2015-09-30T00:00:00", "db": "CNNVD", "id": "CNNVD-201511-337" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-11-24T00:00:00", "db": "CNVD", "id": "CNVD-2015-07446" }, { "date": "2016-11-28T00:00:00", "db": "VULHUB", "id": "VHN-86047" }, { "date": "2016-09-19T17:00:00", "db": "BID", "id": "76897" }, { "date": "2016-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-007262" }, { "date": "2016-11-28T19:46:02.077000", "db": "NVD", "id": "CVE-2015-8086" }, { "date": "2016-10-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201511-337" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201511-337" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Huawei Vulnerability in obtaining encryption key and ciphertext password in product software", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-007262" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201511-337" } ], "trust": 0.6 } }
var-201610-0306
Vulnerability from variot
Huawei AR routers with software before V200R007C00SPC100; Quidway S9300 routers with software before V200R009C00; S12700 routers with software before V200R008C00SPC500; S9300, Quidway S5300, and S5300 routers with software before V200R007C00; and S5700 routers with software before V200R007C00SPC500 make it easier for remote authenticated administrators to obtain and decrypt passwords by leveraging selection of a reversible encryption algorithm. plural Huawei There is a vulnerability in the product software that can obtain and decrypt passwords. Supplementary information : CWE Vulnerability type by CWE-326: Inadequate Encryption Strength ( Incorrect cipher strength ) Has been identified. http://cwe.mitre.org/data/definitions/326.htmlA remotely authenticated administrator can use a choice of reversible encryption algorithms to obtain and decrypt passwords. Huawei AR Routers is an AR series router product from China Huawei. An information disclosure vulnerability exists in Huawei AR Routers. An attacker could exploit this vulnerability to obtain sensitive information. Huawei AR, etc. are routing switches of China Huawei (Huawei). The following products and versions are affected: Huawei AR V200R001 , V200R002 , V200R003 , V200R005C10 , V200R005C20 , V200R005C30 ; Quidway S9300 V200R003C00SPC500 , V200R002C00SPC100 , V200R001C00SPC300 ; S12700 V200R006C00 , V200R005C00 ; S9300 V200R006C00SPC500 , V200R005C00SPC300 ; Quidway S5300 V200R001C00SPC300
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201610-0306", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "s5700", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s9300", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r005c00spc300" }, { "model": "s5700", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s5300", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s9300", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r006c00spc500" }, { "model": "s5700", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r005c00" }, { "model": "s5700", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r006c00" }, { "model": "s5300", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r006c00spc500" }, { "model": "s5700", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s5300", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r005c00spc500" }, { "model": "ar", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r005c20" }, { "model": "ar", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r005c10" }, { "model": "ar", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r001" }, { "model": "quidway s9300", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00spc100" }, { "model": "quidway s5300", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00spc300" }, { "model": "quidway s9300", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00spc300" }, { "model": "ar", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003" }, { "model": "ar", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r005c30" }, { "model": "ar", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r002" }, { "model": "quidway s9300", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00spc500" }, { "model": "s12700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r005c00" }, { "model": "s12700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r006c00" }, { "model": "ar", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "ar router", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r007c00spc100" }, { "model": "quidway s5300", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "quidway s5300", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r007c00" }, { "model": "quidway s9300", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "quidway s9300", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r009c00" }, { "model": "s12700", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s12700", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r008c00spc500" }, { "model": "s5300", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s5300", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r007c00" }, { "model": "s5700", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s5700", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r007c00spc500" }, { "model": "s9300", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s9300", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r007c00" }, { "model": "ar routers", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9300 v200r006c00spc500", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "s9300 v200r005c00spc300", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "s5700 v200r006c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "s5700 v200r005c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "s5700 v200r003c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "s5700 v200r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "s5700 v200r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "s5300li v200r006c00spc500", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "s5300 v200r005c00spc500", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "s5300 v200r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "s12700 v200r006c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "s12700 v200r005c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "quidway s9300 v200r003c00spc500", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "quidway s9300 v200r003c00spc300", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "quidway s9300 v200r002c00spc100", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "quidway s5300 v200r001c00spc300", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar v200r005c30", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar v200r005c20", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar v200r005c10", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar v200r003", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar v200r002", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar v200r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "s5700 v200r007c00spc500", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "s5300 v200r007c00", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "s12700 v200r008c00spc500", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "quidway s9300 v200r009c00", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "quidway s5300 v200r007c00", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar v200r007c00spc100", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07446" }, { "db": "BID", "id": "76897" }, { "db": "JVNDB", "id": "JVNDB-2015-007261" }, { "db": "NVD", "id": "CVE-2015-8085" }, { "db": "CNNVD", "id": "CNNVD-201510-757" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r006c00spc500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s12700_firmware:v200r005c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s12700_firmware:v200r006c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:quidway_s9300_firmware:v200r002c00spc100:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:quidway_s9300_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:quidway_s9300_firmware:v200r003c00spc500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:quidway_s9300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:ar_firmware:v200r002:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ar_firmware:v200r001:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ar_firmware:v200r003:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ar_firmware:v200r005c10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ar_firmware:v200r005c20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ar_firmware:v200r005c30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:ar:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:quidway_s5300_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:quidway_s5300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r002c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r001c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r005c00spc500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r002c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r006c00spc500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-8085" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "76897" } ], "trust": 0.3 }, "cve": "CVE-2015-8085", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2015-8085", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2015-07446", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "VHN-86046", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.2, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.9, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2015-8085", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2015-8085", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2015-07446", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201510-757", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-86046", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07446" }, { "db": "VULHUB", "id": "VHN-86046" }, { "db": "JVNDB", "id": "JVNDB-2015-007261" }, { "db": "NVD", "id": "CVE-2015-8085" }, { "db": "CNNVD", "id": "CNNVD-201510-757" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei AR routers with software before V200R007C00SPC100; Quidway S9300 routers with software before V200R009C00; S12700 routers with software before V200R008C00SPC500; S9300, Quidway S5300, and S5300 routers with software before V200R007C00; and S5700 routers with software before V200R007C00SPC500 make it easier for remote authenticated administrators to obtain and decrypt passwords by leveraging selection of a reversible encryption algorithm. plural Huawei There is a vulnerability in the product software that can obtain and decrypt passwords. Supplementary information : CWE Vulnerability type by CWE-326: Inadequate Encryption Strength ( Incorrect cipher strength ) Has been identified. http://cwe.mitre.org/data/definitions/326.htmlA remotely authenticated administrator can use a choice of reversible encryption algorithms to obtain and decrypt passwords. Huawei AR Routers is an AR series router product from China Huawei. An information disclosure vulnerability exists in Huawei AR Routers. An attacker could exploit this vulnerability to obtain sensitive information. Huawei AR, etc. are routing switches of China Huawei (Huawei). The following products and versions are affected: Huawei AR V200R001 , V200R002 , V200R003 , V200R005C10 , V200R005C20 , V200R005C30 ; Quidway S9300 V200R003C00SPC500 , V200R002C00SPC100 , V200R001C00SPC300 ; S12700 V200R006C00 , V200R005C00 ; S9300 V200R006C00SPC500 , V200R005C00SPC300 ; Quidway S5300 V200R001C00SPC300 ", "sources": [ { "db": "NVD", "id": "CVE-2015-8085" }, { "db": "JVNDB", "id": "JVNDB-2015-007261" }, { "db": "CNVD", "id": "CNVD-2015-07446" }, { "db": "BID", "id": "76897" }, { "db": "VULHUB", "id": "VHN-86046" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-8085", "trust": 3.4 }, { "db": "BID", "id": "76897", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2015-007261", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201510-757", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2015-07446", "trust": 0.6 }, { "db": "SEEBUG", "id": "SSVID-89742", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-86046", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07446" }, { "db": "VULHUB", "id": "VHN-86046" }, { "db": "BID", "id": "76897" }, { "db": "JVNDB", "id": "JVNDB-2015-007261" }, { "db": "NVD", "id": "CVE-2015-8085" }, { "db": "CNNVD", "id": "CNNVD-201510-757" } ] }, "id": "VAR-201610-0306", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2015-07446" }, { "db": "VULHUB", "id": "VHN-86046" } ], "trust": 1.4761443282352942 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07446" } ] }, "last_update_date": "2023-12-18T12:51:29.938000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei-SA-20150930-01-Routers", "trust": 0.8, "url": "http://www.huawei.com/en/psirt/security-advisories/hw-455876" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-007261" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-326", "trust": 1.1 }, { "problemtype": "CWE-Other", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-86046" }, { "db": "JVNDB", "id": "JVNDB-2015-007261" }, { "db": "NVD", "id": "CVE-2015-8085" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://www.securityfocus.com/bid/76897" }, { "trust": 1.7, "url": "http://www.huawei.com/en/psirt/security-advisories/hw-455876" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8085" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-8085" }, { "trust": 0.3, "url": "http://www.huawei.com" }, { "trust": 0.3, "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/archive/hw-455876.htm" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07446" }, { "db": "VULHUB", "id": "VHN-86046" }, { "db": "BID", "id": "76897" }, { "db": "JVNDB", "id": "JVNDB-2015-007261" }, { "db": "NVD", "id": "CVE-2015-8085" }, { "db": "CNNVD", "id": "CNNVD-201510-757" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2015-07446" }, { "db": "VULHUB", "id": "VHN-86046" }, { "db": "BID", "id": "76897" }, { "db": "JVNDB", "id": "JVNDB-2015-007261" }, { "db": "NVD", "id": "CVE-2015-8085" }, { "db": "CNNVD", "id": "CNNVD-201510-757" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-11-12T00:00:00", "db": "CNVD", "id": "CNVD-2015-07446" }, { "date": "2016-10-03T00:00:00", "db": "VULHUB", "id": "VHN-86046" }, { "date": "2015-09-30T00:00:00", "db": "BID", "id": "76897" }, { "date": "2016-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-007261" }, { "date": "2016-10-03T21:59:03.800000", "db": "NVD", "id": "CVE-2015-8085" }, { "date": "2015-09-30T00:00:00", "db": "CNNVD", "id": "CNNVD-201510-757" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-11-24T00:00:00", "db": "CNVD", "id": "CNVD-2015-07446" }, { "date": "2016-11-28T00:00:00", "db": "VULHUB", "id": "VHN-86046" }, { "date": "2016-09-19T17:00:00", "db": "BID", "id": "76897" }, { "date": "2016-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-007261" }, { "date": "2016-11-28T19:46:01.013000", "db": "NVD", "id": "CVE-2015-8085" }, { "date": "2016-10-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201510-757" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201510-757" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Huawei Vulnerability in obtaining password in product software", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-007261" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201510-757" } ], "trust": 0.6 } }
var-201306-0350
Vulnerability from variot
Huawei AR 150, 200, 1200, 2200, and 3200 routers, when SNMPv3 is enabled, allow remote attackers to cause a denial of service (device crash) via malformed SNMPv3 requests that leverage unspecified overflow issues. The Huawei AR series router has an overflow error when processing SNMPv3 messages, allowing remote attackers to exploit the vulnerability to submit specially crafted SNMPv3 messages and remotely execute related instructions. AR 150/200/1200/2200/3200 versions V200R001, V200R002, and V200R003 are affected by this vulnerability. Huawei AR Series Routers are AR series router products of China's Huawei. A denial of service vulnerability exists in Huawei AR Series Routers. This vulnerability could be used by a remote attacker to cause a denial of service and could also execute arbitrary code. Remote attackers may exploit this issue to cause denial-of-service conditions. Due to the nature of this issue, arbitrary code execution may be possible; this has not been confirmed. This product provides mobile and fixed network access methods, suitable for enterprise networks
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201306-0350", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ar 3200", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r002" }, { "model": "ar 2200", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r003" }, { "model": "ar 1200", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r002" }, { "model": "ar 1200", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r001" }, { "model": "ar 3200", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r003" }, { "model": "ar 2200", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r001" }, { "model": "ar 2200", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r002" }, { "model": "ar 150", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r003" }, { "model": "ar 3200", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r001" }, { "model": "ar 1200", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r003" }, { "model": "ar 200", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r001" }, { "model": "ar 200", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r002" }, { "model": "ar 150", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r001" }, { "model": "ar 200", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003" }, { "model": "ar 150", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r002" }, { "model": "ar1200", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r001" }, { "model": "ar1200", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r002" }, { "model": "ar1200", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r003" }, { "model": "ar150", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r001" }, { "model": "ar150", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r002" }, { "model": "ar150", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r003" }, { "model": "ar200", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r001" }, { "model": "ar200", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r002" }, { "model": "ar200", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r003" }, { "model": "ar2200", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r001" }, { "model": "ar2200", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r002" }, { "model": "ar2200", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r003" }, { "model": "ar3200", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r001" }, { "model": "ar3200", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r002" }, { "model": "ar3200", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r003" }, { "model": "ar", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "150" }, { "model": "ar", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "200" }, { "model": "ar", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "1200" }, { "model": "ar", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "2200" }, { "model": "ar", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "3200" }, { "model": "ce6850 v100r002c00spc200", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ce5850 v100r002c00spc200", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ce5810 v100r002c00spc200", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ce12800 v100r002c00spc200", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar3200 v200r003", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar3200 v200r002", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar3200 v200r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar2200 v200r003", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar2200 v200r002", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar2200 v200r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar200 v200r003", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar200 v200r002", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar200 v200r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar150 v200r003", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar150 v200r002", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar150 v200r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar1200 v200r003", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar1200 v200r002", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar1200 v200r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ce6850 v100r003c00spc600b22", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ce5850 v100r003c00spc600b22", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ce5810 v100r003c00spc600b22", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ce12800 v100r003c00spc600b22", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar3200 v200r003c01spc300", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar2200 v200r003c01spc300", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar200 v200r003c01spc300", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar150 v200r003c01spc300", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar1200 v200r003c01spc300", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-04835" }, { "db": "BID", "id": "59628" }, { "db": "JVNDB", "id": "JVNDB-2013-003090" }, { "db": "NVD", "id": "CVE-2013-4631" }, { "db": "CNNVD", "id": "CNNVD-201306-411" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:ar_150:v200r001:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ar_150:v200r002:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ar_150:v200r003:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ar_200:v200r001:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ar_200:v200r003:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ar_1200:v200r002:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ar_3200:v200r001:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ar_3200:v200r003:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ar_1200:v200r003:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ar_2200:v200r001:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ar_2200:v200r002:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ar_2200:v200r003:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ar_200:v200r002:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ar_1200:v200r001:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ar_3200:v200r002:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2013-4631" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Roberto Paleari", "sources": [ { "db": "BID", "id": "59628" }, { "db": "CNNVD", "id": "CNNVD-201305-100" } ], "trust": 0.9 }, "cve": "CVE-2013-4631", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2013-4631", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2013-04835", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-64633", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2013-4631", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2013-04835", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201306-411", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-64633", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-04835" }, { "db": "VULHUB", "id": "VHN-64633" }, { "db": "JVNDB", "id": "JVNDB-2013-003090" }, { "db": "NVD", "id": "CVE-2013-4631" }, { "db": "CNNVD", "id": "CNNVD-201306-411" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei AR 150, 200, 1200, 2200, and 3200 routers, when SNMPv3 is enabled, allow remote attackers to cause a denial of service (device crash) via malformed SNMPv3 requests that leverage unspecified overflow issues. The Huawei AR series router has an overflow error when processing SNMPv3 messages, allowing remote attackers to exploit the vulnerability to submit specially crafted SNMPv3 messages and remotely execute related instructions. AR 150/200/1200/2200/3200 versions V200R001, V200R002, and V200R003 are affected by this vulnerability. Huawei AR Series Routers are AR series router products of China\u0027s Huawei. \nA denial of service vulnerability exists in Huawei AR Series Routers. This vulnerability could be used by a remote attacker to cause a denial of service and could also execute arbitrary code. \nRemote attackers may exploit this issue to cause denial-of-service conditions. Due to the nature of this issue, arbitrary code execution may be possible; this has not been confirmed. This product provides mobile and fixed network access methods, suitable for enterprise networks", "sources": [ { "db": "NVD", "id": "CVE-2013-4631" }, { "db": "JVNDB", "id": "JVNDB-2013-003090" }, { "db": "CNVD", "id": "CNVD-2013-04835" }, { "db": "CNNVD", "id": "CNNVD-201305-100" }, { "db": "BID", "id": "59628" }, { "db": "VULHUB", "id": "VHN-64633" } ], "trust": 3.06 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-64633", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-64633" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-4631", "trust": 2.8 }, { "db": "BID", "id": "59628", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2013-003090", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201306-411", "trust": 0.7 }, { "db": "SECUNIA", "id": "53303", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2013-04835", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201305-100", "trust": 0.6 }, { "db": "EXPLOIT-DB", "id": "25295", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-64633", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-04835" }, { "db": "VULHUB", "id": "VHN-64633" }, { "db": "BID", "id": "59628" }, { "db": "JVNDB", "id": "JVNDB-2013-003090" }, { "db": "NVD", "id": "CVE-2013-4631" }, { "db": "CNNVD", "id": "CNNVD-201305-100" }, { "db": "CNNVD", "id": "CNNVD-201306-411" } ] }, "id": "VAR-201306-0350", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2013-04835" }, { "db": "VULHUB", "id": "VHN-64633" } ], "trust": 1.35384614 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-04835" } ] }, "last_update_date": "2023-12-18T13:14:56.567000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei-SA-20130425-02", "trust": 0.8, "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-260601.htm" }, { "title": "Huawei AR Series Routers Patch for SNMPv3 Denial of Service Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/33808" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-04835" }, { "db": "JVNDB", "id": "JVNDB-2013-003090" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-64633" }, { "db": "JVNDB", "id": "JVNDB-2013-003090" }, { "db": "NVD", "id": "CVE-2013-4631" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-260601.htm" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-4631" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-4631" }, { "trust": 0.6, "url": "http://www.secunia.com/advisories/53303/" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/59628" }, { "trust": 0.3, "url": "http://www.huawei.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-04835" }, { "db": "VULHUB", "id": "VHN-64633" }, { "db": "BID", "id": "59628" }, { "db": "JVNDB", "id": "JVNDB-2013-003090" }, { "db": "NVD", "id": "CVE-2013-4631" }, { "db": "CNNVD", "id": "CNNVD-201305-100" }, { "db": "CNNVD", "id": "CNNVD-201306-411" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2013-04835" }, { "db": "VULHUB", "id": "VHN-64633" }, { "db": "BID", "id": "59628" }, { "db": "JVNDB", "id": "JVNDB-2013-003090" }, { "db": "NVD", "id": "CVE-2013-4631" }, { "db": "CNNVD", "id": "CNNVD-201305-100" }, { "db": "CNNVD", "id": "CNNVD-201306-411" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-05-07T00:00:00", "db": "CNVD", "id": "CNVD-2013-04835" }, { "date": "2013-06-20T00:00:00", "db": "VULHUB", "id": "VHN-64633" }, { "date": "2013-05-02T00:00:00", "db": "BID", "id": "59628" }, { "date": "2013-06-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-003090" }, { "date": "2013-06-20T15:55:01.087000", "db": "NVD", "id": "CVE-2013-4631" }, { "date": "2013-05-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201305-100" }, { "date": "2013-06-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201306-411" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-05-07T00:00:00", "db": "CNVD", "id": "CNVD-2013-04835" }, { "date": "2013-06-21T00:00:00", "db": "VULHUB", "id": "VHN-64633" }, { "date": "2015-12-08T22:15:00", "db": "BID", "id": "59628" }, { "date": "2013-06-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-003090" }, { "date": "2013-06-21T16:22:17.900000", "db": "NVD", "id": "CVE-2013-4631" }, { "date": "2013-05-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201305-100" }, { "date": "2013-06-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201306-411" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201305-100" }, { "db": "CNNVD", "id": "CNNVD-201306-411" } ], "trust": 1.2 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei AR Series Routers SNMPv3 Denial of Service Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2013-04835" }, { "db": "BID", "id": "59628" }, { "db": "CNNVD", "id": "CNNVD-201305-100" } ], "trust": 1.5 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-201306-411" } ], "trust": 0.6 } }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
huawei | s9300_firmware | v200r005c00spc300 | |
huawei | s9300_firmware | v200r006c00spc500 | |
huawei | s9300 | - | |
huawei | s12700_firmware | v200r005c00 | |
huawei | s12700_firmware | v200r006c00 | |
huawei | s12700 | - | |
huawei | quidway_s9300_firmware | v200r001c00spc300 | |
huawei | quidway_s9300_firmware | v200r002c00spc100 | |
huawei | quidway_s9300_firmware | v200r003c00spc500 | |
huawei | quidway_s9300 | - | |
huawei | ar_firmware | v200r001 | |
huawei | ar_firmware | v200r002 | |
huawei | ar_firmware | v200r003 | |
huawei | ar_firmware | v200r005c10 | |
huawei | ar_firmware | v200r005c20 | |
huawei | ar_firmware | v200r005c30 | |
huawei | ar | - | |
huawei | quidway_s5300_firmware | v200r001c00spc300 | |
huawei | quidway_s5300 | - | |
huawei | s5700_firmware | v200r001c00 | |
huawei | s5700_firmware | v200r002c00 | |
huawei | s5700_firmware | v200r003c00 | |
huawei | s5700_firmware | v200r005c00 | |
huawei | s5700_firmware | v200r006c00 | |
huawei | s5700 | - | |
huawei | s5300_firmware | v200r002c00 | |
huawei | s5300_firmware | v200r005c00spc500 | |
huawei | s5300_firmware | v200r006c00spc500 | |
huawei | s5300 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s9300_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "A066F4B8-2258-4ED2-A166-02FCA7C9F3A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9300_firmware:v200r006c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "DDA38762-CACE-403B-8DE5-42E0306FEB28", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s12700_firmware:v200r005c00:*:*:*:*:*:*:*", "matchCriteriaId": "7D81469B-EC6C-493D-B632-4DF821A1F304", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s12700_firmware:v200r006c00:*:*:*:*:*:*:*", "matchCriteriaId": "D6F2C4C7-3438-42B8-8999-C17E45C8CF49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*", "matchCriteriaId": "138C1E57-176C-46B1-9704-D9C8391CC802", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:quidway_s9300_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "DB8B2442-4A0E-4C7A-8D21-A1E09BD1A204", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:quidway_s9300_firmware:v200r002c00spc100:*:*:*:*:*:*:*", "matchCriteriaId": "3022A5BA-DD0D-47D8-8EFA-A617743C133A", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:quidway_s9300_firmware:v200r003c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "7B2FFB6E-1895-4796-B445-4A4193DEFEAE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:quidway_s9300:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E756FE8-F106-4BFD-B33B-CC198363D2FD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ar_firmware:v200r001:*:*:*:*:*:*:*", "matchCriteriaId": "0A265FD5-0984-4698-97EB-2904C289561D", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:ar_firmware:v200r002:*:*:*:*:*:*:*", "matchCriteriaId": "EFF757E5-F689-49CF-9972-ED5A3D825891", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:ar_firmware:v200r003:*:*:*:*:*:*:*", "matchCriteriaId": "08EAB0B6-9363-4632-814A-D51DD3087346", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:ar_firmware:v200r005c10:*:*:*:*:*:*:*", "matchCriteriaId": "65081FFE-ECBD-42EE-885A-7E29AB844FBC", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:ar_firmware:v200r005c20:*:*:*:*:*:*:*", "matchCriteriaId": "5356CB25-52E6-4786-B024-07F7B53E00A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:ar_firmware:v200r005c30:*:*:*:*:*:*:*", "matchCriteriaId": "53A40184-F3A0-472C-B4DE-7AD6D73BEA17", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ar:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1D2EB9C-FA8B-4B3F-89BE-AC2611EE4373", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:quidway_s5300_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "B5B529C9-04F5-48C3-9346-C7E0104ED0C8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:quidway_s5300:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C872196-628D-42A2-AC58-69CD8784CE5D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r001c00:*:*:*:*:*:*:*", "matchCriteriaId": "336AA440-AEF4-482B-A037-8976DC38BA1A", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r002c00:*:*:*:*:*:*:*", "matchCriteriaId": "3B2DE9FE-5EC9-462E-86F0-EE772C944DFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*", "matchCriteriaId": "4907FBB8-5157-460D-9240-DD7D610C0FCC", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*", "matchCriteriaId": "DCF23DAE-1215-41B2-88C5-4436D846266C", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*", "matchCriteriaId": "5973A534-F961-4A97-B20E-994BA28AFE29", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*", "matchCriteriaId": "E22D3CFF-3353-4EE2-8933-84F395469D0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5300_firmware:v200r002c00:*:*:*:*:*:*:*", "matchCriteriaId": "8FD118E1-317E-4903-A4D0-51EBCFA58C5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300_firmware:v200r005c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "1AC26C2F-71A8-433A-B062-789F2E32605C", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300_firmware:v200r006c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "A17ED5D3-1698-4AED-9640-F9CE026AD217", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CFEF08E-54C5-4D60-AFF0-37B00D6E2DDD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Huawei AR routers with software before V200R007C00SPC100; Quidway S9300 routers with software before V200R009C00; S12700 routers with software before V200R008C00SPC500; S9300, Quidway S5300, and S5300 routers with software before V200R007C00; and S5700 routers with software before V200R007C00SPC500 make it easier for remote authenticated administrators to obtain and decrypt passwords by leveraging selection of a reversible encryption algorithm." }, { "lang": "es", "value": "Routers Huawei AR con software en versiones anteriores a V200R007C00SPC100; routers Quidway S9300 con software en versiones anteriores a V200R009C00; routers S12700 con software en versiones anteriores aV200R008C00SPC500; routers S9300, Quidway S5300 y S5300 con software en versiones anteriores aV200R007C00 y routers S5700 con software en versiones anteriores aV200R007C00SPC500 facilita a administradores remotos autenticados obtener y descifrar contrase\u00f1as aprovechando la selecci\u00f3n de un algoritmos de cifrado reversible." } ], "id": "CVE-2015-8085", "lastModified": "2024-11-21T02:37:59.440", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-10-03T21:59:03.800", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/hw-455876" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/76897" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/hw-455876" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/76897" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-326" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
huawei | quidway_s5300_firmware | v200r001c00spc300 | |
huawei | quidway_s5300 | - | |
huawei | quidway_s9300_firmware | v200r001c00spc300 | |
huawei | quidway_s9300_firmware | v200r002c00spc100 | |
huawei | quidway_s9300_firmware | v200r003c00spc500 | |
huawei | quidway_s9300 | - | |
huawei | s5700_firmware | v200r001c00 | |
huawei | s5700_firmware | v200r002c00 | |
huawei | s5700_firmware | v200r003c00 | |
huawei | s5700_firmware | v200r005c00 | |
huawei | s5700_firmware | v200r006c00 | |
huawei | s5700 | - | |
huawei | s12700_firmware | v200r005c00 | |
huawei | s12700_firmware | v200r006c00 | |
huawei | s12700 | - | |
huawei | ar_firmware | v200r001 | |
huawei | ar_firmware | v200r002 | |
huawei | ar_firmware | v200r003 | |
huawei | ar_firmware | v200r005c10 | |
huawei | ar_firmware | v200r005c20 | |
huawei | ar_firmware | v200r005c30 | |
huawei | ar | - | |
huawei | s5300_firmware | v200r002c00 | |
huawei | s5300_firmware | v200r005c00spc500 | |
huawei | s5300_firmware | v200r006c00spc500 | |
huawei | s5300 | - | |
huawei | s9300_firmware | v200r005c00spc300 | |
huawei | s9300_firmware | v200r006c00spc500 | |
huawei | s9300 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:quidway_s5300_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "B5B529C9-04F5-48C3-9346-C7E0104ED0C8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:quidway_s5300:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C872196-628D-42A2-AC58-69CD8784CE5D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:quidway_s9300_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "DB8B2442-4A0E-4C7A-8D21-A1E09BD1A204", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:quidway_s9300_firmware:v200r002c00spc100:*:*:*:*:*:*:*", "matchCriteriaId": "3022A5BA-DD0D-47D8-8EFA-A617743C133A", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:quidway_s9300_firmware:v200r003c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "7B2FFB6E-1895-4796-B445-4A4193DEFEAE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:quidway_s9300:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E756FE8-F106-4BFD-B33B-CC198363D2FD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r001c00:*:*:*:*:*:*:*", "matchCriteriaId": "336AA440-AEF4-482B-A037-8976DC38BA1A", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r002c00:*:*:*:*:*:*:*", "matchCriteriaId": "3B2DE9FE-5EC9-462E-86F0-EE772C944DFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*", "matchCriteriaId": "4907FBB8-5157-460D-9240-DD7D610C0FCC", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*", "matchCriteriaId": "DCF23DAE-1215-41B2-88C5-4436D846266C", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*", "matchCriteriaId": "5973A534-F961-4A97-B20E-994BA28AFE29", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*", "matchCriteriaId": "E22D3CFF-3353-4EE2-8933-84F395469D0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s12700_firmware:v200r005c00:*:*:*:*:*:*:*", "matchCriteriaId": "7D81469B-EC6C-493D-B632-4DF821A1F304", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s12700_firmware:v200r006c00:*:*:*:*:*:*:*", "matchCriteriaId": "D6F2C4C7-3438-42B8-8999-C17E45C8CF49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*", "matchCriteriaId": "138C1E57-176C-46B1-9704-D9C8391CC802", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ar_firmware:v200r001:*:*:*:*:*:*:*", "matchCriteriaId": "0A265FD5-0984-4698-97EB-2904C289561D", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:ar_firmware:v200r002:*:*:*:*:*:*:*", "matchCriteriaId": "EFF757E5-F689-49CF-9972-ED5A3D825891", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:ar_firmware:v200r003:*:*:*:*:*:*:*", "matchCriteriaId": "08EAB0B6-9363-4632-814A-D51DD3087346", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:ar_firmware:v200r005c10:*:*:*:*:*:*:*", "matchCriteriaId": "65081FFE-ECBD-42EE-885A-7E29AB844FBC", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:ar_firmware:v200r005c20:*:*:*:*:*:*:*", "matchCriteriaId": "5356CB25-52E6-4786-B024-07F7B53E00A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:ar_firmware:v200r005c30:*:*:*:*:*:*:*", "matchCriteriaId": "53A40184-F3A0-472C-B4DE-7AD6D73BEA17", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ar:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1D2EB9C-FA8B-4B3F-89BE-AC2611EE4373", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5300_firmware:v200r002c00:*:*:*:*:*:*:*", "matchCriteriaId": "8FD118E1-317E-4903-A4D0-51EBCFA58C5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300_firmware:v200r005c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "1AC26C2F-71A8-433A-B062-789F2E32605C", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300_firmware:v200r006c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "A17ED5D3-1698-4AED-9640-F9CE026AD217", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CFEF08E-54C5-4D60-AFF0-37B00D6E2DDD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s9300_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "A066F4B8-2258-4ED2-A166-02FCA7C9F3A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9300_firmware:v200r006c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "DDA38762-CACE-403B-8DE5-42E0306FEB28", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Huawei AR routers with software before V200R007C00SPC100; Quidway S9300 routers with software before V200R009C00; S12700 routers with software before V200R008C00SPC500; S9300, Quidway S5300, and S5300 routers with software before V200R007C00; and S5700 routers with software before V200R007C00SPC500 makes it easier for remote authenticated administrators to obtain encryption keys and ciphertext passwords via vectors related to key storage." }, { "lang": "es", "value": "Routers Huawei AR con software en versiones anteriores a V200R007C00SPC100; routers Quidway S9300 con software en versiones anteriores a V200R009C00; routers S12700 con software en versiones anteriores a V200R008C00SPC500; routers S9300, Quidway S5300 y S5300 con software en versiones anteriores a V200R007C00 y routers S5700 con software en versiones anteriores a V200R007C00SPC500 facilita a administradores remotos autenticados obtener las claves de cifrado y contrase\u00f1as de texto cifrado a trav\u00e9s de vectores relacionados con el almacenamiento de claves." } ], "id": "CVE-2015-8086", "lastModified": "2024-11-21T02:37:59.587", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-10-03T21:59:04.893", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/hw-455876" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/76897" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/hw-455876" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/76897" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-326" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }