All the vulnerabilites related to huawei - ar_1200
cve-2013-4631
Vulnerability from cvelistv5
Published
2013-06-20 15:00
Modified
2024-09-16 21:58
Severity ?
EPSS score ?
Summary
Huawei AR 150, 200, 1200, 2200, and 3200 routers, when SNMPv3 is enabled, allow remote attackers to cause a denial of service (device crash) via malformed SNMPv3 requests that leverage unspecified overflow issues.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-260601.htm | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:52:26.933Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-260601.htm" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Huawei AR 150, 200, 1200, 2200, and 3200 routers, when SNMPv3 is enabled, allow remote attackers to cause a denial of service (device crash) via malformed SNMPv3 requests that leverage unspecified overflow issues." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-06-20T15:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-260601.htm" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-4631", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Huawei AR 150, 200, 1200, 2200, and 3200 routers, when SNMPv3 is enabled, allow remote attackers to cause a denial of service (device crash) via malformed SNMPv3 requests that leverage unspecified overflow issues." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-260601.htm", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-260601.htm" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-4631", "datePublished": "2013-06-20T15:00:00Z", "dateReserved": "2013-06-20T00:00:00Z", "dateUpdated": "2024-09-16T21:58:23.896Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-4630
Vulnerability from cvelistv5
Published
2013-06-20 15:00
Modified
2024-08-06 16:52
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow on Huawei AR 150, 200, 1200, 2200, and 3200 routers, when SNMPv3 debugging is enabled, allows remote attackers to execute arbitrary code via malformed SNMPv3 requests.
References
▼ | URL | Tags |
---|---|---|
http://www.exploit-db.com/exploits/25295 | exploit, x_refsource_EXPLOIT-DB | |
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-260626.htm | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:52:26.975Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "25295", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/25295" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-260626.htm" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-03-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow on Huawei AR 150, 200, 1200, 2200, and 3200 routers, when SNMPv3 debugging is enabled, allows remote attackers to execute arbitrary code via malformed SNMPv3 requests." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-11-02T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "25295", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/25295" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-260626.htm" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-4630", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow on Huawei AR 150, 200, 1200, 2200, and 3200 routers, when SNMPv3 debugging is enabled, allows remote attackers to execute arbitrary code via malformed SNMPv3 requests." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "25295", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/25295" }, { "name": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-260626.htm", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-260626.htm" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-4630", "datePublished": "2013-06-20T15:00:00", "dateReserved": "2013-06-20T00:00:00", "dateUpdated": "2024-08-06T16:52:26.975Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2013-06-20 15:55
Modified
2024-11-21 01:55
Severity ?
Summary
Huawei AR 150, 200, 1200, 2200, and 3200 routers, when SNMPv3 is enabled, allow remote attackers to cause a denial of service (device crash) via malformed SNMPv3 requests that leverage unspecified overflow issues.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | ar_1200 | v200r001 | |
huawei | ar_1200 | v200r002 | |
huawei | ar_1200 | v200r003 | |
huawei | ar_150 | v200r001 | |
huawei | ar_150 | v200r002 | |
huawei | ar_150 | v200r003 | |
huawei | ar_200 | v200r001 | |
huawei | ar_200 | v200r002 | |
huawei | ar_200 | v200r003 | |
huawei | ar_2200 | v200r001 | |
huawei | ar_2200 | v200r002 | |
huawei | ar_2200 | v200r003 | |
huawei | ar_3200 | v200r001 | |
huawei | ar_3200 | v200r002 | |
huawei | ar_3200 | v200r003 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ar_1200:v200r001:*:*:*:*:*:*:*", "matchCriteriaId": "91C15137-0BE6-4A8A-BBE4-835CE9D55EED", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_1200:v200r002:*:*:*:*:*:*:*", "matchCriteriaId": "4EBC7873-F277-4567-882C-759335670BCE", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_1200:v200r003:*:*:*:*:*:*:*", "matchCriteriaId": "422CF4F4-DC3F-45A3-9D05-ABF9DE5621AB", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_150:v200r001:*:*:*:*:*:*:*", "matchCriteriaId": "AC5201F6-1A0C-434A-8A7A-B194A89611A2", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_150:v200r002:*:*:*:*:*:*:*", "matchCriteriaId": "7428959D-CF8A-420E-969B-97EAD38A2FB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_150:v200r003:*:*:*:*:*:*:*", "matchCriteriaId": "6307C68F-931C-4D87-9CC1-B3431CAB0C11", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_200:v200r001:*:*:*:*:*:*:*", "matchCriteriaId": "E243DC77-196A-4B4A-B2E6-30F4B634F419", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_200:v200r002:*:*:*:*:*:*:*", "matchCriteriaId": "7EEED571-6638-464C-AE91-8B8DCBD87A43", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_200:v200r003:*:*:*:*:*:*:*", "matchCriteriaId": "5BAD81D8-2385-42CE-A147-7C23AD80A693", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_2200:v200r001:*:*:*:*:*:*:*", "matchCriteriaId": "BA95EF1E-1309-4348-B1C0-9EF668DF774F", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_2200:v200r002:*:*:*:*:*:*:*", "matchCriteriaId": "6EBEFD7D-EA06-4017-A276-8B4741C9C51F", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_2200:v200r003:*:*:*:*:*:*:*", "matchCriteriaId": "90670CC0-1434-4DCA-8D85-0ABCF76C9A1C", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_3200:v200r001:*:*:*:*:*:*:*", "matchCriteriaId": "F2445F89-743C-4A9A-AEAD-8428F0DC50AE", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_3200:v200r002:*:*:*:*:*:*:*", "matchCriteriaId": "D8FE1931-1585-4E9E-971D-1DA89C4ED59A", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_3200:v200r003:*:*:*:*:*:*:*", "matchCriteriaId": "D69F769D-C3B0-459C-92BE-57CA645AFD15", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Huawei AR 150, 200, 1200, 2200, and 3200 routers, when SNMPv3 is enabled, allow remote attackers to cause a denial of service (device crash) via malformed SNMPv3 requests that leverage unspecified overflow issues." }, { "lang": "es", "value": "Los router Huawei AR 150, 200, 1200, 2200, y 3200, cuando SNMPv3 est\u00e1 habilitado, permite a atacantes remotos causar una denegaci\u00f3n de servicios (ca\u00edda del dispositivo) a trav\u00e9s de peticiones SNMPv3 malformadas que aprovechan problemas de desbordamiento no especificados." } ], "id": "CVE-2013-4631", "lastModified": "2024-11-21T01:55:58.233", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-06-20T15:55:01.087", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-260601.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-260601.htm" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-06-20 15:55
Modified
2024-11-21 01:55
Severity ?
Summary
Stack-based buffer overflow on Huawei AR 150, 200, 1200, 2200, and 3200 routers, when SNMPv3 debugging is enabled, allows remote attackers to execute arbitrary code via malformed SNMPv3 requests.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | ar_1200 | v200r001 | |
huawei | ar_1200 | v200r002 | |
huawei | ar_1200 | v200r003 | |
huawei | ar_150 | v200r001 | |
huawei | ar_150 | v200r002 | |
huawei | ar_150 | v200r003 | |
huawei | ar_200 | v200r001 | |
huawei | ar_200 | v200r002 | |
huawei | ar_200 | v200r003 | |
huawei | ar_2200 | v200r001 | |
huawei | ar_2200 | v200r002 | |
huawei | ar_2200 | v200r003 | |
huawei | ar_3200 | v200r001 | |
huawei | ar_3200 | v200r002 | |
huawei | ar_3200 | v200r003 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ar_1200:v200r001:*:*:*:*:*:*:*", "matchCriteriaId": "91C15137-0BE6-4A8A-BBE4-835CE9D55EED", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_1200:v200r002:*:*:*:*:*:*:*", "matchCriteriaId": "4EBC7873-F277-4567-882C-759335670BCE", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_1200:v200r003:*:*:*:*:*:*:*", "matchCriteriaId": "422CF4F4-DC3F-45A3-9D05-ABF9DE5621AB", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_150:v200r001:*:*:*:*:*:*:*", "matchCriteriaId": "AC5201F6-1A0C-434A-8A7A-B194A89611A2", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_150:v200r002:*:*:*:*:*:*:*", "matchCriteriaId": "7428959D-CF8A-420E-969B-97EAD38A2FB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_150:v200r003:*:*:*:*:*:*:*", "matchCriteriaId": "6307C68F-931C-4D87-9CC1-B3431CAB0C11", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_200:v200r001:*:*:*:*:*:*:*", "matchCriteriaId": "E243DC77-196A-4B4A-B2E6-30F4B634F419", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_200:v200r002:*:*:*:*:*:*:*", "matchCriteriaId": "7EEED571-6638-464C-AE91-8B8DCBD87A43", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_200:v200r003:*:*:*:*:*:*:*", "matchCriteriaId": "5BAD81D8-2385-42CE-A147-7C23AD80A693", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_2200:v200r001:*:*:*:*:*:*:*", "matchCriteriaId": "BA95EF1E-1309-4348-B1C0-9EF668DF774F", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_2200:v200r002:*:*:*:*:*:*:*", "matchCriteriaId": "6EBEFD7D-EA06-4017-A276-8B4741C9C51F", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_2200:v200r003:*:*:*:*:*:*:*", "matchCriteriaId": "90670CC0-1434-4DCA-8D85-0ABCF76C9A1C", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_3200:v200r001:*:*:*:*:*:*:*", "matchCriteriaId": "F2445F89-743C-4A9A-AEAD-8428F0DC50AE", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_3200:v200r002:*:*:*:*:*:*:*", "matchCriteriaId": "D8FE1931-1585-4E9E-971D-1DA89C4ED59A", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_3200:v200r003:*:*:*:*:*:*:*", "matchCriteriaId": "D69F769D-C3B0-459C-92BE-57CA645AFD15", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow on Huawei AR 150, 200, 1200, 2200, and 3200 routers, when SNMPv3 debugging is enabled, allows remote attackers to execute arbitrary code via malformed SNMPv3 requests." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en los router Huawei AR 150, 200, 1200, 2200, y 3200, cuando el depurado SNMPv3 est\u00e1 habilitado, permite a atacantes remotos ejecutar c\u00f3digo a trav\u00e9s de peticiones SNMPv3 malformadas." } ], "id": "CVE-2013-4630", "lastModified": "2024-11-21T01:55:58.107", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.6, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-06-20T15:55:01.070", "references": [ { "source": "cve@mitre.org", "url": "http://www.exploit-db.com/exploits/25295" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-260626.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.exploit-db.com/exploits/25295" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-260626.htm" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }