All the vulnerabilites related to huawei - e6878-370_firmware
Vulnerability from fkie_nvd
Published
2020-10-19 20:15
Modified
2024-11-21 05:40
Summary
E6878-370 versions 10.0.3.1(H557SP27C233),10.0.3.1(H563SP21C233) and E6878-870 versions 10.0.3.1(H557SP27C233),10.0.3.1(H563SP11C233) have a denial of service vulnerability. The system does not properly check some events, an attacker could launch the events continually, successful exploit could cause reboot of the process.
Impacted products
Vendor Product Version
huawei e6878-370_firmware 10.0.3.1\(h557sp27c233\)
huawei e6878-370_firmware 10.0.3.1\(h563sp21c233\)
huawei e6878-370 -
huawei e6878-870_firmware 10.0.3.1\(h557sp27c233\)
huawei e6878-870_firmware 10.0.3.1\(h563sp11c233\)
huawei e6878-870 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:e6878-370_firmware:10.0.3.1\\(h557sp27c233\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DEBD99EE-8827-4F40-8C41-3917AEA25239",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:e6878-370_firmware:10.0.3.1\\(h563sp21c233\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7793D7FE-F4FE-4BEB-8B4F-F07759A06E9F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:e6878-370:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADA263F9-F9F5-4249-A55A-748689F0271E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:e6878-870_firmware:10.0.3.1\\(h557sp27c233\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5636CCA2-763E-4F9D-8B18-7E48B34028C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:e6878-870_firmware:10.0.3.1\\(h563sp11c233\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C469017B-AED2-488A-9659-11CEEC5F2E04",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:e6878-870:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C252DAF3-7A62-415D-B399-DB4859867DEE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "E6878-370 versions 10.0.3.1(H557SP27C233),10.0.3.1(H563SP21C233) and E6878-870 versions 10.0.3.1(H557SP27C233),10.0.3.1(H563SP11C233) have a denial of service vulnerability. The system does not properly check some events, an attacker could launch the events continually, successful exploit could cause reboot of the process."
    },
    {
      "lang": "es",
      "value": "E6878-370 versiones 10.0.3.1(H557SP27C233), 10.0.3.1(H563SP21C233) y E6878-870 versiones 10.0.3.1(H557SP27C233), 10.0.3.1(H563SP11C233), presentan una vulnerabilidad de denegaci\u00f3n de servicio.\u0026#xa0;El sistema no comprueba apropiadamente algunos eventos, un atacante podr\u00eda iniciar los eventos continuamente, una explotaci\u00f3n con \u00e9xito podr\u00eda causar el reinicio del proceso"
    }
  ],
  "id": "CVE-2020-9111",
  "lastModified": "2024-11-21T05:40:03.720",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.7,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:A/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 5.1,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 4.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-10-19T20:15:13.150",
  "references": [
    {
      "source": "psirt@huawei.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201014-02-dos-en"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201014-02-dos-en"
    }
  ],
  "sourceIdentifier": "psirt@huawei.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-08-17 16:15
Modified
2024-11-21 05:40
Summary
Huawei 5G Mobile WiFi E6878-370 with versions of 10.0.3.1(H563SP1C00),10.0.3.1(H563SP21C233) have an improper authorization vulnerability. The device does not restrict certain data received from WAN port. Successful exploit could allow an attacker at WAN side to manage certain service of the device.
Impacted products
Vendor Product Version
huawei e6878-370_firmware 10.0.3.1\(h563sp1c00\)
huawei e6878-370_firmware 10.0.3.1\(h563sp21c233\)
huawei e6878-370 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:e6878-370_firmware:10.0.3.1\\(h563sp1c00\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E527F624-8AAE-47FB-A19A-0A75BA43BFB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:e6878-370_firmware:10.0.3.1\\(h563sp21c233\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7793D7FE-F4FE-4BEB-8B4F-F07759A06E9F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:e6878-370:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADA263F9-F9F5-4249-A55A-748689F0271E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Huawei 5G Mobile WiFi E6878-370 with versions of 10.0.3.1(H563SP1C00),10.0.3.1(H563SP21C233) have an improper authorization vulnerability. The device does not restrict certain data received from WAN port. Successful exploit could allow an attacker at WAN side to manage certain service of the device."
    },
    {
      "lang": "es",
      "value": "Huawei 5G Mobile WiFi E6878-370 con versiones de 10.0.3.1(H563SP1C00), 10.0.3.1(H563SP21C233), presentan una vulnerabilidad de autorizaci\u00f3n inapropiada.  El dispositivo no restringe determinados datos recibidos de un puerto WAN. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir a un atacante en el lado de la WAN administrar determinado servicio del dispositivo."
    }
  ],
  "id": "CVE-2020-9241",
  "lastModified": "2024-11-21T05:40:14.180",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.0,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 4.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-17T16:15:14.107",
  "references": [
    {
      "source": "psirt@huawei.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200812-01-auth-en"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200812-01-auth-en"
    }
  ],
  "sourceIdentifier": "psirt@huawei.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-05-29 20:15
Modified
2024-11-21 05:11
Summary
E6878-370 products with versions of 10.0.3.1(H557SP27C233) and 10.0.3.1(H563SP1C00) have a stack buffer overflow vulnerability. The program copies an input buffer to an output buffer without verification. An attacker in the adjacent network could send a crafted message, successful exploit could lead to stack buffer overflow which may cause malicious code execution.
Impacted products
Vendor Product Version
huawei e6878-370_firmware 10.0.3.1\(h557sp27c233\)
huawei e6878-370_firmware 10.0.3.1\(h563sp1c233\)
huawei e6878-370 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:e6878-370_firmware:10.0.3.1\\(h557sp27c233\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DEBD99EE-8827-4F40-8C41-3917AEA25239",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:e6878-370_firmware:10.0.3.1\\(h563sp1c233\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "886689D3-7A13-4D98-9C94-66A21EE0EC32",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:e6878-370:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADA263F9-F9F5-4249-A55A-748689F0271E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "E6878-370 products with versions of 10.0.3.1(H557SP27C233) and 10.0.3.1(H563SP1C00) have a stack buffer overflow vulnerability. The program copies an input buffer to an output buffer without verification. An attacker in the adjacent network could send a crafted message, successful exploit could lead to stack buffer overflow which may cause malicious code execution."
    },
    {
      "lang": "es",
      "value": "Los productos E6878-370 con versiones de 10.0.3.1(H557SP27C233) y 10.0.3.1(H563SP1C00), presentan una vulnerabilidad de desbordamiento de b\u00fafer de la pila. El programa copia un b\u00fafer de entrada hacia un b\u00fafer de salida sin verificaci\u00f3n. Un atacante en la red adyacente podr\u00eda enviar un mensaje dise\u00f1ado, una explotaci\u00f3n con \u00e9xito podr\u00eda conllevar a un desbordamiento de b\u00fafer de la pila que podr\u00eda causar una ejecuci\u00f3n de c\u00f3digo malicioso."
    }
  ],
  "id": "CVE-2020-1832",
  "lastModified": "2024-11-21T05:11:27.330",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-05-29T20:15:11.233",
  "references": [
    {
      "source": "psirt@huawei.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-stack-en"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-stack-en"
    }
  ],
  "sourceIdentifier": "psirt@huawei.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-05-21 15:15
Modified
2024-11-21 05:39
Summary
There is an information leakage vulnerability in some Huawei products. An unauthenticated, adjacent attacker could exploit this vulnerability to decrypt data. Successful exploitation may leak information randomly. Affected product versions include: Anne-AL00 Versions earlier than 9.1.0.331(C675E9R1P3T8); Berkeley-L09 Versions earlier than 10.0.1.1(C675R1); CD16-10 Versions earlier than 10.0.2.8; CD17-10 Versions earlier than 10.0.2.8; CD17-16 Versions earlier than 10.0.2.8; CD18-10 Versions earlier than 10.0.2.8; CD18-16 Versions earlier than 10.0.2.8; Columbia-TL00B Versions earlier than 9.0.0.187(C01E181R1P20T8); E6878-370 Versions earlier than 10.0.5.1(H610SP10C00); HUAWEI P30 lite Versions earlier than 10.0.0.185(C605E3R1P3), Versions earlier than 10.0.0.197(C432E8R2P7); HUAWEI nova 4e Versions earlier than 10.0.0.158(C00E64R1P9); Honor 10 Lite 9.0.1.113(C675E11R1P12); LelandP-L22A Versions earlier than 9.1.0.166(C675E5R1P4T8); Marie-AL00AX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00AY Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00BX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-L03BX Versions earlier than 10.0.0.188(C605E5R1P1); Marie-L21BX Versions earlier than 10.0.0.188(C432E4R4P1), Versions earlier than 10.0.0.188(C461E5R3P1); Marie-L22BX Versions earlier than 10.0.0.188(C636E3R3P1); Marie-L23BX Versions earlier than 10.0.0.188(C605E5R1P1); TC5200-16 Versions earlier than 10.0.2.8; WS5200-11 Versions earlier than 10.0.2.8; WS5200-12 Versions earlier than 10.0.2.23; WS5200-16 Versions earlier than 10.0.2.8; WS5200-17 Versions earlier than 10.0.2.23; WS5800-10 Versions earlier than 10.0.3.27; WS6500-10 Versions earlier than 10.0.2.8; WS6500-16 Versions earlier than 10.0.2.8



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:anne-al00_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61FF27C-1D5A-414C-88BE-A4E1567D57E3",
              "versionEndExcluding": "9.1.0.331\\(c675e9r1p3t8\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:anne-al00:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06F78E5C-78A2-464C-B4DC-8CF6A2D1133C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:berkeley-l09_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7BA6CC3-74ED-4936-B5F3-09AE0942D7F1",
              "versionEndExcluding": "10.0.1.1\\(c675r1\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:berkeley-l09:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB51593F-70AE-47F6-AFE5-02693181E599",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:cd16-10_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "71E7A9EC-D51E-4E00-9E20-397405DD405E",
              "versionEndExcluding": "10.0.2.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:cd16-10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E4BF946-F846-4B59-A8BD-71D3C32FA9DE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:cd17-10_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1259623C-9765-4A03-B984-71BC23832EA5",
              "versionEndExcluding": "10.0.2.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:cd17-10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86840A12-552E-4673-9459-9C888D311227",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:cd17-16_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5021FFF9-39E9-4392-8F7B-77C99AD9021B",
              "versionEndExcluding": "10.0.2.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:cd17-16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "192D571A-3612-48FF-AD58-F85C05109DB0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:cd18-10_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "99350875-103C-4E3D-A3F1-CB51A3F04CAB",
              "versionEndExcluding": "10.0.2.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:cd18-10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3B85A0E-7A60-464B-BDA0-F62CBB91D469",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:cd18-16_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "541F6EEE-365C-4317-BE40-5D1780023B37",
              "versionEndExcluding": "10.0.2.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:cd18-16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "272588E3-15DA-48C5-B5EA-E53D981294B5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:columbia-tl00b_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "78009F5F-1CC7-41D5-B3D7-DFDD6888CF98",
              "versionEndExcluding": "9.0.0.187\\(c01e181r1p20t8\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:columbia-tl00b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02334509-2493-419F-8FF5-E1F1076FB930",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:e6878-370_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A597E29-2CFE-4D6F-8141-D0A8A04C7BF9",
              "versionEndExcluding": "10.0.5.1\\(h610sp10c00\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:e6878-370:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADA263F9-F9F5-4249-A55A-748689F0271E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:honor_10_lite_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "01770930-E2A3-4759-8367-4DAA53046B20",
              "versionEndExcluding": "10.0.0.182\\(c675e17r2p2\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:honor_10_lite:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "033EDED3-AF7B-40D7-A467-E3AAAFB88AE4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:lelandp-l22a_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "93DD848A-F0E2-4064-BB74-9FC5C82157AB",
              "versionEndExcluding": "9.1.0.166\\(c675e5r1p4t8\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:lelandp-l22a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "842AB2B6-2C7A-4681-ACB7-E642E5D9D76D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tc5200-16_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BE98F19-5883-4C1F-892E-4AEF2DB7EDB0",
              "versionEndExcluding": "10.0.2.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tc5200-16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "392304B7-F9CD-44B4-88FB-353A650DB700",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ws5200-11_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "01371306-680F-4007-8E5A-865C67D657E5",
              "versionEndExcluding": "10.0.2.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ws5200-11:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C907A885-BA32-4819-B53C-0FBFE38C2510",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ws5200-11_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9FA3F67-7545-444D-BCCB-133B6680F3A7",
              "versionEndExcluding": "10.0.2.23",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ws5200-11:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C907A885-BA32-4819-B53C-0FBFE38C2510",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ws5200-16_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "91D3BD34-4095-4730-995D-5731A0BB8BF9",
              "versionEndExcluding": "10.0.2.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ws5200-16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "05E7101C-170D-4EA2-96A7-410AE55137BF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ws5200-17_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "23D525C1-B8A9-422B-A315-73BF6D4DEF7B",
              "versionEndExcluding": "10.0.2.23",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ws5200-17:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71EAA19C-B250-4809-BE4A-4575D5F793A4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ws5800-10_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "738EA159-65D7-42FE-B29F-1890F93A1A5D",
              "versionEndExcluding": "10.0.3.27",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ws5800-10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED553DD3-585A-4BD2-9291-B9C09AC6AC40",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ws6500-10_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCDF3E0C-594B-48BF-8E9F-4A10A11D5449",
              "versionEndExcluding": "10.0.2.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ws6500-10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C660061-69B0-43B8-BFD3-E858C6B2B437",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ws6500-16_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0571923-C1D0-4F06-AD1E-9D43F5290B74",
              "versionEndExcluding": "10.0.2.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ws6500-16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B611DA7B-A2E3-44A3-BC8B-C43308EF3E2B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "There is an information leakage vulnerability in some Huawei products. An unauthenticated, adjacent attacker could exploit this vulnerability to decrypt data. Successful exploitation may leak information randomly. Affected product versions include: Anne-AL00 Versions earlier than 9.1.0.331(C675E9R1P3T8); Berkeley-L09 Versions earlier than 10.0.1.1(C675R1); CD16-10 Versions earlier than 10.0.2.8; CD17-10 Versions earlier than 10.0.2.8; CD17-16 Versions earlier than 10.0.2.8; CD18-10 Versions earlier than 10.0.2.8; CD18-16 Versions earlier than 10.0.2.8; Columbia-TL00B Versions earlier than 9.0.0.187(C01E181R1P20T8); E6878-370 Versions earlier than 10.0.5.1(H610SP10C00); HUAWEI P30 lite Versions earlier than 10.0.0.185(C605E3R1P3), Versions earlier than 10.0.0.197(C432E8R2P7); HUAWEI nova 4e Versions earlier than 10.0.0.158(C00E64R1P9); Honor 10 Lite 9.0.1.113(C675E11R1P12); LelandP-L22A Versions earlier than 9.1.0.166(C675E5R1P4T8); Marie-AL00AX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00AY Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00BX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-L03BX Versions earlier than 10.0.0.188(C605E5R1P1); Marie-L21BX Versions earlier than 10.0.0.188(C432E4R4P1), Versions earlier than 10.0.0.188(C461E5R3P1); Marie-L22BX Versions earlier than 10.0.0.188(C636E3R3P1); Marie-L23BX Versions earlier than 10.0.0.188(C605E5R1P1); TC5200-16 Versions earlier than 10.0.2.8; WS5200-11 Versions earlier than 10.0.2.8; WS5200-12 Versions earlier than 10.0.2.23; WS5200-16 Versions earlier than 10.0.2.8; WS5200-17 Versions earlier than 10.0.2.23; WS5800-10 Versions earlier than 10.0.3.27; WS6500-10 Versions earlier than 10.0.2.8; WS6500-16 Versions earlier than 10.0.2.8"
    },
    {
      "lang": "es",
      "value": "Hay una vulnerabilidad de filtrado de informaci\u00f3n en algunos productos Huawei. Un atacante adyacente no autenticado podr\u00eda explotar esta vulnerabilidad para descifrar datos. Las versiones de producto afectadas incluyen: Anne-AL00 Versiones anteriores a la versi\u00f3n 9.1.0.331(C675E9R1P3T8); Berkeley-L09 Versiones anteriores a la versi\u00f3n 10.0.1.1(C675R1); CD16-10 Versiones anteriores a la versi\u00f3n 10.0.2.8; CD17-10 Versiones anteriores a la versi\u00f3n  10.0.2.8; CD17-16 Versiones anteriores a la versi\u00f3n 10.0.2.8; CD18-10 Versiones anteriores a la versi\u00f3n 10.0.2.8; CD18-16  Versiones anteriores a la versi\u00f3n 10.0.2.8; Columbia-TL00B Versiones anteriores a la versi\u00f3n 9.0.0.187(C01E181R1P20T8); E6878-370 Versiones anteriores a la versi\u00f3n 10.0.2.8; Columbia-TL00B Versiones anteriores a la versi\u00f3n 9.0.0.187(C01E181R1P20T8); E6878-370 Versiones anteriores a la versi\u00f3n 10.0.han 10.0.5.1(H610SP10C00); HUAWEI P30 lite Versiones anteriores a la versi\u00f3n 10.0.0.185(C605E3R1P3), Versiones anteriores a la versi\u00f3n 10.0.0.197(C432E8R2P7); HUAWEI nova 4e Versiones anteriores a la versi\u00f3n 10.0.0.158(C00E64R1P9); Honor 10 Lite 9.0.1.113(C675E11R1P12); LelandP-L22A Versiones anteriores a la versi\u00f3n 9.1.0.166(C675E5R1P4T8); Marie-AL00AX Versiones anteriores a la versi\u00f3n 10.0.0.158(C00E64R1P9); Marie-AL00AY Versiones anteriores a la versi\u00f3n 10.0.0.158(C00E64R1P9); Marie-AL00BX Versiones anteriores a la versi\u00f3n 10.0.0.158(C00E64R1P9); Marie-L03BX Versiones anteriores a la versi\u00f3n 10.0.0.188(C605E5R1P1); Marie-L21BX Versiones anteriores a la versi\u00f3n 10.0.0.188(C432E4R4P1), V 10.0.0.188(C461E5R3P1); Marie-L22BX Versiones anteriores a la versi\u00f3n 10.0.0.188(C636E3R3P1); Marie-L23BX Versiones anteriores a la versi\u00f3n 10.0.0.188(C605E5R1P1); TC5200-16 Versiones anteriores a la versi\u00f3n 10.0.2.8; WS5200-11 Versiones anteriores a la versi\u00f3n 10.0.2.8; WS5200-12 Versiones anteriores a la versi\u00f3n 10.0.2.23; WS5200-16 Versiones anteriores a la versi\u00f3n 10.0.2.8; WS5200-17 Versiones anteriores a la versi\u00f3n 10.0.2.23; WS5800-10 Versiones anteriores a la versi\u00f3n 10.0.3.27; WS6500-10 Versiones anteriores a la versi\u00f3n 10.0.2.8; WS6500-16 Versiones anteriores a la versi\u00f3n 10.0.2.8"
    }
  ],
  "id": "CVE-2020-9069",
  "lastModified": "2024-11-21T05:39:57.940",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 3.3,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-05-21T15:15:10.123",
  "references": [
    {
      "source": "psirt@huawei.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en"
    }
  ],
  "sourceIdentifier": "psirt@huawei.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-05-21 15:15
Modified
2024-11-21 05:11
Summary
E6878-370 with versions of 10.0.3.1(H557SP27C233), 10.0.3.1(H563SP1C00), 10.0.3.1(H563SP1C233) has a use after free vulnerability. The software references memory after it has been freed in certain scenario, the attacker does a series of crafted operations through web portal, successful exploit could cause a use after free condition which may lead to malicious code execution.
Impacted products
Vendor Product Version
huawei e6878-370_firmware 10.0.3.1\(h557sp27c233\)
huawei e6878-370_firmware 10.0.3.1\(h563sp1c00\)
huawei e6878-370_firmware 10.0.3.1\(h563sp1c233\)
huawei e6878-370 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:e6878-370_firmware:10.0.3.1\\(h557sp27c233\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DEBD99EE-8827-4F40-8C41-3917AEA25239",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:e6878-370_firmware:10.0.3.1\\(h563sp1c00\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E527F624-8AAE-47FB-A19A-0A75BA43BFB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:e6878-370_firmware:10.0.3.1\\(h563sp1c233\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "886689D3-7A13-4D98-9C94-66A21EE0EC32",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:e6878-370:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADA263F9-F9F5-4249-A55A-748689F0271E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "E6878-370 with versions of 10.0.3.1(H557SP27C233), 10.0.3.1(H563SP1C00), 10.0.3.1(H563SP1C233) has a use after free vulnerability. The software references memory after it has been freed in certain scenario, the attacker does a series of crafted operations through web portal, successful exploit could cause a use after free condition which may lead to malicious code execution."
    },
    {
      "lang": "es",
      "value": "E6878-370 con versiones 10.0.3.1(H557SP27C233), 10.0.3.1(H563SP1C00), 10.0.3.1(H563SP1C233), tiene un uso de la memoria previamente liberada. El software hace referencia a la memoria despu\u00e9s de haber sido liberada en determinado escenario, el atacante hace una serie de operaciones especialmente dise\u00f1adas mediante el portal web, una explotaci\u00f3n con \u00e9xito podr\u00eda causar una condici\u00f3n de uso de la memoria previamente liberada que puede conllevar a una ejecuci\u00f3n de c\u00f3digo malicioso."
    }
  ],
  "id": "CVE-2020-1799",
  "lastModified": "2024-11-21T05:11:24.177",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 5.5,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.6,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-05-21T15:15:09.763",
  "references": [
    {
      "source": "psirt@huawei.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-uaf-en"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-uaf-en"
    }
  ],
  "sourceIdentifier": "psirt@huawei.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-416"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

cve-2020-9069
Vulnerability from cvelistv5
Published
2020-05-21 14:19
Modified
2024-08-04 10:19
Severity ?
Summary
There is an information leakage vulnerability in some Huawei products. An unauthenticated, adjacent attacker could exploit this vulnerability to decrypt data. Successful exploitation may leak information randomly. Affected product versions include: Anne-AL00 Versions earlier than 9.1.0.331(C675E9R1P3T8); Berkeley-L09 Versions earlier than 10.0.1.1(C675R1); CD16-10 Versions earlier than 10.0.2.8; CD17-10 Versions earlier than 10.0.2.8; CD17-16 Versions earlier than 10.0.2.8; CD18-10 Versions earlier than 10.0.2.8; CD18-16 Versions earlier than 10.0.2.8; Columbia-TL00B Versions earlier than 9.0.0.187(C01E181R1P20T8); E6878-370 Versions earlier than 10.0.5.1(H610SP10C00); HUAWEI P30 lite Versions earlier than 10.0.0.185(C605E3R1P3), Versions earlier than 10.0.0.197(C432E8R2P7); HUAWEI nova 4e Versions earlier than 10.0.0.158(C00E64R1P9); Honor 10 Lite 9.0.1.113(C675E11R1P12); LelandP-L22A Versions earlier than 9.1.0.166(C675E5R1P4T8); Marie-AL00AX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00AY Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00BX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-L03BX Versions earlier than 10.0.0.188(C605E5R1P1); Marie-L21BX Versions earlier than 10.0.0.188(C432E4R4P1), Versions earlier than 10.0.0.188(C461E5R3P1); Marie-L22BX Versions earlier than 10.0.0.188(C636E3R3P1); Marie-L23BX Versions earlier than 10.0.0.188(C605E5R1P1); TC5200-16 Versions earlier than 10.0.2.8; WS5200-11 Versions earlier than 10.0.2.8; WS5200-12 Versions earlier than 10.0.2.23; WS5200-16 Versions earlier than 10.0.2.8; WS5200-17 Versions earlier than 10.0.2.23; WS5800-10 Versions earlier than 10.0.3.27; WS6500-10 Versions earlier than 10.0.2.8; WS6500-16 Versions earlier than 10.0.2.8
Impacted products
Vendor Product Version
HUAWEI Berkeley-L09 Version: earlier than 10.0.1.1(C675R1)
HUAWEI CD16-10 Version: earlier than 10.0.2.8
HUAWEI CD17-10 Version: earlier than 10.0.2.8
HUAWEI CD17-16 Version: earlier than 10.0.2.8
HUAWEI CD18-10 Version: earlier than 10.0.2.8
HUAWEI CD18-16 Version: earlier than 10.0.2.8
HUAWEI Columbia-TL00B Version: earlier than 9.0.0.187(C01E181R1P20T8)
HUAWEI E6878-370 Version: earlier than 10.0.5.1(H610SP10C00)
HUAWEI HUAWEI P30 lite Version: earlier than 10.0.0.185(C605E3R1P3)
Version: earlier than 10.0.0.197(C432E8R2P7)
HUAWEI HUAWEI nova 4e Version: earlier than 10.0.0.158(C00E64R1P9)
HUAWEI Honor 10 Lite Version: 9.0.1.113(C675E11R1P12)
HUAWEI LelandP-L22A Version: earlier than 9.1.0.166(C675E5R1P4T8)
HUAWEI Marie-AL00AX Version: earlier than 10.0.0.158(C00E64R1P9)
HUAWEI Marie-AL00AY Version: earlier than 10.0.0.158(C00E64R1P9)
HUAWEI Marie-AL00BX Version: earlier than 10.0.0.158(C00E64R1P9)
HUAWEI Marie-L03BX Version: earlier than 10.0.0.188(C605E5R1P1)
HUAWEI Marie-L21BX Version: earlier than 10.0.0.188(C432E4R4P1)
Version: earlier than 10.0.0.188(C461E5R3P1)
HUAWEI Marie-L22BX Version: earlier than 10.0.0.188(C636E3R3P1)
HUAWEI Marie-L23BX Version: earlier than 10.0.0.188(C605E5R1P1)
HUAWEI TC5200-16 Version: earlier than 10.0.2.8
HUAWEI WS5200-11 Version: earlier than 10.0.2.8
HUAWEI WS5200-12 Version: earlier than 10.0.2.23
HUAWEI WS5200-16 Version: earlier than 10.0.2.8
HUAWEI WS5200-17 Version: earlier than 10.0.2.23
HUAWEI WS5800-10 Version: earlier than 10.0.3.27
HUAWEI WS6500-10 Version: earlier than 10.0.2.8
HUAWEI WS6500-16 Version: earlier than 10.0.2.8
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:19:19.496Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Anne-AL00",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.1.0.331(C675E9R1P3T8)"
            }
          ]
        },
        {
          "product": "Berkeley-L09",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.1.1(C675R1)"
            }
          ]
        },
        {
          "product": "CD16-10",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.8"
            }
          ]
        },
        {
          "product": "CD17-10",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.8"
            }
          ]
        },
        {
          "product": "CD17-16",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.8"
            }
          ]
        },
        {
          "product": "CD18-10",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.8"
            }
          ]
        },
        {
          "product": "CD18-16",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.8"
            }
          ]
        },
        {
          "product": "Columbia-TL00B",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.0.0.187(C01E181R1P20T8)"
            }
          ]
        },
        {
          "product": "E6878-370",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.5.1(H610SP10C00)"
            }
          ]
        },
        {
          "product": "HUAWEI P30 lite",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.0.185(C605E3R1P3)"
            },
            {
              "status": "affected",
              "version": "earlier than 10.0.0.197(C432E8R2P7)"
            }
          ]
        },
        {
          "product": "HUAWEI nova 4e",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.0.158(C00E64R1P9)"
            }
          ]
        },
        {
          "product": "Honor 10 Lite",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "9.0.1.113(C675E11R1P12)"
            }
          ]
        },
        {
          "product": "LelandP-L22A",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.1.0.166(C675E5R1P4T8)"
            }
          ]
        },
        {
          "product": "Marie-AL00AX",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.0.158(C00E64R1P9)"
            }
          ]
        },
        {
          "product": "Marie-AL00AY",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.0.158(C00E64R1P9)"
            }
          ]
        },
        {
          "product": "Marie-AL00BX",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.0.158(C00E64R1P9)"
            }
          ]
        },
        {
          "product": "Marie-L03BX",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.0.188(C605E5R1P1)"
            }
          ]
        },
        {
          "product": "Marie-L21BX",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.0.188(C432E4R4P1)"
            },
            {
              "status": "affected",
              "version": "earlier than 10.0.0.188(C461E5R3P1)"
            }
          ]
        },
        {
          "product": "Marie-L22BX",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.0.188(C636E3R3P1)"
            }
          ]
        },
        {
          "product": "Marie-L23BX",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.0.188(C605E5R1P1)"
            }
          ]
        },
        {
          "product": "TC5200-16",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.8"
            }
          ]
        },
        {
          "product": "WS5200-11",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.8"
            }
          ]
        },
        {
          "product": "WS5200-12",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.23"
            }
          ]
        },
        {
          "product": "WS5200-16",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.8"
            }
          ]
        },
        {
          "product": "WS5200-17",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.23"
            }
          ]
        },
        {
          "product": "WS5800-10",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.3.27"
            }
          ]
        },
        {
          "product": "WS6500-10",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.8"
            }
          ]
        },
        {
          "product": "WS6500-16",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.8"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "There is an information leakage vulnerability in some Huawei products. An unauthenticated, adjacent attacker could exploit this vulnerability to decrypt data. Successful exploitation may leak information randomly. Affected product versions include: Anne-AL00 Versions earlier than 9.1.0.331(C675E9R1P3T8); Berkeley-L09 Versions earlier than 10.0.1.1(C675R1); CD16-10 Versions earlier than 10.0.2.8; CD17-10 Versions earlier than 10.0.2.8; CD17-16 Versions earlier than 10.0.2.8; CD18-10 Versions earlier than 10.0.2.8; CD18-16 Versions earlier than 10.0.2.8; Columbia-TL00B Versions earlier than 9.0.0.187(C01E181R1P20T8); E6878-370 Versions earlier than 10.0.5.1(H610SP10C00); HUAWEI P30 lite Versions earlier than 10.0.0.185(C605E3R1P3), Versions earlier than 10.0.0.197(C432E8R2P7); HUAWEI nova 4e Versions earlier than 10.0.0.158(C00E64R1P9); Honor 10 Lite 9.0.1.113(C675E11R1P12); LelandP-L22A Versions earlier than 9.1.0.166(C675E5R1P4T8); Marie-AL00AX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00AY Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00BX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-L03BX Versions earlier than 10.0.0.188(C605E5R1P1); Marie-L21BX Versions earlier than 10.0.0.188(C432E4R4P1), Versions earlier than 10.0.0.188(C461E5R3P1); Marie-L22BX Versions earlier than 10.0.0.188(C636E3R3P1); Marie-L23BX Versions earlier than 10.0.0.188(C605E5R1P1); TC5200-16 Versions earlier than 10.0.2.8; WS5200-11 Versions earlier than 10.0.2.8; WS5200-12 Versions earlier than 10.0.2.23; WS5200-16 Versions earlier than 10.0.2.8; WS5200-17 Versions earlier than 10.0.2.23; WS5800-10 Versions earlier than 10.0.3.27; WS6500-10 Versions earlier than 10.0.2.8; WS6500-16 Versions earlier than 10.0.2.8"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Leakage",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-05-29T22:23:46",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "ID": "CVE-2020-9069",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Anne-AL00",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.1.0.331(C675E9R1P3T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Berkeley-L09",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.1.1(C675R1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "CD16-10",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.8"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "CD17-10",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.8"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "CD17-16",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.8"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "CD18-10",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.8"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "CD18-16",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.8"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Columbia-TL00B",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.0.0.187(C01E181R1P20T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "E6878-370",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.5.1(H610SP10C00)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI P30 lite",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.0.185(C605E3R1P3)"
                          },
                          {
                            "version_value": "earlier than 10.0.0.197(C432E8R2P7)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI nova 4e",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.0.158(C00E64R1P9)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Honor 10 Lite",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "9.0.1.113(C675E11R1P12)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "LelandP-L22A",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.1.0.166(C675E5R1P4T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Marie-AL00AX",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.0.158(C00E64R1P9)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Marie-AL00AY",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.0.158(C00E64R1P9)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Marie-AL00BX",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.0.158(C00E64R1P9)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Marie-L03BX",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.0.188(C605E5R1P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Marie-L21BX",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.0.188(C432E4R4P1)"
                          },
                          {
                            "version_value": "earlier than 10.0.0.188(C461E5R3P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Marie-L22BX",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.0.188(C636E3R3P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Marie-L23BX",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.0.188(C605E5R1P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TC5200-16",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.8"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WS5200-11",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.8"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WS5200-12",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.23"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WS5200-16",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.8"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WS5200-17",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.23"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WS5800-10",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.3.27"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WS6500-10",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.8"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WS6500-16",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.8"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "HUAWEI"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "There is an information leakage vulnerability in some Huawei products. An unauthenticated, adjacent attacker could exploit this vulnerability to decrypt data. Successful exploitation may leak information randomly. Affected product versions include: Anne-AL00 Versions earlier than 9.1.0.331(C675E9R1P3T8); Berkeley-L09 Versions earlier than 10.0.1.1(C675R1); CD16-10 Versions earlier than 10.0.2.8; CD17-10 Versions earlier than 10.0.2.8; CD17-16 Versions earlier than 10.0.2.8; CD18-10 Versions earlier than 10.0.2.8; CD18-16 Versions earlier than 10.0.2.8; Columbia-TL00B Versions earlier than 9.0.0.187(C01E181R1P20T8); E6878-370 Versions earlier than 10.0.5.1(H610SP10C00); HUAWEI P30 lite Versions earlier than 10.0.0.185(C605E3R1P3), Versions earlier than 10.0.0.197(C432E8R2P7); HUAWEI nova 4e Versions earlier than 10.0.0.158(C00E64R1P9); Honor 10 Lite 9.0.1.113(C675E11R1P12); LelandP-L22A Versions earlier than 9.1.0.166(C675E5R1P4T8); Marie-AL00AX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00AY Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00BX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-L03BX Versions earlier than 10.0.0.188(C605E5R1P1); Marie-L21BX Versions earlier than 10.0.0.188(C432E4R4P1), Versions earlier than 10.0.0.188(C461E5R3P1); Marie-L22BX Versions earlier than 10.0.0.188(C636E3R3P1); Marie-L23BX Versions earlier than 10.0.0.188(C605E5R1P1); TC5200-16 Versions earlier than 10.0.2.8; WS5200-11 Versions earlier than 10.0.2.8; WS5200-12 Versions earlier than 10.0.2.23; WS5200-16 Versions earlier than 10.0.2.8; WS5200-17 Versions earlier than 10.0.2.23; WS5800-10 Versions earlier than 10.0.3.27; WS6500-10 Versions earlier than 10.0.2.8; WS6500-16 Versions earlier than 10.0.2.8"
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Information Leakage"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en",
              "refsource": "CONFIRM",
              "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2020-9069",
    "datePublished": "2020-05-21T14:19:31",
    "dateReserved": "2020-02-18T00:00:00",
    "dateUpdated": "2024-08-04T10:19:19.496Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-1832
Vulnerability from cvelistv5
Published
2020-05-29 19:06
Modified
2024-08-04 06:46
Severity ?
Summary
E6878-370 products with versions of 10.0.3.1(H557SP27C233) and 10.0.3.1(H563SP1C00) have a stack buffer overflow vulnerability. The program copies an input buffer to an output buffer without verification. An attacker in the adjacent network could send a crafted message, successful exploit could lead to stack buffer overflow which may cause malicious code execution.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T06:46:30.938Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-stack-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "E6878-370",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "10.0.3.1(H557SP27C233)"
            },
            {
              "status": "affected",
              "version": "10.0.3.1(H563SP1C00)"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "E6878-370 products with versions of 10.0.3.1(H557SP27C233) and 10.0.3.1(H563SP1C00) have a stack buffer overflow vulnerability. The program copies an input buffer to an output buffer without verification. An attacker in the adjacent network could send a crafted message, successful exploit could lead to stack buffer overflow which may cause malicious code execution."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Stack Buffer Overflow",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-05-29T19:06:47",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-stack-en"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "ID": "CVE-2020-1832",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "E6878-370",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "10.0.3.1(H557SP27C233)"
                          },
                          {
                            "version_value": "10.0.3.1(H563SP1C00)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "E6878-370 products with versions of 10.0.3.1(H557SP27C233) and 10.0.3.1(H563SP1C00) have a stack buffer overflow vulnerability. The program copies an input buffer to an output buffer without verification. An attacker in the adjacent network could send a crafted message, successful exploit could lead to stack buffer overflow which may cause malicious code execution."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Stack Buffer Overflow"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-stack-en",
              "refsource": "CONFIRM",
              "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-stack-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2020-1832",
    "datePublished": "2020-05-29T19:06:47",
    "dateReserved": "2019-11-29T00:00:00",
    "dateUpdated": "2024-08-04T06:46:30.938Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-9241
Vulnerability from cvelistv5
Published
2020-08-17 15:04
Modified
2024-08-04 10:19
Severity ?
Summary
Huawei 5G Mobile WiFi E6878-370 with versions of 10.0.3.1(H563SP1C00),10.0.3.1(H563SP21C233) have an improper authorization vulnerability. The device does not restrict certain data received from WAN port. Successful exploit could allow an attacker at WAN side to manage certain service of the device.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:19:20.129Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200812-01-auth-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "E6878-370",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "10.0.3.1(H563SP1C00),10.0.3.1(H563SP21C233)"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Huawei 5G Mobile WiFi E6878-370 with versions of 10.0.3.1(H563SP1C00),10.0.3.1(H563SP21C233) have an improper authorization vulnerability. The device does not restrict certain data received from WAN port. Successful exploit could allow an attacker at WAN side to manage certain service of the device."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Improper Authorization",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-17T15:04:50",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200812-01-auth-en"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "ID": "CVE-2020-9241",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "E6878-370",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "10.0.3.1(H563SP1C00),10.0.3.1(H563SP21C233)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Huawei 5G Mobile WiFi E6878-370 with versions of 10.0.3.1(H563SP1C00),10.0.3.1(H563SP21C233) have an improper authorization vulnerability. The device does not restrict certain data received from WAN port. Successful exploit could allow an attacker at WAN side to manage certain service of the device."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Improper Authorization"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200812-01-auth-en",
              "refsource": "MISC",
              "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200812-01-auth-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2020-9241",
    "datePublished": "2020-08-17T15:04:50",
    "dateReserved": "2020-02-18T00:00:00",
    "dateUpdated": "2024-08-04T10:19:20.129Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-9111
Vulnerability from cvelistv5
Published
2020-10-19 20:02
Modified
2024-08-04 10:19
Severity ?
Summary
E6878-370 versions 10.0.3.1(H557SP27C233),10.0.3.1(H563SP21C233) and E6878-870 versions 10.0.3.1(H557SP27C233),10.0.3.1(H563SP11C233) have a denial of service vulnerability. The system does not properly check some events, an attacker could launch the events continually, successful exploit could cause reboot of the process.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:19:20.034Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201014-02-dos-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "E6878-370;E6878-870",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "10.0.3.1(H557SP27C233),10.0.3.1(H563SP21C233)"
            },
            {
              "status": "affected",
              "version": "10.0.3.1(H557SP27C233),10.0.3.1(H563SP11C233)"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "E6878-370 versions 10.0.3.1(H557SP27C233),10.0.3.1(H563SP21C233) and E6878-870 versions 10.0.3.1(H557SP27C233),10.0.3.1(H563SP11C233) have a denial of service vulnerability. The system does not properly check some events, an attacker could launch the events continually, successful exploit could cause reboot of the process."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-10-19T20:02:04",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201014-02-dos-en"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "ID": "CVE-2020-9111",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "E6878-370;E6878-870",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "10.0.3.1(H557SP27C233),10.0.3.1(H563SP21C233)"
                          },
                          {
                            "version_value": "10.0.3.1(H557SP27C233),10.0.3.1(H563SP11C233)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "E6878-370 versions 10.0.3.1(H557SP27C233),10.0.3.1(H563SP21C233) and E6878-870 versions 10.0.3.1(H557SP27C233),10.0.3.1(H563SP11C233) have a denial of service vulnerability. The system does not properly check some events, an attacker could launch the events continually, successful exploit could cause reboot of the process."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of Service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201014-02-dos-en",
              "refsource": "MISC",
              "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201014-02-dos-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2020-9111",
    "datePublished": "2020-10-19T20:02:04",
    "dateReserved": "2020-02-18T00:00:00",
    "dateUpdated": "2024-08-04T10:19:20.034Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-1799
Vulnerability from cvelistv5
Published
2020-05-21 14:11
Modified
2024-08-04 06:46
Severity ?
Summary
E6878-370 with versions of 10.0.3.1(H557SP27C233), 10.0.3.1(H563SP1C00), 10.0.3.1(H563SP1C233) has a use after free vulnerability. The software references memory after it has been freed in certain scenario, the attacker does a series of crafted operations through web portal, successful exploit could cause a use after free condition which may lead to malicious code execution.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T06:46:30.895Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-uaf-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "E6878-370",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "10.0.3.1(H557SP27C233),10.0.3.1(H563SP1C00),10.0.3.1(H563SP1C233)"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "E6878-370 with versions of 10.0.3.1(H557SP27C233), 10.0.3.1(H563SP1C00), 10.0.3.1(H563SP1C233) has a use after free vulnerability. The software references memory after it has been freed in certain scenario, the attacker does a series of crafted operations through web portal, successful exploit could cause a use after free condition which may lead to malicious code execution."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Use After Free",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-05-21T14:11:50",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-uaf-en"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "ID": "CVE-2020-1799",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "E6878-370",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "10.0.3.1(H557SP27C233),10.0.3.1(H563SP1C00),10.0.3.1(H563SP1C233)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "E6878-370 with versions of 10.0.3.1(H557SP27C233), 10.0.3.1(H563SP1C00), 10.0.3.1(H563SP1C233) has a use after free vulnerability. The software references memory after it has been freed in certain scenario, the attacker does a series of crafted operations through web portal, successful exploit could cause a use after free condition which may lead to malicious code execution."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Use After Free"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-uaf-en",
              "refsource": "MISC",
              "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-uaf-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2020-1799",
    "datePublished": "2020-05-21T14:11:50",
    "dateReserved": "2019-11-29T00:00:00",
    "dateUpdated": "2024-08-04T06:46:30.895Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}