All the vulnerabilites related to huawei - max_presence_firmware
cve-2017-15331
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 19:50
Severity ?
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker may send crafted packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause process reboot.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T19:50:16.586Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,DP300,IPS Module,MAX PRESENCE,NGFW Module,NIP6300,NIP6600,NIP6800,NetEngine16EX,RP200,RSE6500,SMC2.0,SRG1300,SRG2300,SRG3300,SVN5600,SVN5800,SVN5800-C,Secospace USG6300,Secospace USG6500,TE30,TE40,TE50,TE60,TP3106,TP3206,USG9500,USG9520,USG9560,USG9580,ViewPoint 9030",
          "vendor": "Huawei Technologies Co., Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008 ...[truncated*]"
            }
          ]
        }
      ],
      "datePublic": "2017-11-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker may send crafted packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause process reboot."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "out-of-bounds read",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-02-15T15:57:02",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en"
        }
      ],
      "x_ConverterErrors": {
        "version_name": {
          "error": "version_name too long. Use array of versions to record more than one version.",
          "message": "Truncated!"
        }
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "ID": "CVE-2017-15331",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,DP300,IPS Module,MAX PRESENCE,NGFW Module,NIP6300,NIP6600,NIP6800,NetEngine16EX,RP200,RSE6500,SMC2.0,SRG1300,SRG2300,SRG3300,SVN5600,SVN5800,SVN5800-C,Secospace USG6300,Secospace USG6500,TE30,TE40,TE50,TE60,TP3106,TP3206,USG9500,USG9520,USG9560,USG9580,ViewPoint 9030",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03,"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei Technologies Co., Ltd."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker may send crafted packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause process reboot."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "out-of-bounds read"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en",
              "refsource": "CONFIRM",
              "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2017-15331",
    "datePublished": "2018-02-15T16:00:00",
    "dateReserved": "2017-10-14T00:00:00",
    "dateUpdated": "2024-08-05T19:50:16.586Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2017-17292
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 20:51
Severity ?
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, MAX PRESENCE V100R001C00, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10 have a denial of service vulnerability in the specific module. An authenticated, local attacker may craft a specific XML file to the affected products. Due to improper handling of input, successful exploit will cause some service abnormal.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T20:51:30.591Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171213-06-xml-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR3600,AR510,DP300,MAX PRESENCE,NetEngine16EX,RP200,SRG1300,SRG2300,SRG3300,TE30,TE40,TE50,TE60,TP3106,TP3206",
          "vendor": "Huawei Technologies Co., Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200 ...[truncated*]"
            }
          ]
        }
      ],
      "datePublic": "2017-12-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, MAX PRESENCE V100R001C00, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10 have a denial of service vulnerability in the specific module. An authenticated, local attacker may craft a specific XML file to the affected products. Due to improper handling of input, successful exploit will cause some service abnormal."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "DoS",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-02-15T15:57:02",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171213-06-xml-en"
        }
      ],
      "x_ConverterErrors": {
        "version_name": {
          "error": "version_name too long. Use array of versions to record more than one version.",
          "message": "Truncated!"
        }
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "ID": "CVE-2017-17292",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR3600,AR510,DP300,MAX PRESENCE,NetEngine16EX,RP200,SRG1300,SRG2300,SRG3300,TE30,TE40,TE50,TE60,TP3106,TP3206",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, MAX PRESENCE V100R001C00, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei Technologies Co., Ltd."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, MAX PRESENCE V100R001C00, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10 have a denial of service vulnerability in the specific module. An authenticated, local attacker may craft a specific XML file to the affected products. Due to improper handling of input, successful exploit will cause some service abnormal."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "DoS"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171213-06-xml-en",
              "refsource": "CONFIRM",
              "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171213-06-xml-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2017-17292",
    "datePublished": "2018-02-15T16:00:00",
    "dateReserved": "2017-12-04T00:00:00",
    "dateUpdated": "2024-08-05T20:51:30.591Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2017-17291
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 20:51
Severity ?
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, MAX PRESENCE V100R001C00, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10 have a memory leak vulnerability. An authenticated, local attacker may craft a specific XML file to the affected products. Due to not free the memory to parse the XML file, successful exploit will result in memory leak of the affected products.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T20:51:30.519Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171213-06-xml-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR3600,AR510,DP300,MAX PRESENCE,NetEngine16EX,RP200,SRG1300,SRG2300,SRG3300,TE30,TE40,TE50,TE60,TP3106,TP3206",
          "vendor": "Huawei Technologies Co., Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200 ...[truncated*]"
            }
          ]
        }
      ],
      "datePublic": "2017-12-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, MAX PRESENCE V100R001C00, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10 have a memory leak vulnerability. An authenticated, local attacker may craft a specific XML file to the affected products. Due to not free the memory to parse the XML file, successful exploit will result in memory leak of the affected products."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "memory leak",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-02-15T15:57:02",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171213-06-xml-en"
        }
      ],
      "x_ConverterErrors": {
        "version_name": {
          "error": "version_name too long. Use array of versions to record more than one version.",
          "message": "Truncated!"
        }
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "ID": "CVE-2017-17291",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR3600,AR510,DP300,MAX PRESENCE,NetEngine16EX,RP200,SRG1300,SRG2300,SRG3300,TE30,TE40,TE50,TE60,TP3106,TP3206",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, MAX PRESENCE V100R001C00, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei Technologies Co., Ltd."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, MAX PRESENCE V100R001C00, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10 have a memory leak vulnerability. An authenticated, local attacker may craft a specific XML file to the affected products. Due to not free the memory to parse the XML file, successful exploit will result in memory leak of the affected products."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "memory leak"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171213-06-xml-en",
              "refsource": "CONFIRM",
              "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171213-06-xml-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2017-17291",
    "datePublished": "2018-02-15T16:00:00",
    "dateReserved": "2017-12-04T00:00:00",
    "dateUpdated": "2024-08-05T20:51:30.519Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2017-17294
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 20:51
Severity ?
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, MAX PRESENCE V100R001C00, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10 have a null pointer dereference vulnerability. Due to insufficient input validation, an authenticated, local attacker may craft a specific XML file to the affected products to cause null pointer dereference. Successful exploit will cause some service abnormal.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T20:51:30.520Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171213-06-xml-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR3600,AR510,DP300,MAX PRESENCE,NetEngine16EX,RP200,SRG1300,SRG2300,SRG3300,TE30,TE40,TE50,TE60,TP3106,TP3206",
          "vendor": "Huawei Technologies Co., Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200 ...[truncated*]"
            }
          ]
        }
      ],
      "datePublic": "2017-12-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, MAX PRESENCE V100R001C00, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10 have a null pointer dereference vulnerability. Due to insufficient input validation, an authenticated, local attacker may craft a specific XML file to the affected products to cause null pointer dereference. Successful exploit will cause some service abnormal."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "null pointer dereference",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-02-15T15:57:02",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171213-06-xml-en"
        }
      ],
      "x_ConverterErrors": {
        "version_name": {
          "error": "version_name too long. Use array of versions to record more than one version.",
          "message": "Truncated!"
        }
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "ID": "CVE-2017-17294",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR3600,AR510,DP300,MAX PRESENCE,NetEngine16EX,RP200,SRG1300,SRG2300,SRG3300,TE30,TE40,TE50,TE60,TP3106,TP3206",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, MAX PRESENCE V100R001C00, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei Technologies Co., Ltd."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, MAX PRESENCE V100R001C00, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10 have a null pointer dereference vulnerability. Due to insufficient input validation, an authenticated, local attacker may craft a specific XML file to the affected products to cause null pointer dereference. Successful exploit will cause some service abnormal."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "null pointer dereference"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171213-06-xml-en",
              "refsource": "CONFIRM",
              "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171213-06-xml-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2017-17294",
    "datePublished": "2018-02-15T16:00:00",
    "dateReserved": "2017-12-04T00:00:00",
    "dateUpdated": "2024-08-05T20:51:30.520Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2017-8199
Vulnerability from cvelistv5
Published
2017-11-22 19:00
Modified
2024-09-16 21:02
Severity ?
Summary
MAX PRESENCE V100R001C00, TP3106 V100R002C00, TP3206 V100R002C00 have an out-of-bounds read vulnerability in H323 protocol. An attacker logs in to the system as a user and send crafted packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause process reboot.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T16:27:22.919Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170927-01-h323-en"
          },
          {
            "name": "101951",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/101951"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MAX PRESENCE,TP3106,TP3206,",
          "vendor": "Huawei Technologies Co., Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "V100R001C00,V100R002C00,V100R002C00,"
            }
          ]
        }
      ],
      "datePublic": "2017-11-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "MAX PRESENCE V100R001C00, TP3106 V100R002C00, TP3206 V100R002C00 have an out-of-bounds read vulnerability in H323 protocol. An attacker logs in to the system as a user and send crafted packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause process reboot."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "out-of-bounds read",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-11-25T10:57:01",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170927-01-h323-en"
        },
        {
          "name": "101951",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/101951"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "DATE_PUBLIC": "2017-11-15T00:00:00",
          "ID": "CVE-2017-8199",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MAX PRESENCE,TP3106,TP3206,",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R001C00,V100R002C00,V100R002C00,"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei Technologies Co., Ltd."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "MAX PRESENCE V100R001C00, TP3106 V100R002C00, TP3206 V100R002C00 have an out-of-bounds read vulnerability in H323 protocol. An attacker logs in to the system as a user and send crafted packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause process reboot."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "out-of-bounds read"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170927-01-h323-en",
              "refsource": "CONFIRM",
              "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170927-01-h323-en"
            },
            {
              "name": "101951",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/101951"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2017-8199",
    "datePublished": "2017-11-22T19:00:00Z",
    "dateReserved": "2017-04-25T00:00:00",
    "dateUpdated": "2024-09-16T21:02:39.109Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2017-8201
Vulnerability from cvelistv5
Published
2017-11-22 19:00
Modified
2024-09-16 22:25
Severity ?
Summary
MAX PRESENCE V100R001C00, TP3106 V100R002C00, TP3206 V100R002C00 have an a memory leak vulnerability in H323 protocol. An attacker logs in to the system as a user and send crafted packets to the affected products. Due to insufficient verification of the packets, successful exploit could cause a memory leak and eventual denial of service (DoS) condition.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T16:27:23.229Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170927-01-h323-en"
          },
          {
            "name": "101952",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/101952"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MAX PRESENCE,TP3106,TP3206,",
          "vendor": "Huawei Technologies Co., Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "V100R001C00,V100R002C00,V100R002C00,"
            }
          ]
        }
      ],
      "datePublic": "2017-11-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "MAX PRESENCE V100R001C00, TP3106 V100R002C00, TP3206 V100R002C00 have an a memory leak vulnerability in H323 protocol. An attacker logs in to the system as a user and send crafted packets to the affected products. Due to insufficient verification of the packets, successful exploit could cause a memory leak and eventual denial of service (DoS) condition."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "a memory leak",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-11-25T10:57:01",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170927-01-h323-en"
        },
        {
          "name": "101952",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/101952"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "DATE_PUBLIC": "2017-11-15T00:00:00",
          "ID": "CVE-2017-8201",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MAX PRESENCE,TP3106,TP3206,",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R001C00,V100R002C00,V100R002C00,"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei Technologies Co., Ltd."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "MAX PRESENCE V100R001C00, TP3106 V100R002C00, TP3206 V100R002C00 have an a memory leak vulnerability in H323 protocol. An attacker logs in to the system as a user and send crafted packets to the affected products. Due to insufficient verification of the packets, successful exploit could cause a memory leak and eventual denial of service (DoS) condition."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "a memory leak"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170927-01-h323-en",
              "refsource": "CONFIRM",
              "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170927-01-h323-en"
            },
            {
              "name": "101952",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/101952"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2017-8201",
    "datePublished": "2017-11-22T19:00:00Z",
    "dateReserved": "2017-04-25T00:00:00",
    "dateUpdated": "2024-09-16T22:25:15.407Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2017-8200
Vulnerability from cvelistv5
Published
2017-11-22 19:00
Modified
2024-09-16 22:36
Severity ?
Summary
MAX PRESENCE V100R001C00, TP3106 V100R002C00, TP3206 V100R002C00 have an out-of-bounds read vulnerability in H323 protocol. An attacker logs in to the system as a user and send crafted packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause process reboot.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T16:27:22.909Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170927-01-h323-en"
          },
          {
            "name": "101948",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/101948"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MAX PRESENCE,TP3106,TP3206",
          "vendor": "Huawei Technologies Co., Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "V100R001C00,V100R002C00,V100R002C00"
            }
          ]
        }
      ],
      "datePublic": "2017-11-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "MAX PRESENCE V100R001C00, TP3106 V100R002C00, TP3206 V100R002C00 have an out-of-bounds read vulnerability in H323 protocol. An attacker logs in to the system as a user and send crafted packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause process reboot."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "out-of-bounds read",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-11-25T10:57:01",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170927-01-h323-en"
        },
        {
          "name": "101948",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/101948"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "DATE_PUBLIC": "2017-11-15T00:00:00",
          "ID": "CVE-2017-8200",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MAX PRESENCE,TP3106,TP3206",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R001C00,V100R002C00,V100R002C00"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei Technologies Co., Ltd."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "MAX PRESENCE V100R001C00, TP3106 V100R002C00, TP3206 V100R002C00 have an out-of-bounds read vulnerability in H323 protocol. An attacker logs in to the system as a user and send crafted packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause process reboot."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "out-of-bounds read"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170927-01-h323-en",
              "refsource": "CONFIRM",
              "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170927-01-h323-en"
            },
            {
              "name": "101948",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/101948"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2017-8200",
    "datePublished": "2017-11-22T19:00:00Z",
    "dateReserved": "2017-04-25T00:00:00",
    "dateUpdated": "2024-09-16T22:36:10.379Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2017-17293
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 20:51
Severity ?
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, MAX PRESENCE V100R001C00, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10 have a buffer overflow vulnerability. An authenticated, local attacker may craft a specific XML file to the affected products. Due to insufficient input validation, successful exploit will cause some service abnormal.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T20:51:30.592Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171213-06-xml-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR3600,AR510,DP300,MAX PRESENCE,NetEngine16EX,RP200,SRG1300,SRG2300,SRG3300,TE30,TE40,TE50,TE60,TP3106,TP3206",
          "vendor": "Huawei Technologies Co., Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200 ...[truncated*]"
            }
          ]
        }
      ],
      "datePublic": "2017-12-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, MAX PRESENCE V100R001C00, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10 have a buffer overflow vulnerability. An authenticated, local attacker may craft a specific XML file to the affected products. Due to insufficient input validation, successful exploit will cause some service abnormal."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "buffer overflow",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-02-15T15:57:02",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171213-06-xml-en"
        }
      ],
      "x_ConverterErrors": {
        "version_name": {
          "error": "version_name too long. Use array of versions to record more than one version.",
          "message": "Truncated!"
        }
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "ID": "CVE-2017-17293",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR3600,AR510,DP300,MAX PRESENCE,NetEngine16EX,RP200,SRG1300,SRG2300,SRG3300,TE30,TE40,TE50,TE60,TP3106,TP3206",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, MAX PRESENCE V100R001C00, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei Technologies Co., Ltd."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, MAX PRESENCE V100R001C00, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10 have a buffer overflow vulnerability. An authenticated, local attacker may craft a specific XML file to the affected products. Due to insufficient input validation, successful exploit will cause some service abnormal."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "buffer overflow"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171213-06-xml-en",
              "refsource": "CONFIRM",
              "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171213-06-xml-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2017-17293",
    "datePublished": "2018-02-15T16:00:00",
    "dateReserved": "2017-12-04T00:00:00",
    "dateUpdated": "2024-08-05T20:51:30.592Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2017-15332
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 19:50
Severity ?
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have a memory leak vulnerability in H323 protocol. The vulnerability is due to insufficient verification of the packets. An unauthenticated, remote attacker could exploit this vulnerability by sending crafted packets. A successful exploit could cause a memory leak and eventual denial of service (DoS) condition on an affected device.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T19:50:16.527Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,DP300,IPS Module,MAX PRESENCE,NGFW Module,NIP6300,NIP6600,NIP6800,NetEngine16EX,RP200,RSE6500,SMC2.0,SRG1300,SRG2300,SRG3300,SVN5600,SVN5800,SVN5800-C,Secospace USG6300,Secospace USG6500,TE30,TE40,TE50,TE60,TP3106,TP3206,USG9500,USG9520,USG9560,USG9580,ViewPoint 9030",
          "vendor": "Huawei Technologies Co., Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008 ...[truncated*]"
            }
          ]
        }
      ],
      "datePublic": "2017-11-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have a memory leak vulnerability in H323 protocol. The vulnerability is due to insufficient verification of the packets. An unauthenticated, remote attacker could exploit this vulnerability by sending crafted packets. A successful exploit could cause a memory leak and eventual denial of service (DoS) condition on an affected device."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "memory leak",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-02-15T15:57:02",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en"
        }
      ],
      "x_ConverterErrors": {
        "version_name": {
          "error": "version_name too long. Use array of versions to record more than one version.",
          "message": "Truncated!"
        }
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "ID": "CVE-2017-15332",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,DP300,IPS Module,MAX PRESENCE,NGFW Module,NIP6300,NIP6600,NIP6800,NetEngine16EX,RP200,RSE6500,SMC2.0,SRG1300,SRG2300,SRG3300,SVN5600,SVN5800,SVN5800-C,Secospace USG6300,Secospace USG6500,TE30,TE40,TE50,TE60,TP3106,TP3206,USG9500,USG9520,USG9560,USG9580,ViewPoint 9030",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03,"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei Technologies Co., Ltd."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have a memory leak vulnerability in H323 protocol. The vulnerability is due to insufficient verification of the packets. An unauthenticated, remote attacker could exploit this vulnerability by sending crafted packets. A successful exploit could cause a memory leak and eventual denial of service (DoS) condition on an affected device."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "memory leak"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en",
              "refsource": "CONFIRM",
              "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2017-15332",
    "datePublished": "2018-02-15T16:00:00",
    "dateReserved": "2017-10-14T00:00:00",
    "dateUpdated": "2024-08-05T19:50:16.527Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:17
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, MAX PRESENCE V100R001C00, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10 have a memory leak vulnerability. An authenticated, local attacker may craft a specific XML file to the affected products. Due to not free the memory to parse the XML file, successful exploit will result in memory leak of the affected products.
Impacted products
Vendor Product Version
huawei ar120-s_firmware v200r006c10
huawei ar120-s_firmware v200r007c00
huawei ar120-s_firmware v200r008c20
huawei ar120-s_firmware v200r008c30
huawei ar120-s -
huawei ar1200_firmware v200r006c10
huawei ar1200_firmware v200r006c13
huawei ar1200_firmware v200r007c00
huawei ar1200_firmware v200r007c01
huawei ar1200_firmware v200r007c02
huawei ar1200_firmware v200r008c20
huawei ar1200_firmware v200r008c30
huawei ar1200 -
huawei ar1200-s_firmware v200r006c10
huawei ar1200-s_firmware v200r007c00
huawei ar1200-s_firmware v200r008c20
huawei ar1200-s_firmware v200r008c30
huawei ar1200-s -
huawei ar150_firmware v200r006c10
huawei ar150_firmware v200r007c00
huawei ar150_firmware v200r007c01
huawei ar150_firmware v200r007c02
huawei ar150_firmware v200r008c20
huawei ar150_firmware v200r008c30
huawei ar150 -
huawei ar150-s_firmware v200r006c10
huawei ar150-s_firmware v200r007c00
huawei ar150-s_firmware v200r008c20
huawei ar150-s_firmware v200r008c30
huawei ar150-s -
huawei ar160_firmware v200r006c10
huawei ar160_firmware v200r006c12
huawei ar160_firmware v200r007c00
huawei ar160_firmware v200r007c01
huawei ar160_firmware v200r007c02
huawei ar160_firmware v200r008c20
huawei ar160_firmware v200r008c30
huawei ar160 -
huawei ar200_firmware v200r006c10
huawei ar200_firmware v200r007c00
huawei ar200_firmware v200r007c01
huawei ar200_firmware v200r008c20
huawei ar200_firmware v200r008c30
huawei ar200 -
huawei ar200-s_firmware v200r006c10
huawei ar200-s_firmware v200r007c00
huawei ar200-s_firmware v200r008c20
huawei ar200-s_firmware v200r008c30
huawei ar200-s -
huawei ar2200_firmware v200r006c10
huawei ar2200_firmware v200r006c13
huawei ar2200_firmware v200r006c16
huawei ar2200_firmware v200r007c00
huawei ar2200_firmware v200r007c01
huawei ar2200_firmware v200r007c02
huawei ar2200_firmware v200r008c20
huawei ar2200_firmware v200r008c30
huawei ar2200 -
huawei ar2200-s_firmware v200r006c10
huawei ar2200-s_firmware v200r007c00
huawei ar2200-s_firmware v200r008c20
huawei ar2200-s_firmware v200r008c30
huawei ar2200-s -
huawei ar3200_firmware v200r006c10
huawei ar3200_firmware v200r006c11
huawei ar3200_firmware v200r007c00
huawei ar3200_firmware v200r007c01
huawei ar3200_firmware v200r007c02
huawei ar3200_firmware v200r008c00
huawei ar3200_firmware v200r008c10
huawei ar3200_firmware v200r008c20
huawei ar3200_firmware v200r008c30
huawei ar3200 -
huawei ar3600_firmware v200r006c10
huawei ar3600_firmware v200r007c00
huawei ar3600_firmware v200r007c01
huawei ar3600_firmware v200r008c20
huawei ar3600 -
huawei ar510_firmware v200r006c10
huawei ar510_firmware v200r006c12
huawei ar510_firmware v200r006c13
huawei ar510_firmware v200r006c15
huawei ar510_firmware v200r006c16
huawei ar510_firmware v200r006c17
huawei ar510_firmware v200r007c00
huawei ar510_firmware v200r008c20
huawei ar510_firmware v200r008c30
huawei ar510 -
huawei dp300_firmware v500r002c00
huawei dp300 -
huawei max_presence_firmware v100r001c00
huawei max_presence -
huawei netengine16ex_firmware v200r006c10
huawei netengine16ex_firmware v200r007c00
huawei netengine16ex_firmware v200r008c20
huawei netengine16ex_firmware v200r008c30
huawei netengine16ex -
huawei rp200_firmware v500r002c00
huawei rp200_firmware v600r006c00
huawei rp200 -
huawei srg1300_firmware v200r006c10
huawei srg1300_firmware v200r007c00
huawei srg1300_firmware v200r007c02
huawei srg1300_firmware v200r008c20
huawei srg1300_firmware v200r008c30
huawei srg1300 -
huawei srg2300_firmware v200r006c10
huawei srg2300_firmware v200r007c00
huawei srg2300_firmware v200r007c02
huawei srg2300_firmware v200r008c20
huawei srg2300_firmware v200r008c30
huawei srg2300 -
huawei srg3300_firmware v200r006c10
huawei srg3300_firmware v200r007c00
huawei srg3300_firmware v200r008c20
huawei srg3300_firmware v200r008c30
huawei srg3300 -
huawei te30_firmware v100r001c02
huawei te30_firmware v100r001c10
huawei te30_firmware v500r002c00
huawei te30_firmware v600r006c00
huawei te30 -
huawei te40_firmware v500r002c00
huawei te40_firmware v600r006c00
huawei te40 -
huawei te50_firmware v500r002c00
huawei te50_firmware v600r006c00
huawei te50 -
huawei te60_firmware v100r001c01
huawei te60_firmware v100r001c10
huawei te60_firmware v500r002c00
huawei te60_firmware v600r006c00
huawei te60 -
huawei tp3106_firmware v100r002c00
huawei tp3106 -
huawei tp3206_firmware v100r002c00
huawei tp3206_firmware v100r002c10
huawei tp3206 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD9E894-321E-4A61-9DA6-677042DDD739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "79DA91B4-77A6-4A37-8799-5E548184D49C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "42376C56-573F-4A88-B18E-43F636B17B41",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0CFDB51-BF44-4433-AB2A-CFF553F8D640",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFE416CD-53B5-4E08-BB30-682887740C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*",
              "matchCriteriaId": "83D6C34F-ED85-461D-89AF-3B8C439867FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "F64071E5-6ACD-4E51-9162-B0FF3DC08E07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "334E0095-CF32-497D-85AC-AE8AEDE4EC50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "4459EF03-890E-446E-8702-8F7CE499FB48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "C623D44E-463B-49A3-81F8-AD219E035B09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4BA4150-8CA8-48BF-9D45-ABC8AC710060",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBB60F62-0715-4C1E-B352-A3D61B56E2AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D125153E-FE39-49A7-95AA-9482C78E7114",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DB071D6-18CE-4FC5-855E-01E64F15BD3D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B053C248-3CC2-476D-95A7-90EDD8EAAD69",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0D92A6F-B30C-4E09-91FC-9C7FFF375710",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "455D7A4E-523E-40C8-958D-59D128F3E797",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C3B0016-0A4A-471F-BBEA-D2E485587B41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C1B1393-1D47-448D-A5FF-0B2EF74CF172",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B64AE02-D345-4628-A086-7C63C255707C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8DC83BF-B7AA-4654-95A2-54C43F379A9A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "526371A8-11FE-4D00-AFBB-8E867A320B27",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "72BC8C3E-420F-49D1-9E58-98E4E23A024F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "787AC5E3-CE88-491D-8211-BAB11112019D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "868602DB-D063-4BE4-A02B-936433CD8231",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0A35FE7-D526-455A-934B-08D54A0302A9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A72083-717F-4C71-A2D7-62E1C64FEE94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAB93A84-773E-4DDF-B8B6-8705D2000CBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF92D98E-60C8-43F9-B6F7-D43193D102EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "34CCEC64-BD07-49F7-8804-98A74257F060",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "A685289C-08B1-43D4-9970-84A7FC75E54B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "21DBC628-F348-4204-B212-11E8E6A0AC8A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "137A007D-A498-483F-8B4F-DCA118B25F11",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7C77ADC-2511-4630-B5F5-F2991EA39E0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "622686BB-9302-449F-9351-75B189D1B184",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "5186D104-FD41-4F54-9923-25B0C8C09E22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "D139E125-0A75-4094-ABFD-A47DAE94CDC4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7114E20-407A-4B1C-9FCE-FF367B50E0E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE9B95EB-A848-4311-8500-9C909784393E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE2EC4F9-EB14-4628-9F89-34168BBD6A56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "B487D436-B96E-4781-AFFD-2136154F9166",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F042B27-F875-4BA3-9002-E5ADC544208B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5C732C2-60D0-4CC9-A2C4-76F6478159EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "F377CE1E-77A7-447F-B692-A54682A26BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5CCF46F-1B0F-4829-BB28-758777313451",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50662078-4827-4706-AE29-170E2239C5AE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "32119825-AF22-44AA-8D04-1FAACF9E2E89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A2BC38B-D016-4E83-A14E-FE8575135DD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "B897F931-00B2-4FDF-90CE-5077416E42BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "99EEE539-796F-4638-9EE1-0BC1BE25CA1F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5862E1A5-0222-4059-B9D7-716A6D0EB8CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB9A3444-A485-4B87-B910-F3DA5C8E5D74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "9752658E-3CF5-4D9E-98FB-D15FD892479C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "0595B3AA-8911-44AF-996B-2F431517FBED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A842B77-C902-4B20-A171-3F98C75E6160",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "B01969DE-DC37-4F2F-BB9B-5242810A8317",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9309E1AA-0C4E-422C-9307-A8DD0AE5D576",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "26CFB676-658E-4DEF-8C29-13CA633D7270",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D395DD8-E338-457E-A4E6-D3A08DE1B571",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3600_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B650408-1E40-49DF-9271-6248CC1DCC89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E52BCED-46D1-4ED9-9A8A-41AA4B88A1AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D30DC2EA-1F76-4CA6-BAC2-8DC796BE50B1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "41A14BFE-B957-4BD9-AD25-01011BF9BF95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4072905-CA96-44F9-8868-BB20BDC56EE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CE13681-CF1A-4765-B35A-E6E674C334B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F77B216-3E00-4EC0-9BEB-6ACD322874C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F06D60-CC92-4B27-9248-40C9CD8EF000",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*",
              "matchCriteriaId": "03F01709-8D14-4C0D-9990-0BC01AAEE1B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "50C579A9-2768-4202-9171-BC803554E923",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2EB46B1-A4FE-42AD-BA60-8134A34F5901",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCD9E893-609B-4C97-82E6-0651AEC39D14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "8871106B-D3AF-4CFB-A544-1FA411642428",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F3483B2-9EB6-4E34-900A-945C04A3160D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:max_presence_firmware:v100r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D15C564B-B409-4304-AF39-AD971BC8E82B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:max_presence:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E933011-8C8D-47C2-BD80-1D7D040755F8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE7A0E2C-8383-443D-8625-77CBC53D2140",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA500A69-F8E4-46A8-9B46-F318F9110C3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "51387999-E9D0-497F-A309-CA5E3126EB00",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6224ECC-6949-4204-94D1-C7374C142A50",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "16C1ED34-BC94-4AAC-ADF4-5FCD637E5B4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "67731A77-1DD4-49B2-B437-2850C9583750",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98275088-2FBE-42F4-AAEC-DF02950B803D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DF1DFD2-5337-45CA-A1A9-2E6622536027",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "B319F31F-94D7-468F-8F71-96F40867AEA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "27D882C1-BFE2-4C29-86FF-C10F86323D5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "D32B9C4A-6005-4B82-B809-FF3DBF47C17B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "D485D5E3-3819-4F3A-B841-ACB6253ACF2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D10EBBF2-8F03-472C-96DB-C72E426E4E38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F0AF0C0-46BF-4984-8378-954DF82EE227",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BAF601C-B8EC-42F5-95F4-274F8492F57E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "309B9B0E-3639-4913-9DE4-9D4DAE6B0065",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4619CF2C-AB5D-475A-ACF6-61EE02306F7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E497D97B-F044-4F9A-84B0-378978FBDC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8E57098-7E8D-4956-82E6-1474A50569C8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43681AE7-5C12-4772-85A9-0A10177C6CFD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "686651A5-6F2F-4AF3-9B96-FF5905F2303A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA3EF476-42D7-4758-8DCB-373F46BF1CF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DEA387B-4F45-438F-8086-6E80B553163C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "018039EB-7265-4B71-B462-4734FD1D0503",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "931FD3B3-A333-4277-AE55-494F5DB9F09F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45C3AF58-E030-4E12-A2FD-A4337A5021ED",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF7A4D51-314B-4A77-86A7-9C5237BC4275",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "A70F8924-DC80-4D6F-BA3E-DBFE32FED788",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F6EACB9-6832-4B2A-9C5B-C1E2747D6359",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "01BC9042-0485-437F-811F-F8898B3B7EA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A29049D-F472-4772-8750-20730DA624E9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "999117E9-90C8-4E76-90B5-7D364C0B84BF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "492DABB3-66CF-47E9-92D4-518154559A7C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D28E0627-0B19-4616-933E-76294F83813F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:tp3206_firmware:v100r002c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8C4071A-502F-46E4-80FF-C6647161A178",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45ED506D-5094-476B-83F0-CBBED04EF348",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, MAX PRESENCE V100R001C00, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10 have a memory leak vulnerability. An authenticated, local attacker may craft a specific XML file to the affected products. Due to not free the memory to parse the XML file, successful exploit will result in memory leak of the affected products."
    },
    {
      "lang": "es",
      "value": "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, MAX PRESENCE V100R001C00, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10 tienen una vulnerabilidad de fuga de memoria. Un atacante local autenticado podr\u00eda manipular un archivo XML espec\u00edfico de los productos afectados. Dado que no se libera la memoria para analizar el archivo XML, una explotaci\u00f3n con \u00e9xito resultar\u00e1 en la fuga de memoria de los productos afectados."
    }
  ],
  "id": "CVE-2017-17291",
  "lastModified": "2024-11-21T03:17:45.843",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-02-15T16:29:03.110",
  "references": [
    {
      "source": "psirt@huawei.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171213-06-xml-en"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171213-06-xml-en"
    }
  ],
  "sourceIdentifier": "psirt@huawei.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-772"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-11-22 19:29
Modified
2024-11-21 03:33
Summary
MAX PRESENCE V100R001C00, TP3106 V100R002C00, TP3206 V100R002C00 have an out-of-bounds read vulnerability in H323 protocol. An attacker logs in to the system as a user and send crafted packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause process reboot.
Impacted products
Vendor Product Version
huawei max_presence_firmware v100r001c00
huawei max_presence -
huawei tp3106_firmware v100r002c00
huawei tp3106 -
huawei tp3206_firmware v100r002c00
huawei tp3206 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:max_presence_firmware:v100r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D15C564B-B409-4304-AF39-AD971BC8E82B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:max_presence:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E933011-8C8D-47C2-BD80-1D7D040755F8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "492DABB3-66CF-47E9-92D4-518154559A7C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D28E0627-0B19-4616-933E-76294F83813F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45ED506D-5094-476B-83F0-CBBED04EF348",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "MAX PRESENCE V100R001C00, TP3106 V100R002C00, TP3206 V100R002C00 have an out-of-bounds read vulnerability in H323 protocol. An attacker logs in to the system as a user and send crafted packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause process reboot."
    },
    {
      "lang": "es",
      "value": "MAX PRESENCE V100R001C00, TP3106 V100R002C00 y TP3206 V100R002C00 tiene una vulnerabilidad de lectura fuera de l\u00edmites en el protocolo H323. Un atacante podr\u00eda iniciar sesi\u00f3n en el sistema como un usuario y enviar paquetes manipulados a los productos afectados. Dada la verificaci\u00f3n insuficiente de los paquetes, una explotaci\u00f3n exitosa har\u00eda que el proceso se reinicie."
    }
  ],
  "id": "CVE-2017-8199",
  "lastModified": "2024-11-21T03:33:31.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-11-22T19:29:04.977",
  "references": [
    {
      "source": "psirt@huawei.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170927-01-h323-en"
    },
    {
      "source": "psirt@huawei.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/101951"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170927-01-h323-en"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/101951"
    }
  ],
  "sourceIdentifier": "psirt@huawei.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:14
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker may send crafted packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause process reboot.
Impacted products
Vendor Product Version
huawei ar120-s_firmware v200r006c10
huawei ar120-s_firmware v200r007c00
huawei ar120-s_firmware v200r008c20
huawei ar120-s_firmware v200r008c30
huawei ar120-s -
huawei ar1200_firmware v200r006c10
huawei ar1200_firmware v200r006c13
huawei ar1200_firmware v200r007c00
huawei ar1200_firmware v200r007c01
huawei ar1200_firmware v200r007c02
huawei ar1200_firmware v200r008c20
huawei ar1200_firmware v200r008c30
huawei ar1200 -
huawei ar1200-s_firmware v200r006c10
huawei ar1200-s_firmware v200r007c00
huawei ar1200-s_firmware v200r008c20
huawei ar1200-s_firmware v200r008c30
huawei ar1200-s -
huawei ar150_firmware v200r006c10
huawei ar150_firmware v200r007c00
huawei ar150_firmware v200r007c01
huawei ar150_firmware v200r007c02
huawei ar150_firmware v200r008c20
huawei ar150_firmware v200r008c30
huawei ar150 -
huawei ar150-s_firmware v200r006c10
huawei ar150-s_firmware v200r007c00
huawei ar150-s_firmware v200r008c20
huawei ar150-s_firmware v200r008c30
huawei ar150-s -
huawei ar160_firmware v200r006c10
huawei ar160_firmware v200r006c12
huawei ar160_firmware v200r007c00
huawei ar160_firmware v200r007c01
huawei ar160_firmware v200r007c02
huawei ar160_firmware v200r008c20
huawei ar160_firmware v200r008c30
huawei ar160 -
huawei ar200_firmware v200r006c10
huawei ar200_firmware v200r007c00
huawei ar200_firmware v200r007c01
huawei ar200_firmware v200r008c20
huawei ar200_firmware v200r008c30
huawei ar200 -
huawei ar200-s_firmware v200r006c10
huawei ar200-s_firmware v200r007c00
huawei ar200-s_firmware v200r008c20
huawei ar200-s_firmware v200r008c30
huawei ar200-s -
huawei ar2200_firmware v200r006c10
huawei ar2200_firmware v200r006c13
huawei ar2200_firmware v200r006c16pwe
huawei ar2200_firmware v200r007c00
huawei ar2200_firmware v200r007c01
huawei ar2200_firmware v200r007c02
huawei ar2200_firmware v200r008c20
huawei ar2200_firmware v200r008c30
huawei ar2200 -
huawei ar2200-s_firmware v200r006c10
huawei ar2200-s_firmware v200r007c00
huawei ar2200-s_firmware v200r008c20
huawei ar2200-s_firmware v200r008c30
huawei ar2200-s -
huawei ar3200_firmware v200r006c10
huawei ar3200_firmware v200r006c11
huawei ar3200_firmware v200r007c00
huawei ar3200_firmware v200r007c01
huawei ar3200_firmware v200r007c02
huawei ar3200_firmware v200r008c00
huawei ar3200_firmware v200r008c10
huawei ar3200_firmware v200r008c20
huawei ar3200_firmware v200r008c30
huawei ar3200 -
huawei ar510_firmware v200r006c10
huawei ar510_firmware v200r006c12
huawei ar510_firmware v200r006c13
huawei ar510_firmware v200r006c15
huawei ar510_firmware v200r006c16
huawei ar510_firmware v200r006c17
huawei ar510_firmware v200r007c00
huawei ar510_firmware v200r008c20
huawei ar510_firmware v200r008c30
huawei ar510 -
huawei netengine16ex_firmware v200r006c10
huawei netengine16ex_firmware v200r007c00
huawei netengine16ex_firmware v200r008c20
huawei netengine16ex_firmware v200r008c30
huawei netengine16ex -
huawei srg1300_firmware v200r006c10
huawei srg1300_firmware v200r007c00
huawei srg1300_firmware v200r007c02
huawei srg1300_firmware v200r008c20
huawei srg1300_firmware v200r008c30
huawei srg1300 -
huawei srg2300_firmware v200r006c10
huawei srg2300_firmware v200r007c00
huawei srg2300_firmware v200r007c02
huawei srg2300_firmware v200r008c20
huawei srg2300_firmware v200r008c30
huawei srg2300 -
huawei srg3300_firmware v200r006c10
huawei srg3300_firmware v200r007c00
huawei srg3300_firmware v200r008c20
huawei srg3300_firmware v200r008c30
huawei srg3300 -
huawei dp300_firmware v500r002c00
huawei dp300 -
huawei ips_module_firmware v100r001c10spc200
huawei ips_module_firmware v100r001c20
huawei ips_module_firmware v100r001c30
huawei ips_module_firmware v500r001c00
huawei ips_module_firmware v500r001c20
huawei ips_module_firmware v500r001c30
huawei ips_module_firmware v500r001c50
huawei ips_module -
huawei max_presence_firmware v100r001c00
huawei max_presence -
huawei ngfw_module_firmware v100r001c10spc200
huawei ngfw_module_firmware v100r001c20
huawei ngfw_module_firmware v100r001c30
huawei ngfw_module_firmware v500r001c00
huawei ngfw_module_firmware v500r001c20
huawei ngfw_module_firmware v500r002c00
huawei ngfw_module_firmware v500r002c10
huawei ngfw_module -
huawei nip6300_firmware v500r001c00
huawei nip6300_firmware v500r001c20
huawei nip6300_firmware v500r001c30
huawei nip6300_firmware v500r001c50
huawei nip6300 -
huawei nip6600_firmware v500r001c00
huawei nip6600_firmware v500r001c20
huawei nip6600_firmware v500r001c30
huawei nip6600_firmware v500r001c50
huawei nip6600 -
huawei nip6800_firmware v500r001c50
huawei nip6800 -
huawei rp200_firmware v500r002c00spc200
huawei rp200_firmware v600r006c00
huawei rp200 -
huawei rse6500_firmware v500r002c00
huawei rse6500 -
huawei smc2.0_firmware v100r003c10
huawei smc2.0_firmware v100r005c00
huawei smc2.0_firmware v500r002c00
huawei smc2.0_firmware v500r002c00t
huawei smc2.0_firmware v600r006c00
huawei smc2.0_firmware v600r006c00t
huawei smc2.0 -
huawei svn5600_firmware v200r003c00
huawei svn5600_firmware v200r003c10
huawei svn5600 -
huawei svn5800_firmware v200r003c00
huawei svn5800_firmware v200r003c10
huawei svn5800 -
huawei svn5800-c_firmware v200r003c00
huawei svn5800-c_firmware v200r003c10
huawei svn5800-c -
huawei secospace_usg6300_firmware v100r001c10
huawei secospace_usg6300_firmware v100r001c20
huawei secospace_usg6300_firmware v100r001c30
huawei secospace_usg6300_firmware v500r001c00
huawei secospace_usg6300_firmware v500r001c20
huawei secospace_usg6300_firmware v500r001c30
huawei secospace_usg6300_firmware v500r001c50
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v100r001c10
huawei secospace_usg6500_firmware v100r001c20
huawei secospace_usg6500_firmware v100r001c30
huawei secospace_usg6500_firmware v500r001c00
huawei secospace_usg6500_firmware v500r001c20
huawei secospace_usg6500_firmware v500r001c30
huawei secospace_usg6500_firmware v500r001c50
huawei secospace_usg6500 -
huawei te30_firmware v100r001c10
huawei te30_firmware v500r002c00
huawei te30_firmware v600r006c00
huawei te30 -
huawei te40_firmware v500r002c00
huawei te40_firmware v600r006c00
huawei te40 -
huawei te50_firmware v500r002c00
huawei te50_firmware v600r006c00
huawei te50 -
huawei te60_firmware v100r001c01
huawei te60_firmware v100r001c10
huawei te60_firmware v500r002c00
huawei te60_firmware v600r006c00
huawei te60 -
huawei tp3106_firmware v100r002c00
huawei tp3106 -
huawei tp3206_firmware v100r002c00
huawei tp3206 -
huawei usg9500_firmware v500r001c00
huawei usg9500_firmware v500r001c20
huawei usg9500_firmware v500r001c30
huawei usg9500_firmware v500r001c50
huawei usg9500 -
huawei usg9520_firmware v300r001c01
huawei usg9520_firmware v300r001c20
huawei usg9520 -
huawei usg9560_firmware v300r001c01
huawei usg9560_firmware v300r001c20
huawei usg9560 -
huawei usg9580_firmware v300r001c01
huawei usg9580_firmware v300r001c20
huawei usg9580 -
huawei viewpoint_9030_firmware v100r011c02
huawei viewpoint_9030_firmware v100r011c03
huawei viewpoint_9030 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD9E894-321E-4A61-9DA6-677042DDD739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "79DA91B4-77A6-4A37-8799-5E548184D49C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "42376C56-573F-4A88-B18E-43F636B17B41",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0CFDB51-BF44-4433-AB2A-CFF553F8D640",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFE416CD-53B5-4E08-BB30-682887740C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*",
              "matchCriteriaId": "83D6C34F-ED85-461D-89AF-3B8C439867FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "F64071E5-6ACD-4E51-9162-B0FF3DC08E07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "334E0095-CF32-497D-85AC-AE8AEDE4EC50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "4459EF03-890E-446E-8702-8F7CE499FB48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "C623D44E-463B-49A3-81F8-AD219E035B09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4BA4150-8CA8-48BF-9D45-ABC8AC710060",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBB60F62-0715-4C1E-B352-A3D61B56E2AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D125153E-FE39-49A7-95AA-9482C78E7114",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DB071D6-18CE-4FC5-855E-01E64F15BD3D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B053C248-3CC2-476D-95A7-90EDD8EAAD69",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0D92A6F-B30C-4E09-91FC-9C7FFF375710",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "455D7A4E-523E-40C8-958D-59D128F3E797",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C3B0016-0A4A-471F-BBEA-D2E485587B41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C1B1393-1D47-448D-A5FF-0B2EF74CF172",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B64AE02-D345-4628-A086-7C63C255707C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8DC83BF-B7AA-4654-95A2-54C43F379A9A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "526371A8-11FE-4D00-AFBB-8E867A320B27",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "72BC8C3E-420F-49D1-9E58-98E4E23A024F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "787AC5E3-CE88-491D-8211-BAB11112019D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "868602DB-D063-4BE4-A02B-936433CD8231",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0A35FE7-D526-455A-934B-08D54A0302A9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A72083-717F-4C71-A2D7-62E1C64FEE94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAB93A84-773E-4DDF-B8B6-8705D2000CBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF92D98E-60C8-43F9-B6F7-D43193D102EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "34CCEC64-BD07-49F7-8804-98A74257F060",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "A685289C-08B1-43D4-9970-84A7FC75E54B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "21DBC628-F348-4204-B212-11E8E6A0AC8A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "137A007D-A498-483F-8B4F-DCA118B25F11",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7C77ADC-2511-4630-B5F5-F2991EA39E0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "622686BB-9302-449F-9351-75B189D1B184",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "5186D104-FD41-4F54-9923-25B0C8C09E22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "D139E125-0A75-4094-ABFD-A47DAE94CDC4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7114E20-407A-4B1C-9FCE-FF367B50E0E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE9B95EB-A848-4311-8500-9C909784393E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE2EC4F9-EB14-4628-9F89-34168BBD6A56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "B487D436-B96E-4781-AFFD-2136154F9166",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F042B27-F875-4BA3-9002-E5ADC544208B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD069FB1-8A7E-4D29-94F2-D7F94BA306D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "F377CE1E-77A7-447F-B692-A54682A26BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5CCF46F-1B0F-4829-BB28-758777313451",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50662078-4827-4706-AE29-170E2239C5AE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "32119825-AF22-44AA-8D04-1FAACF9E2E89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A2BC38B-D016-4E83-A14E-FE8575135DD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "B897F931-00B2-4FDF-90CE-5077416E42BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "99EEE539-796F-4638-9EE1-0BC1BE25CA1F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5862E1A5-0222-4059-B9D7-716A6D0EB8CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB9A3444-A485-4B87-B910-F3DA5C8E5D74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "9752658E-3CF5-4D9E-98FB-D15FD892479C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "0595B3AA-8911-44AF-996B-2F431517FBED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A842B77-C902-4B20-A171-3F98C75E6160",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "B01969DE-DC37-4F2F-BB9B-5242810A8317",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9309E1AA-0C4E-422C-9307-A8DD0AE5D576",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "41A14BFE-B957-4BD9-AD25-01011BF9BF95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4072905-CA96-44F9-8868-BB20BDC56EE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CE13681-CF1A-4765-B35A-E6E674C334B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F77B216-3E00-4EC0-9BEB-6ACD322874C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F06D60-CC92-4B27-9248-40C9CD8EF000",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*",
              "matchCriteriaId": "03F01709-8D14-4C0D-9990-0BC01AAEE1B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "50C579A9-2768-4202-9171-BC803554E923",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2EB46B1-A4FE-42AD-BA60-8134A34F5901",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCD9E893-609B-4C97-82E6-0651AEC39D14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE7A0E2C-8383-443D-8625-77CBC53D2140",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA500A69-F8E4-46A8-9B46-F318F9110C3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "51387999-E9D0-497F-A309-CA5E3126EB00",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6224ECC-6949-4204-94D1-C7374C142A50",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DF1DFD2-5337-45CA-A1A9-2E6622536027",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "B319F31F-94D7-468F-8F71-96F40867AEA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "27D882C1-BFE2-4C29-86FF-C10F86323D5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "D32B9C4A-6005-4B82-B809-FF3DBF47C17B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "D485D5E3-3819-4F3A-B841-ACB6253ACF2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D10EBBF2-8F03-472C-96DB-C72E426E4E38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F0AF0C0-46BF-4984-8378-954DF82EE227",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BAF601C-B8EC-42F5-95F4-274F8492F57E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "309B9B0E-3639-4913-9DE4-9D4DAE6B0065",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4619CF2C-AB5D-475A-ACF6-61EE02306F7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E497D97B-F044-4F9A-84B0-378978FBDC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8E57098-7E8D-4956-82E6-1474A50569C8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43681AE7-5C12-4772-85A9-0A10177C6CFD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "8871106B-D3AF-4CFB-A544-1FA411642428",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F3483B2-9EB6-4E34-900A-945C04A3160D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "3103CC5F-E44E-49D8-A100-45476CD24A91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v100r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "51A51677-9D99-491C-B524-C5ED5774AC03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1B55442-9A8C-4291-9086-17516814DFD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "84477B1C-413A-4F74-86DC-55E58AD07AB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "B135BE9A-A4B9-433F-BA82-548E0E859C0E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:max_presence_firmware:v100r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D15C564B-B409-4304-AF39-AD971BC8E82B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:max_presence:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E933011-8C8D-47C2-BD80-1D7D040755F8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4D17C34-47FB-478A-BB12-5F7C68045120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "246D5D93-F372-4CA8-BFA2-250B61CCEF2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "80411236-6B22-4937-87F3-E06C991B14D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A8E1096-F070-4CE9-B2B4-6368890706A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "F46A81BE-C125-4CAE-8EE1-23177FE0C21E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B469A91-4CD0-44D2-A982-3E612B855E71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "1856722C-597D-495D-AFCC-21E5FF6F2359",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "728A7B78-6E19-4656-848F-269DB955070C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E054182-CE33-45E3-8595-159A75BA5162",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDC040A6-3E38-4B21-9779-67CF66FDC6B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "946F5FF7-412F-40F9-A492-DE8E11E7B919",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "678FFB3B-C6E1-4694-B51C-D56E26B53E1E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE8CA649-7AE1-497C-869B-B4DD315F342C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D5066C9-7581-4284-AF23-0782870B2F03",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "875441DD-575F-4F4D-A6BD-23C38641D330",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:rp200_firmware:v500r002c00spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BC535D5-0C05-4695-976F-ACF447431A6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "67731A77-1DD4-49B2-B437-2850C9583750",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98275088-2FBE-42F4-AAEC-DF02950B803D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "649BB696-BDBE-46FC-A23D-287DE306D8BB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DD9417D-0515-4B21-AD32-E6B137575D01",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "386F5C31-6000-48C4-A9CA-D3F91A0549E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "611E69A3-AB62-4584-B611-93583D84FCB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9E7481E-B5B8-481C-AC35-A8029AA2DF7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00t:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F64B04C-27B1-4621-86B3-827D6F83D3B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "60E7CCC4-60A8-48FA-A9EA-7A327B3A29B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00t:*:*:*:*:*:*:*",
              "matchCriteriaId": "0892BC18-F3D0-4B0A-8F6D-E0C2A98E8A71",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDBEFFB4-9742-48CC-BBA6-E5DCA281B343",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C216CE3-3481-4F96-9D10-15B627929046",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46EE0FA6-7E53-488F-81A7-B2C906D65552",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C80D3BB-868B-461C-B97A-9C94C9F80858",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "019D2365-8BD9-4243-97CC-22264F30A24E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FC3D1EE-0368-48DF-9B38-4751330E23A5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDD8D36D-A4F2-4423-B57E-E9933710201E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "353AFD36-2046-4E75-96FB-CBA7071C3257",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BC78B8F-B4BC-429D-9685-C30B47810B32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D137236-B70C-4AC9-A041-5857FE01F293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E335D2-FE4B-4316-8827-4741EC9AA674",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "62F5005B-13E9-49EB-82A1-9A03F3583037",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B184673-1E6E-44F8-82FB-42E42E0F19D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "D588964F-A5F2-4D5C-AE5D-17962E599370",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "3189382E-6846-4713-A92F-ABD03683F4A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3983A57-2F07-4D21-9093-1DFEAB310E26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA3EF476-42D7-4758-8DCB-373F46BF1CF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DEA387B-4F45-438F-8086-6E80B553163C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "018039EB-7265-4B71-B462-4734FD1D0503",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "931FD3B3-A333-4277-AE55-494F5DB9F09F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45C3AF58-E030-4E12-A2FD-A4337A5021ED",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF7A4D51-314B-4A77-86A7-9C5237BC4275",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "A70F8924-DC80-4D6F-BA3E-DBFE32FED788",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F6EACB9-6832-4B2A-9C5B-C1E2747D6359",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "01BC9042-0485-437F-811F-F8898B3B7EA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A29049D-F472-4772-8750-20730DA624E9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "999117E9-90C8-4E76-90B5-7D364C0B84BF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "492DABB3-66CF-47E9-92D4-518154559A7C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D28E0627-0B19-4616-933E-76294F83813F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45ED506D-5094-476B-83F0-CBBED04EF348",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "22007E6A-68FC-4AF4-A570-95873AFBF882",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "11D1A4CC-2F7E-40AF-8874-EE3986176623",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C329182-E16A-4E89-A43C-0DB90BDE4AA5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC8205DE-4325-4DA8-90D1-8969642F8FAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:usg9520_firmware:v300r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CE2D4CD-42FB-4290-8EB9-F1496F9B89BA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "60030EDB-682F-4107-80FC-5F03CE75131D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "D94DE238-F32F-48D9-86D1-ED1F5D6F1663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B31E688-B5EC-47FE-92B7-C3CF0C9FEF8E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "96AFE94D-EDC7-4372-A1BF-8089D5551AD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "92747AD5-0EED-44E8-BCB6-6663442ACD8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:usg9580_firmware:v300r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "24845D47-3AF8-43BA-9844-6529F8DAABD3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14C9D3E2-B016-4238-A170-6C4AD1B3B76C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ADEC8B2-CD7F-4246-88C0-E27B939829AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6208C34-D92D-4605-B4AF-6EA597CBA0F2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker may send crafted packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause process reboot."
    },
    {
      "lang": "es",
      "value": "Los dispositivos Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02 y V100R011C03 tienen una vulnerabilidad de lectura fuera de l\u00edmites en el protocolo H323. Un atacante remoto no autenticado podr\u00eda enviar paquetes manipulados a los productos afectados. Dada la verificaci\u00f3n insuficiente de los paquetes, una explotaci\u00f3n exitosa podr\u00eda hacer que el proceso se reinicie."
    }
  ],
  "id": "CVE-2017-15331",
  "lastModified": "2024-11-21T03:14:28.733",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-02-15T16:29:00.330",
  "references": [
    {
      "source": "psirt@huawei.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en"
    }
  ],
  "sourceIdentifier": "psirt@huawei.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:17
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, MAX PRESENCE V100R001C00, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10 have a buffer overflow vulnerability. An authenticated, local attacker may craft a specific XML file to the affected products. Due to insufficient input validation, successful exploit will cause some service abnormal.
Impacted products
Vendor Product Version
huawei ar120-s_firmware v200r006c10
huawei ar120-s_firmware v200r007c00
huawei ar120-s_firmware v200r008c20
huawei ar120-s_firmware v200r008c30
huawei ar120-s -
huawei ar1200_firmware v200r006c10
huawei ar1200_firmware v200r006c13
huawei ar1200_firmware v200r007c00
huawei ar1200_firmware v200r007c01
huawei ar1200_firmware v200r007c02
huawei ar1200_firmware v200r008c20
huawei ar1200_firmware v200r008c30
huawei ar1200 -
huawei ar1200-s_firmware v200r006c10
huawei ar1200-s_firmware v200r007c00
huawei ar1200-s_firmware v200r008c20
huawei ar1200-s_firmware v200r008c30
huawei ar1200-s -
huawei ar150_firmware v200r006c10
huawei ar150_firmware v200r007c00
huawei ar150_firmware v200r007c01
huawei ar150_firmware v200r007c02
huawei ar150_firmware v200r008c20
huawei ar150_firmware v200r008c30
huawei ar150 -
huawei ar150-s_firmware v200r006c10
huawei ar150-s_firmware v200r007c00
huawei ar150-s_firmware v200r008c20
huawei ar150-s_firmware v200r008c30
huawei ar150-s -
huawei ar160_firmware v200r006c10
huawei ar160_firmware v200r006c12
huawei ar160_firmware v200r007c00
huawei ar160_firmware v200r007c01
huawei ar160_firmware v200r007c02
huawei ar160_firmware v200r008c20
huawei ar160_firmware v200r008c30
huawei ar160 -
huawei ar200_firmware v200r006c10
huawei ar200_firmware v200r007c00
huawei ar200_firmware v200r007c01
huawei ar200_firmware v200r008c20
huawei ar200_firmware v200r008c30
huawei ar200 -
huawei ar200-s_firmware v200r006c10
huawei ar200-s_firmware v200r007c00
huawei ar200-s_firmware v200r008c20
huawei ar200-s_firmware v200r008c30
huawei ar200-s -
huawei ar2200_firmware v200r006c10
huawei ar2200_firmware v200r006c13
huawei ar2200_firmware v200r006c16
huawei ar2200_firmware v200r007c00
huawei ar2200_firmware v200r007c01
huawei ar2200_firmware v200r007c02
huawei ar2200_firmware v200r008c20
huawei ar2200_firmware v200r008c30
huawei ar2200 -
huawei ar2200-s_firmware v200r006c10
huawei ar2200-s_firmware v200r007c00
huawei ar2200-s_firmware v200r008c20
huawei ar2200-s_firmware v200r008c30
huawei ar2200-s -
huawei ar3200_firmware v200r006c10
huawei ar3200_firmware v200r006c11
huawei ar3200_firmware v200r007c00
huawei ar3200_firmware v200r007c01
huawei ar3200_firmware v200r007c02
huawei ar3200_firmware v200r008c00
huawei ar3200_firmware v200r008c10
huawei ar3200_firmware v200r008c20
huawei ar3200_firmware v200r008c30
huawei ar3200 -
huawei ar3600_firmware v200r006c10
huawei ar3600_firmware v200r007c00
huawei ar3600_firmware v200r007c01
huawei ar3600_firmware v200r008c20
huawei ar3600 -
huawei ar510_firmware v200r006c10
huawei ar510_firmware v200r006c12
huawei ar510_firmware v200r006c13
huawei ar510_firmware v200r006c15
huawei ar510_firmware v200r006c16
huawei ar510_firmware v200r006c17
huawei ar510_firmware v200r007c00
huawei ar510_firmware v200r008c20
huawei ar510_firmware v200r008c30
huawei ar510 -
huawei dp300_firmware v500r002c00
huawei dp300 -
huawei max_presence_firmware v100r001c00
huawei max_presence -
huawei netengine16ex_firmware v200r006c10
huawei netengine16ex_firmware v200r007c00
huawei netengine16ex_firmware v200r008c20
huawei netengine16ex_firmware v200r008c30
huawei netengine16ex -
huawei rp200_firmware v500r002c00
huawei rp200_firmware v600r006c00
huawei rp200 -
huawei srg1300_firmware v200r006c10
huawei srg1300_firmware v200r007c00
huawei srg1300_firmware v200r007c02
huawei srg1300_firmware v200r008c20
huawei srg1300_firmware v200r008c30
huawei srg1300 -
huawei srg2300_firmware v200r006c10
huawei srg2300_firmware v200r007c00
huawei srg2300_firmware v200r007c02
huawei srg2300_firmware v200r008c20
huawei srg2300_firmware v200r008c30
huawei srg2300 -
huawei srg3300_firmware v200r006c10
huawei srg3300_firmware v200r007c00
huawei srg3300_firmware v200r008c20
huawei srg3300_firmware v200r008c30
huawei srg3300 -
huawei te30_firmware v100r001c02
huawei te30_firmware v100r001c10
huawei te30_firmware v500r002c00
huawei te30_firmware v600r006c00
huawei te30 -
huawei te40_firmware v500r002c00
huawei te40_firmware v600r006c00
huawei te40 -
huawei te50_firmware v500r002c00
huawei te50_firmware v600r006c00
huawei te50 -
huawei te60_firmware v100r001c01
huawei te60_firmware v100r001c10
huawei te60_firmware v500r002c00
huawei te60_firmware v600r006c00
huawei te60 -
huawei tp3106_firmware v100r002c00
huawei tp3106 -
huawei tp3206_firmware v100r002c00
huawei tp3206_firmware v100r002c10
huawei tp3206 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD9E894-321E-4A61-9DA6-677042DDD739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "79DA91B4-77A6-4A37-8799-5E548184D49C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "42376C56-573F-4A88-B18E-43F636B17B41",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0CFDB51-BF44-4433-AB2A-CFF553F8D640",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFE416CD-53B5-4E08-BB30-682887740C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*",
              "matchCriteriaId": "83D6C34F-ED85-461D-89AF-3B8C439867FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "F64071E5-6ACD-4E51-9162-B0FF3DC08E07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "334E0095-CF32-497D-85AC-AE8AEDE4EC50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "4459EF03-890E-446E-8702-8F7CE499FB48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "C623D44E-463B-49A3-81F8-AD219E035B09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4BA4150-8CA8-48BF-9D45-ABC8AC710060",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBB60F62-0715-4C1E-B352-A3D61B56E2AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D125153E-FE39-49A7-95AA-9482C78E7114",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DB071D6-18CE-4FC5-855E-01E64F15BD3D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B053C248-3CC2-476D-95A7-90EDD8EAAD69",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0D92A6F-B30C-4E09-91FC-9C7FFF375710",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "455D7A4E-523E-40C8-958D-59D128F3E797",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C3B0016-0A4A-471F-BBEA-D2E485587B41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C1B1393-1D47-448D-A5FF-0B2EF74CF172",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B64AE02-D345-4628-A086-7C63C255707C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8DC83BF-B7AA-4654-95A2-54C43F379A9A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "526371A8-11FE-4D00-AFBB-8E867A320B27",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "72BC8C3E-420F-49D1-9E58-98E4E23A024F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "787AC5E3-CE88-491D-8211-BAB11112019D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "868602DB-D063-4BE4-A02B-936433CD8231",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0A35FE7-D526-455A-934B-08D54A0302A9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A72083-717F-4C71-A2D7-62E1C64FEE94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAB93A84-773E-4DDF-B8B6-8705D2000CBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF92D98E-60C8-43F9-B6F7-D43193D102EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "34CCEC64-BD07-49F7-8804-98A74257F060",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "A685289C-08B1-43D4-9970-84A7FC75E54B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "21DBC628-F348-4204-B212-11E8E6A0AC8A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "137A007D-A498-483F-8B4F-DCA118B25F11",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7C77ADC-2511-4630-B5F5-F2991EA39E0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "622686BB-9302-449F-9351-75B189D1B184",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "5186D104-FD41-4F54-9923-25B0C8C09E22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "D139E125-0A75-4094-ABFD-A47DAE94CDC4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7114E20-407A-4B1C-9FCE-FF367B50E0E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE9B95EB-A848-4311-8500-9C909784393E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE2EC4F9-EB14-4628-9F89-34168BBD6A56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "B487D436-B96E-4781-AFFD-2136154F9166",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F042B27-F875-4BA3-9002-E5ADC544208B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5C732C2-60D0-4CC9-A2C4-76F6478159EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "F377CE1E-77A7-447F-B692-A54682A26BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5CCF46F-1B0F-4829-BB28-758777313451",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50662078-4827-4706-AE29-170E2239C5AE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "32119825-AF22-44AA-8D04-1FAACF9E2E89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A2BC38B-D016-4E83-A14E-FE8575135DD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "B897F931-00B2-4FDF-90CE-5077416E42BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "99EEE539-796F-4638-9EE1-0BC1BE25CA1F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5862E1A5-0222-4059-B9D7-716A6D0EB8CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB9A3444-A485-4B87-B910-F3DA5C8E5D74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "9752658E-3CF5-4D9E-98FB-D15FD892479C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "0595B3AA-8911-44AF-996B-2F431517FBED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A842B77-C902-4B20-A171-3F98C75E6160",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "B01969DE-DC37-4F2F-BB9B-5242810A8317",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9309E1AA-0C4E-422C-9307-A8DD0AE5D576",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "26CFB676-658E-4DEF-8C29-13CA633D7270",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D395DD8-E338-457E-A4E6-D3A08DE1B571",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3600_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B650408-1E40-49DF-9271-6248CC1DCC89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E52BCED-46D1-4ED9-9A8A-41AA4B88A1AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D30DC2EA-1F76-4CA6-BAC2-8DC796BE50B1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "41A14BFE-B957-4BD9-AD25-01011BF9BF95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4072905-CA96-44F9-8868-BB20BDC56EE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CE13681-CF1A-4765-B35A-E6E674C334B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F77B216-3E00-4EC0-9BEB-6ACD322874C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F06D60-CC92-4B27-9248-40C9CD8EF000",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*",
              "matchCriteriaId": "03F01709-8D14-4C0D-9990-0BC01AAEE1B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "50C579A9-2768-4202-9171-BC803554E923",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2EB46B1-A4FE-42AD-BA60-8134A34F5901",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCD9E893-609B-4C97-82E6-0651AEC39D14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "8871106B-D3AF-4CFB-A544-1FA411642428",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F3483B2-9EB6-4E34-900A-945C04A3160D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:max_presence_firmware:v100r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D15C564B-B409-4304-AF39-AD971BC8E82B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:max_presence:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E933011-8C8D-47C2-BD80-1D7D040755F8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE7A0E2C-8383-443D-8625-77CBC53D2140",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA500A69-F8E4-46A8-9B46-F318F9110C3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "51387999-E9D0-497F-A309-CA5E3126EB00",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6224ECC-6949-4204-94D1-C7374C142A50",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "16C1ED34-BC94-4AAC-ADF4-5FCD637E5B4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "67731A77-1DD4-49B2-B437-2850C9583750",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98275088-2FBE-42F4-AAEC-DF02950B803D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DF1DFD2-5337-45CA-A1A9-2E6622536027",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "B319F31F-94D7-468F-8F71-96F40867AEA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "27D882C1-BFE2-4C29-86FF-C10F86323D5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "D32B9C4A-6005-4B82-B809-FF3DBF47C17B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "D485D5E3-3819-4F3A-B841-ACB6253ACF2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D10EBBF2-8F03-472C-96DB-C72E426E4E38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F0AF0C0-46BF-4984-8378-954DF82EE227",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BAF601C-B8EC-42F5-95F4-274F8492F57E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "309B9B0E-3639-4913-9DE4-9D4DAE6B0065",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4619CF2C-AB5D-475A-ACF6-61EE02306F7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E497D97B-F044-4F9A-84B0-378978FBDC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8E57098-7E8D-4956-82E6-1474A50569C8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43681AE7-5C12-4772-85A9-0A10177C6CFD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "686651A5-6F2F-4AF3-9B96-FF5905F2303A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA3EF476-42D7-4758-8DCB-373F46BF1CF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DEA387B-4F45-438F-8086-6E80B553163C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "018039EB-7265-4B71-B462-4734FD1D0503",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "931FD3B3-A333-4277-AE55-494F5DB9F09F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45C3AF58-E030-4E12-A2FD-A4337A5021ED",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF7A4D51-314B-4A77-86A7-9C5237BC4275",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "A70F8924-DC80-4D6F-BA3E-DBFE32FED788",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F6EACB9-6832-4B2A-9C5B-C1E2747D6359",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "01BC9042-0485-437F-811F-F8898B3B7EA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A29049D-F472-4772-8750-20730DA624E9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "999117E9-90C8-4E76-90B5-7D364C0B84BF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "492DABB3-66CF-47E9-92D4-518154559A7C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D28E0627-0B19-4616-933E-76294F83813F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:tp3206_firmware:v100r002c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8C4071A-502F-46E4-80FF-C6647161A178",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45ED506D-5094-476B-83F0-CBBED04EF348",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, MAX PRESENCE V100R001C00, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10 have a buffer overflow vulnerability. An authenticated, local attacker may craft a specific XML file to the affected products. Due to insufficient input validation, successful exploit will cause some service abnormal."
    },
    {
      "lang": "es",
      "value": "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, MAX PRESENCE V100R001C00, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00 y V100R002C10 tienen una vulnerabilidad de desbordamiento de b\u00fafer. Un atacante local autenticado podr\u00eda manipular un archivo XML espec\u00edfico de los productos afectados. Dada la validaci\u00f3n de entradas insuficiente, una explotaci\u00f3n con \u00e9xito podr\u00eda provocar el funcionamiento err\u00f3neo de algunos servicios"
    }
  ],
  "id": "CVE-2017-17293",
  "lastModified": "2024-11-21T03:17:46.140",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "LOW",
          "baseScore": 3.3,
          "baseSeverity": "LOW",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-02-15T16:29:03.203",
  "references": [
    {
      "source": "psirt@huawei.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171213-06-xml-en"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171213-06-xml-en"
    }
  ],
  "sourceIdentifier": "psirt@huawei.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:17
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, MAX PRESENCE V100R001C00, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10 have a null pointer dereference vulnerability. Due to insufficient input validation, an authenticated, local attacker may craft a specific XML file to the affected products to cause null pointer dereference. Successful exploit will cause some service abnormal.
Impacted products
Vendor Product Version
huawei ar120-s_firmware v200r006c10
huawei ar120-s_firmware v200r007c00
huawei ar120-s_firmware v200r008c20
huawei ar120-s_firmware v200r008c30
huawei ar120-s -
huawei ar1200_firmware v200r006c10
huawei ar1200_firmware v200r006c13
huawei ar1200_firmware v200r007c00
huawei ar1200_firmware v200r007c01
huawei ar1200_firmware v200r007c02
huawei ar1200_firmware v200r008c20
huawei ar1200_firmware v200r008c30
huawei ar1200 -
huawei ar1200-s_firmware v200r006c10
huawei ar1200-s_firmware v200r007c00
huawei ar1200-s_firmware v200r008c20
huawei ar1200-s_firmware v200r008c30
huawei ar1200-s -
huawei ar150_firmware v200r006c10
huawei ar150_firmware v200r007c00
huawei ar150_firmware v200r007c01
huawei ar150_firmware v200r007c02
huawei ar150_firmware v200r008c20
huawei ar150_firmware v200r008c30
huawei ar150 -
huawei ar150-s_firmware v200r006c10
huawei ar150-s_firmware v200r007c00
huawei ar150-s_firmware v200r008c20
huawei ar150-s_firmware v200r008c30
huawei ar150-s -
huawei ar160_firmware v200r006c10
huawei ar160_firmware v200r006c12
huawei ar160_firmware v200r007c00
huawei ar160_firmware v200r007c01
huawei ar160_firmware v200r007c02
huawei ar160_firmware v200r008c20
huawei ar160_firmware v200r008c30
huawei ar160 -
huawei ar200_firmware v200r006c10
huawei ar200_firmware v200r007c00
huawei ar200_firmware v200r007c01
huawei ar200_firmware v200r008c20
huawei ar200_firmware v200r008c30
huawei ar200 -
huawei ar200-s_firmware v200r006c10
huawei ar200-s_firmware v200r007c00
huawei ar200-s_firmware v200r008c20
huawei ar200-s_firmware v200r008c30
huawei ar200-s -
huawei ar2200_firmware v200r006c10
huawei ar2200_firmware v200r006c13
huawei ar2200_firmware v200r006c16
huawei ar2200_firmware v200r007c00
huawei ar2200_firmware v200r007c01
huawei ar2200_firmware v200r007c02
huawei ar2200_firmware v200r008c20
huawei ar2200_firmware v200r008c30
huawei ar2200 -
huawei ar2200-s_firmware v200r006c10
huawei ar2200-s_firmware v200r007c00
huawei ar2200-s_firmware v200r008c20
huawei ar2200-s_firmware v200r008c30
huawei ar2200-s -
huawei ar3200_firmware v200r006c10
huawei ar3200_firmware v200r006c11
huawei ar3200_firmware v200r007c00
huawei ar3200_firmware v200r007c01
huawei ar3200_firmware v200r007c02
huawei ar3200_firmware v200r008c00
huawei ar3200_firmware v200r008c10
huawei ar3200_firmware v200r008c20
huawei ar3200_firmware v200r008c30
huawei ar3200 -
huawei ar3600_firmware v200r006c10
huawei ar3600_firmware v200r007c00
huawei ar3600_firmware v200r007c01
huawei ar3600_firmware v200r008c20
huawei ar3600 -
huawei ar510_firmware v200r006c10
huawei ar510_firmware v200r006c12
huawei ar510_firmware v200r006c13
huawei ar510_firmware v200r006c15
huawei ar510_firmware v200r006c16
huawei ar510_firmware v200r006c17
huawei ar510_firmware v200r007c00
huawei ar510_firmware v200r008c20
huawei ar510_firmware v200r008c30
huawei ar510 -
huawei dp300_firmware v500r002c00
huawei dp300 -
huawei max_presence_firmware v100r001c00
huawei max_presence -
huawei netengine16ex_firmware v200r006c10
huawei netengine16ex_firmware v200r007c00
huawei netengine16ex_firmware v200r008c20
huawei netengine16ex_firmware v200r008c30
huawei netengine16ex -
huawei rp200_firmware v500r002c00
huawei rp200_firmware v600r006c00
huawei rp200 -
huawei srg1300_firmware v200r006c10
huawei srg1300_firmware v200r007c00
huawei srg1300_firmware v200r007c02
huawei srg1300_firmware v200r008c20
huawei srg1300_firmware v200r008c30
huawei srg1300 -
huawei srg2300_firmware v200r006c10
huawei srg2300_firmware v200r007c00
huawei srg2300_firmware v200r007c02
huawei srg2300_firmware v200r008c20
huawei srg2300_firmware v200r008c30
huawei srg2300 -
huawei srg3300_firmware v200r006c10
huawei srg3300_firmware v200r007c00
huawei srg3300_firmware v200r008c20
huawei srg3300_firmware v200r008c30
huawei srg3300 -
huawei te30_firmware v100r001c02
huawei te30_firmware v100r001c10
huawei te30_firmware v500r002c00
huawei te30_firmware v600r006c00
huawei te30 -
huawei te40_firmware v500r002c00
huawei te40_firmware v600r006c00
huawei te40 -
huawei te50_firmware v500r002c00
huawei te50_firmware v600r006c00
huawei te50 -
huawei te60_firmware v100r001c01
huawei te60_firmware v100r001c10
huawei te60_firmware v500r002c00
huawei te60_firmware v600r006c00
huawei te60 -
huawei tp3106_firmware v100r002c00
huawei tp3106 -
huawei tp3206_firmware v100r002c00
huawei tp3206_firmware v100r002c10
huawei tp3206 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD9E894-321E-4A61-9DA6-677042DDD739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "79DA91B4-77A6-4A37-8799-5E548184D49C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "42376C56-573F-4A88-B18E-43F636B17B41",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0CFDB51-BF44-4433-AB2A-CFF553F8D640",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFE416CD-53B5-4E08-BB30-682887740C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*",
              "matchCriteriaId": "83D6C34F-ED85-461D-89AF-3B8C439867FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "F64071E5-6ACD-4E51-9162-B0FF3DC08E07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "334E0095-CF32-497D-85AC-AE8AEDE4EC50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "4459EF03-890E-446E-8702-8F7CE499FB48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "C623D44E-463B-49A3-81F8-AD219E035B09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4BA4150-8CA8-48BF-9D45-ABC8AC710060",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBB60F62-0715-4C1E-B352-A3D61B56E2AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D125153E-FE39-49A7-95AA-9482C78E7114",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DB071D6-18CE-4FC5-855E-01E64F15BD3D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B053C248-3CC2-476D-95A7-90EDD8EAAD69",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0D92A6F-B30C-4E09-91FC-9C7FFF375710",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "455D7A4E-523E-40C8-958D-59D128F3E797",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C3B0016-0A4A-471F-BBEA-D2E485587B41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C1B1393-1D47-448D-A5FF-0B2EF74CF172",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B64AE02-D345-4628-A086-7C63C255707C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8DC83BF-B7AA-4654-95A2-54C43F379A9A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "526371A8-11FE-4D00-AFBB-8E867A320B27",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "72BC8C3E-420F-49D1-9E58-98E4E23A024F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "787AC5E3-CE88-491D-8211-BAB11112019D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "868602DB-D063-4BE4-A02B-936433CD8231",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0A35FE7-D526-455A-934B-08D54A0302A9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A72083-717F-4C71-A2D7-62E1C64FEE94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAB93A84-773E-4DDF-B8B6-8705D2000CBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF92D98E-60C8-43F9-B6F7-D43193D102EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "34CCEC64-BD07-49F7-8804-98A74257F060",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "A685289C-08B1-43D4-9970-84A7FC75E54B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "21DBC628-F348-4204-B212-11E8E6A0AC8A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "137A007D-A498-483F-8B4F-DCA118B25F11",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7C77ADC-2511-4630-B5F5-F2991EA39E0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "622686BB-9302-449F-9351-75B189D1B184",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "5186D104-FD41-4F54-9923-25B0C8C09E22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "D139E125-0A75-4094-ABFD-A47DAE94CDC4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7114E20-407A-4B1C-9FCE-FF367B50E0E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE9B95EB-A848-4311-8500-9C909784393E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE2EC4F9-EB14-4628-9F89-34168BBD6A56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "B487D436-B96E-4781-AFFD-2136154F9166",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F042B27-F875-4BA3-9002-E5ADC544208B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5C732C2-60D0-4CC9-A2C4-76F6478159EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "F377CE1E-77A7-447F-B692-A54682A26BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5CCF46F-1B0F-4829-BB28-758777313451",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50662078-4827-4706-AE29-170E2239C5AE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "32119825-AF22-44AA-8D04-1FAACF9E2E89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A2BC38B-D016-4E83-A14E-FE8575135DD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "B897F931-00B2-4FDF-90CE-5077416E42BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "99EEE539-796F-4638-9EE1-0BC1BE25CA1F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5862E1A5-0222-4059-B9D7-716A6D0EB8CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB9A3444-A485-4B87-B910-F3DA5C8E5D74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "9752658E-3CF5-4D9E-98FB-D15FD892479C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "0595B3AA-8911-44AF-996B-2F431517FBED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A842B77-C902-4B20-A171-3F98C75E6160",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "B01969DE-DC37-4F2F-BB9B-5242810A8317",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9309E1AA-0C4E-422C-9307-A8DD0AE5D576",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "26CFB676-658E-4DEF-8C29-13CA633D7270",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D395DD8-E338-457E-A4E6-D3A08DE1B571",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3600_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B650408-1E40-49DF-9271-6248CC1DCC89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E52BCED-46D1-4ED9-9A8A-41AA4B88A1AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D30DC2EA-1F76-4CA6-BAC2-8DC796BE50B1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "41A14BFE-B957-4BD9-AD25-01011BF9BF95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4072905-CA96-44F9-8868-BB20BDC56EE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CE13681-CF1A-4765-B35A-E6E674C334B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F77B216-3E00-4EC0-9BEB-6ACD322874C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F06D60-CC92-4B27-9248-40C9CD8EF000",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*",
              "matchCriteriaId": "03F01709-8D14-4C0D-9990-0BC01AAEE1B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "50C579A9-2768-4202-9171-BC803554E923",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2EB46B1-A4FE-42AD-BA60-8134A34F5901",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCD9E893-609B-4C97-82E6-0651AEC39D14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "8871106B-D3AF-4CFB-A544-1FA411642428",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F3483B2-9EB6-4E34-900A-945C04A3160D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:max_presence_firmware:v100r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D15C564B-B409-4304-AF39-AD971BC8E82B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:max_presence:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E933011-8C8D-47C2-BD80-1D7D040755F8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE7A0E2C-8383-443D-8625-77CBC53D2140",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA500A69-F8E4-46A8-9B46-F318F9110C3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "51387999-E9D0-497F-A309-CA5E3126EB00",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6224ECC-6949-4204-94D1-C7374C142A50",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "16C1ED34-BC94-4AAC-ADF4-5FCD637E5B4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "67731A77-1DD4-49B2-B437-2850C9583750",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98275088-2FBE-42F4-AAEC-DF02950B803D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DF1DFD2-5337-45CA-A1A9-2E6622536027",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "B319F31F-94D7-468F-8F71-96F40867AEA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "27D882C1-BFE2-4C29-86FF-C10F86323D5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "D32B9C4A-6005-4B82-B809-FF3DBF47C17B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "D485D5E3-3819-4F3A-B841-ACB6253ACF2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D10EBBF2-8F03-472C-96DB-C72E426E4E38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F0AF0C0-46BF-4984-8378-954DF82EE227",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BAF601C-B8EC-42F5-95F4-274F8492F57E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "309B9B0E-3639-4913-9DE4-9D4DAE6B0065",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4619CF2C-AB5D-475A-ACF6-61EE02306F7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E497D97B-F044-4F9A-84B0-378978FBDC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8E57098-7E8D-4956-82E6-1474A50569C8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43681AE7-5C12-4772-85A9-0A10177C6CFD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "686651A5-6F2F-4AF3-9B96-FF5905F2303A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA3EF476-42D7-4758-8DCB-373F46BF1CF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DEA387B-4F45-438F-8086-6E80B553163C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "018039EB-7265-4B71-B462-4734FD1D0503",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "931FD3B3-A333-4277-AE55-494F5DB9F09F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45C3AF58-E030-4E12-A2FD-A4337A5021ED",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF7A4D51-314B-4A77-86A7-9C5237BC4275",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "A70F8924-DC80-4D6F-BA3E-DBFE32FED788",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F6EACB9-6832-4B2A-9C5B-C1E2747D6359",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "01BC9042-0485-437F-811F-F8898B3B7EA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A29049D-F472-4772-8750-20730DA624E9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "999117E9-90C8-4E76-90B5-7D364C0B84BF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "492DABB3-66CF-47E9-92D4-518154559A7C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D28E0627-0B19-4616-933E-76294F83813F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:tp3206_firmware:v100r002c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8C4071A-502F-46E4-80FF-C6647161A178",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45ED506D-5094-476B-83F0-CBBED04EF348",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, MAX PRESENCE V100R001C00, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10 have a null pointer dereference vulnerability. Due to insufficient input validation, an authenticated, local attacker may craft a specific XML file to the affected products to cause null pointer dereference. Successful exploit will cause some service abnormal."
    },
    {
      "lang": "es",
      "value": "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, MAX PRESENCE V100R001C00, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00 y V100R002C10 tienen una vulnerabilidad de desreferencia de puntero null. Dada la validaci\u00f3n de entradas insuficiente, un atacante local autenticado podr\u00eda manipular un archivo XML espec\u00edfico en los productos afectados para provocar una desreferencia de puntero null. Una explotaci\u00f3n con \u00e9xito podr\u00eda provocar el funcionamiento err\u00f3neo de algunos servicios."
    }
  ],
  "id": "CVE-2017-17294",
  "lastModified": "2024-11-21T03:17:46.290",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "LOW",
          "baseScore": 3.3,
          "baseSeverity": "LOW",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-02-15T16:29:03.250",
  "references": [
    {
      "source": "psirt@huawei.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171213-06-xml-en"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171213-06-xml-en"
    }
  ],
  "sourceIdentifier": "psirt@huawei.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-11-22 19:29
Modified
2024-11-21 03:33
Summary
MAX PRESENCE V100R001C00, TP3106 V100R002C00, TP3206 V100R002C00 have an a memory leak vulnerability in H323 protocol. An attacker logs in to the system as a user and send crafted packets to the affected products. Due to insufficient verification of the packets, successful exploit could cause a memory leak and eventual denial of service (DoS) condition.
Impacted products
Vendor Product Version
huawei max_presence_firmware v100r001c00
huawei max_presence -
huawei tp3106_firmware v100r002c00
huawei tp3106 -
huawei tp3206_firmware v100r002c00
huawei tp3206 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:max_presence_firmware:v100r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D15C564B-B409-4304-AF39-AD971BC8E82B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:max_presence:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E933011-8C8D-47C2-BD80-1D7D040755F8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "492DABB3-66CF-47E9-92D4-518154559A7C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D28E0627-0B19-4616-933E-76294F83813F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45ED506D-5094-476B-83F0-CBBED04EF348",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "MAX PRESENCE V100R001C00, TP3106 V100R002C00, TP3206 V100R002C00 have an a memory leak vulnerability in H323 protocol. An attacker logs in to the system as a user and send crafted packets to the affected products. Due to insufficient verification of the packets, successful exploit could cause a memory leak and eventual denial of service (DoS) condition."
    },
    {
      "lang": "es",
      "value": "MAX PRESENCE V100R001C00, TP3106 V100R002C00 y TP3206 V100R002C00 tiene una vulnerabilidad de fuga de memoria en el protocolo H323. Un atacante podr\u00eda iniciar sesi\u00f3n en el sistema como un usuario y enviar paquetes manipulados a los productos afectados. Dado la verificaci\u00f3n insuficiente de los paquetes, una explotaci\u00f3n exitosa podr\u00eda provocar una fuga de memoria y acabar con una denegaci\u00f3n de servicio (DoS)."
    }
  ],
  "id": "CVE-2017-8201",
  "lastModified": "2024-11-21T03:33:31.450",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-11-22T19:29:05.053",
  "references": [
    {
      "source": "psirt@huawei.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170927-01-h323-en"
    },
    {
      "source": "psirt@huawei.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/101952"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170927-01-h323-en"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/101952"
    }
  ],
  "sourceIdentifier": "psirt@huawei.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-772"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-11-22 19:29
Modified
2024-11-21 03:33
Summary
MAX PRESENCE V100R001C00, TP3106 V100R002C00, TP3206 V100R002C00 have an out-of-bounds read vulnerability in H323 protocol. An attacker logs in to the system as a user and send crafted packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause process reboot.
Impacted products
Vendor Product Version
huawei max_presence_firmware v100r001c00
huawei max_presence -
huawei tp3106_firmware v100r002c00
huawei tp3106 -
huawei tp3206_firmware v100r002c00
huawei tp3206 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:max_presence_firmware:v100r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D15C564B-B409-4304-AF39-AD971BC8E82B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:max_presence:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E933011-8C8D-47C2-BD80-1D7D040755F8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "492DABB3-66CF-47E9-92D4-518154559A7C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D28E0627-0B19-4616-933E-76294F83813F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45ED506D-5094-476B-83F0-CBBED04EF348",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "MAX PRESENCE V100R001C00, TP3106 V100R002C00, TP3206 V100R002C00 have an out-of-bounds read vulnerability in H323 protocol. An attacker logs in to the system as a user and send crafted packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause process reboot."
    },
    {
      "lang": "es",
      "value": "MAX PRESENCE V100R001C00, TP3106 V100R002C00 y TP3206 V100R002C00 tiene una vulnerabilidad de lectura fuera de l\u00edmites en el protocolo H323. Un atacante podr\u00eda iniciar sesi\u00f3n en el sistema como un usuario y enviar paquetes manipulados a los productos afectados. Dada la verificaci\u00f3n insuficiente de los paquetes, una explotaci\u00f3n exitosa har\u00eda que el proceso se reinicie."
    }
  ],
  "id": "CVE-2017-8200",
  "lastModified": "2024-11-21T03:33:31.320",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-11-22T19:29:05.023",
  "references": [
    {
      "source": "psirt@huawei.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170927-01-h323-en"
    },
    {
      "source": "psirt@huawei.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/101948"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170927-01-h323-en"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/101948"
    }
  ],
  "sourceIdentifier": "psirt@huawei.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:14
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have a memory leak vulnerability in H323 protocol. The vulnerability is due to insufficient verification of the packets. An unauthenticated, remote attacker could exploit this vulnerability by sending crafted packets. A successful exploit could cause a memory leak and eventual denial of service (DoS) condition on an affected device.
Impacted products
Vendor Product Version
huawei ar120-s_firmware v200r006c10
huawei ar120-s_firmware v200r007c00
huawei ar120-s_firmware v200r008c20
huawei ar120-s_firmware v200r008c30
huawei ar120-s -
huawei ar1200_firmware v200r006c10
huawei ar1200_firmware v200r006c13
huawei ar1200_firmware v200r007c00
huawei ar1200_firmware v200r007c01
huawei ar1200_firmware v200r007c02
huawei ar1200_firmware v200r008c20
huawei ar1200_firmware v200r008c30
huawei ar1200 -
huawei ar1200-s_firmware v200r006c10
huawei ar1200-s_firmware v200r007c00
huawei ar1200-s_firmware v200r008c20
huawei ar1200-s_firmware v200r008c30
huawei ar1200-s -
huawei ar150_firmware v200r006c10
huawei ar150_firmware v200r007c00
huawei ar150_firmware v200r007c01
huawei ar150_firmware v200r007c02
huawei ar150_firmware v200r008c20
huawei ar150_firmware v200r008c30
huawei ar150 -
huawei ar150-s_firmware v200r006c10
huawei ar150-s_firmware v200r007c00
huawei ar150-s_firmware v200r008c20
huawei ar150-s_firmware v200r008c30
huawei ar150-s -
huawei ar160_firmware v200r006c10
huawei ar160_firmware v200r006c12
huawei ar160_firmware v200r007c00
huawei ar160_firmware v200r007c01
huawei ar160_firmware v200r007c02
huawei ar160_firmware v200r008c20
huawei ar160_firmware v200r008c30
huawei ar160 -
huawei ar200_firmware v200r006c10
huawei ar200_firmware v200r007c00
huawei ar200_firmware v200r007c01
huawei ar200_firmware v200r008c20
huawei ar200_firmware v200r008c30
huawei ar200 -
huawei ar200-s_firmware v200r006c10
huawei ar200-s_firmware v200r007c00
huawei ar200-s_firmware v200r008c20
huawei ar200-s_firmware v200r008c30
huawei ar200-s -
huawei ar2200_firmware v200r006c10
huawei ar2200_firmware v200r006c13
huawei ar2200_firmware v200r006c16pwe
huawei ar2200_firmware v200r007c00
huawei ar2200_firmware v200r007c01
huawei ar2200_firmware v200r007c02
huawei ar2200_firmware v200r008c20
huawei ar2200_firmware v200r008c30
huawei ar2200 -
huawei ar2200-s_firmware v200r006c10
huawei ar2200-s_firmware v200r007c00
huawei ar2200-s_firmware v200r008c20
huawei ar2200-s_firmware v200r008c30
huawei ar2200-s -
huawei ar3200_firmware v200r006c10
huawei ar3200_firmware v200r006c11
huawei ar3200_firmware v200r007c00
huawei ar3200_firmware v200r007c01
huawei ar3200_firmware v200r007c02
huawei ar3200_firmware v200r008c00
huawei ar3200_firmware v200r008c10
huawei ar3200_firmware v200r008c20
huawei ar3200_firmware v200r008c30
huawei ar3200 -
huawei ar510_firmware v200r006c10
huawei ar510_firmware v200r006c12
huawei ar510_firmware v200r006c13
huawei ar510_firmware v200r006c15
huawei ar510_firmware v200r006c16
huawei ar510_firmware v200r006c17
huawei ar510_firmware v200r007c00
huawei ar510_firmware v200r008c20
huawei ar510_firmware v200r008c30
huawei ar510 -
huawei netengine16ex_firmware v200r006c10
huawei netengine16ex_firmware v200r007c00
huawei netengine16ex_firmware v200r008c20
huawei netengine16ex_firmware v200r008c30
huawei netengine16ex -
huawei srg1300_firmware v200r006c10
huawei srg1300_firmware v200r007c00
huawei srg1300_firmware v200r007c02
huawei srg1300_firmware v200r008c20
huawei srg1300_firmware v200r008c30
huawei srg1300 -
huawei srg2300_firmware v200r006c10
huawei srg2300_firmware v200r007c00
huawei srg2300_firmware v200r007c02
huawei srg2300_firmware v200r008c20
huawei srg2300_firmware v200r008c30
huawei srg2300 -
huawei srg3300_firmware v200r006c10
huawei srg3300_firmware v200r007c00
huawei srg3300_firmware v200r008c20
huawei srg3300_firmware v200r008c30
huawei srg3300 -
huawei dp300_firmware v500r002c00
huawei dp300 -
huawei ips_module_firmware v100r001c10spc200
huawei ips_module_firmware v100r001c20
huawei ips_module_firmware v100r001c30
huawei ips_module_firmware v500r001c00
huawei ips_module_firmware v500r001c20
huawei ips_module_firmware v500r001c30
huawei ips_module_firmware v500r001c50
huawei ips_module -
huawei max_presence_firmware v100r001c00
huawei max_presence -
huawei ngfw_module_firmware v100r001c10spc200
huawei ngfw_module_firmware v100r001c20
huawei ngfw_module_firmware v100r001c30
huawei ngfw_module_firmware v500r001c00
huawei ngfw_module_firmware v500r001c20
huawei ngfw_module_firmware v500r002c00
huawei ngfw_module_firmware v500r002c10
huawei ngfw_module -
huawei nip6300_firmware v500r001c00
huawei nip6300_firmware v500r001c20
huawei nip6300_firmware v500r001c30
huawei nip6300_firmware v500r001c50
huawei nip6300 -
huawei nip6600_firmware v500r001c00
huawei nip6600_firmware v500r001c20
huawei nip6600_firmware v500r001c30
huawei nip6600_firmware v500r001c50
huawei nip6600 -
huawei nip6800_firmware v500r001c50
huawei nip6800 -
huawei rp200_firmware v500r002c00spc200
huawei rp200_firmware v600r006c00
huawei rp200 -
huawei rse6500_firmware v500r002c00
huawei rse6500 -
huawei smc2.0_firmware v100r003c10
huawei smc2.0_firmware v100r005c00
huawei smc2.0_firmware v500r002c00
huawei smc2.0_firmware v500r002c00t
huawei smc2.0_firmware v600r006c00
huawei smc2.0_firmware v600r006c00t
huawei smc2.0 -
huawei svn5600_firmware v200r003c00
huawei svn5600_firmware v200r003c10
huawei svn5600 -
huawei svn5800_firmware v200r003c00
huawei svn5800_firmware v200r003c10
huawei svn5800 -
huawei svn5800-c_firmware v200r003c00
huawei svn5800-c_firmware v200r003c10
huawei svn5800-c -
huawei secospace_usg6300_firmware v100r001c10
huawei secospace_usg6300_firmware v100r001c20
huawei secospace_usg6300_firmware v100r001c30
huawei secospace_usg6300_firmware v500r001c00
huawei secospace_usg6300_firmware v500r001c20
huawei secospace_usg6300_firmware v500r001c30
huawei secospace_usg6300_firmware v500r001c50
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v100r001c10
huawei secospace_usg6500_firmware v100r001c20
huawei secospace_usg6500_firmware v100r001c30
huawei secospace_usg6500_firmware v500r001c00
huawei secospace_usg6500_firmware v500r001c20
huawei secospace_usg6500_firmware v500r001c30
huawei secospace_usg6500_firmware v500r001c50
huawei secospace_usg6500 -
huawei te30_firmware v100r001c10
huawei te30_firmware v500r002c00
huawei te30_firmware v600r006c00
huawei te30 -
huawei te40_firmware v500r002c00
huawei te40_firmware v600r006c00
huawei te40 -
huawei te50_firmware v500r002c00
huawei te50_firmware v600r006c00
huawei te50 -
huawei te60_firmware v100r001c01
huawei te60_firmware v100r001c10
huawei te60_firmware v500r002c00
huawei te60_firmware v600r006c00
huawei te60 -
huawei tp3106_firmware v100r002c00
huawei tp3106 -
huawei tp3206_firmware v100r002c00
huawei tp3206 -
huawei usg9500_firmware v500r001c00
huawei usg9500_firmware v500r001c20
huawei usg9500_firmware v500r001c30
huawei usg9500_firmware v500r001c50
huawei usg9500 -
huawei usg9520_firmware v300r001c01
huawei usg9520_firmware v300r001c20
huawei usg9520 -
huawei usg9560_firmware v300r001c01
huawei usg9560_firmware v300r001c20
huawei usg9560 -
huawei usg9580_firmware v300r001c01
huawei usg9580_firmware v300r001c20
huawei usg9580 -
huawei viewpoint_9030_firmware v100r011c02
huawei viewpoint_9030_firmware v100r011c03
huawei viewpoint_9030 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD9E894-321E-4A61-9DA6-677042DDD739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "79DA91B4-77A6-4A37-8799-5E548184D49C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "42376C56-573F-4A88-B18E-43F636B17B41",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0CFDB51-BF44-4433-AB2A-CFF553F8D640",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFE416CD-53B5-4E08-BB30-682887740C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*",
              "matchCriteriaId": "83D6C34F-ED85-461D-89AF-3B8C439867FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "F64071E5-6ACD-4E51-9162-B0FF3DC08E07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "334E0095-CF32-497D-85AC-AE8AEDE4EC50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "4459EF03-890E-446E-8702-8F7CE499FB48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "C623D44E-463B-49A3-81F8-AD219E035B09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4BA4150-8CA8-48BF-9D45-ABC8AC710060",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBB60F62-0715-4C1E-B352-A3D61B56E2AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D125153E-FE39-49A7-95AA-9482C78E7114",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DB071D6-18CE-4FC5-855E-01E64F15BD3D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B053C248-3CC2-476D-95A7-90EDD8EAAD69",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0D92A6F-B30C-4E09-91FC-9C7FFF375710",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "455D7A4E-523E-40C8-958D-59D128F3E797",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C3B0016-0A4A-471F-BBEA-D2E485587B41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C1B1393-1D47-448D-A5FF-0B2EF74CF172",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B64AE02-D345-4628-A086-7C63C255707C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8DC83BF-B7AA-4654-95A2-54C43F379A9A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "526371A8-11FE-4D00-AFBB-8E867A320B27",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "72BC8C3E-420F-49D1-9E58-98E4E23A024F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "787AC5E3-CE88-491D-8211-BAB11112019D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "868602DB-D063-4BE4-A02B-936433CD8231",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0A35FE7-D526-455A-934B-08D54A0302A9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A72083-717F-4C71-A2D7-62E1C64FEE94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAB93A84-773E-4DDF-B8B6-8705D2000CBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF92D98E-60C8-43F9-B6F7-D43193D102EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "34CCEC64-BD07-49F7-8804-98A74257F060",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "A685289C-08B1-43D4-9970-84A7FC75E54B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "21DBC628-F348-4204-B212-11E8E6A0AC8A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "137A007D-A498-483F-8B4F-DCA118B25F11",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7C77ADC-2511-4630-B5F5-F2991EA39E0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "622686BB-9302-449F-9351-75B189D1B184",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "5186D104-FD41-4F54-9923-25B0C8C09E22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "D139E125-0A75-4094-ABFD-A47DAE94CDC4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7114E20-407A-4B1C-9FCE-FF367B50E0E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE9B95EB-A848-4311-8500-9C909784393E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE2EC4F9-EB14-4628-9F89-34168BBD6A56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "B487D436-B96E-4781-AFFD-2136154F9166",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F042B27-F875-4BA3-9002-E5ADC544208B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD069FB1-8A7E-4D29-94F2-D7F94BA306D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "F377CE1E-77A7-447F-B692-A54682A26BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5CCF46F-1B0F-4829-BB28-758777313451",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50662078-4827-4706-AE29-170E2239C5AE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "32119825-AF22-44AA-8D04-1FAACF9E2E89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A2BC38B-D016-4E83-A14E-FE8575135DD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "B897F931-00B2-4FDF-90CE-5077416E42BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "99EEE539-796F-4638-9EE1-0BC1BE25CA1F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5862E1A5-0222-4059-B9D7-716A6D0EB8CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB9A3444-A485-4B87-B910-F3DA5C8E5D74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "9752658E-3CF5-4D9E-98FB-D15FD892479C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "0595B3AA-8911-44AF-996B-2F431517FBED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A842B77-C902-4B20-A171-3F98C75E6160",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "B01969DE-DC37-4F2F-BB9B-5242810A8317",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9309E1AA-0C4E-422C-9307-A8DD0AE5D576",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "41A14BFE-B957-4BD9-AD25-01011BF9BF95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4072905-CA96-44F9-8868-BB20BDC56EE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CE13681-CF1A-4765-B35A-E6E674C334B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F77B216-3E00-4EC0-9BEB-6ACD322874C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F06D60-CC92-4B27-9248-40C9CD8EF000",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*",
              "matchCriteriaId": "03F01709-8D14-4C0D-9990-0BC01AAEE1B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "50C579A9-2768-4202-9171-BC803554E923",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2EB46B1-A4FE-42AD-BA60-8134A34F5901",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCD9E893-609B-4C97-82E6-0651AEC39D14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE7A0E2C-8383-443D-8625-77CBC53D2140",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA500A69-F8E4-46A8-9B46-F318F9110C3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "51387999-E9D0-497F-A309-CA5E3126EB00",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6224ECC-6949-4204-94D1-C7374C142A50",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DF1DFD2-5337-45CA-A1A9-2E6622536027",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "B319F31F-94D7-468F-8F71-96F40867AEA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "27D882C1-BFE2-4C29-86FF-C10F86323D5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "D32B9C4A-6005-4B82-B809-FF3DBF47C17B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "D485D5E3-3819-4F3A-B841-ACB6253ACF2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D10EBBF2-8F03-472C-96DB-C72E426E4E38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F0AF0C0-46BF-4984-8378-954DF82EE227",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BAF601C-B8EC-42F5-95F4-274F8492F57E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "309B9B0E-3639-4913-9DE4-9D4DAE6B0065",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4619CF2C-AB5D-475A-ACF6-61EE02306F7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E497D97B-F044-4F9A-84B0-378978FBDC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8E57098-7E8D-4956-82E6-1474A50569C8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43681AE7-5C12-4772-85A9-0A10177C6CFD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "8871106B-D3AF-4CFB-A544-1FA411642428",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F3483B2-9EB6-4E34-900A-945C04A3160D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "3103CC5F-E44E-49D8-A100-45476CD24A91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v100r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "51A51677-9D99-491C-B524-C5ED5774AC03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1B55442-9A8C-4291-9086-17516814DFD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "84477B1C-413A-4F74-86DC-55E58AD07AB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "B135BE9A-A4B9-433F-BA82-548E0E859C0E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:max_presence_firmware:v100r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D15C564B-B409-4304-AF39-AD971BC8E82B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:max_presence:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E933011-8C8D-47C2-BD80-1D7D040755F8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4D17C34-47FB-478A-BB12-5F7C68045120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "246D5D93-F372-4CA8-BFA2-250B61CCEF2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "80411236-6B22-4937-87F3-E06C991B14D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A8E1096-F070-4CE9-B2B4-6368890706A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "F46A81BE-C125-4CAE-8EE1-23177FE0C21E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B469A91-4CD0-44D2-A982-3E612B855E71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "1856722C-597D-495D-AFCC-21E5FF6F2359",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "728A7B78-6E19-4656-848F-269DB955070C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E054182-CE33-45E3-8595-159A75BA5162",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDC040A6-3E38-4B21-9779-67CF66FDC6B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "946F5FF7-412F-40F9-A492-DE8E11E7B919",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "678FFB3B-C6E1-4694-B51C-D56E26B53E1E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE8CA649-7AE1-497C-869B-B4DD315F342C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D5066C9-7581-4284-AF23-0782870B2F03",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "875441DD-575F-4F4D-A6BD-23C38641D330",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:rp200_firmware:v500r002c00spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BC535D5-0C05-4695-976F-ACF447431A6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "67731A77-1DD4-49B2-B437-2850C9583750",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98275088-2FBE-42F4-AAEC-DF02950B803D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "649BB696-BDBE-46FC-A23D-287DE306D8BB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DD9417D-0515-4B21-AD32-E6B137575D01",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "386F5C31-6000-48C4-A9CA-D3F91A0549E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "611E69A3-AB62-4584-B611-93583D84FCB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9E7481E-B5B8-481C-AC35-A8029AA2DF7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00t:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F64B04C-27B1-4621-86B3-827D6F83D3B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "60E7CCC4-60A8-48FA-A9EA-7A327B3A29B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00t:*:*:*:*:*:*:*",
              "matchCriteriaId": "0892BC18-F3D0-4B0A-8F6D-E0C2A98E8A71",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDBEFFB4-9742-48CC-BBA6-E5DCA281B343",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C216CE3-3481-4F96-9D10-15B627929046",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46EE0FA6-7E53-488F-81A7-B2C906D65552",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C80D3BB-868B-461C-B97A-9C94C9F80858",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "019D2365-8BD9-4243-97CC-22264F30A24E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FC3D1EE-0368-48DF-9B38-4751330E23A5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDD8D36D-A4F2-4423-B57E-E9933710201E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "353AFD36-2046-4E75-96FB-CBA7071C3257",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BC78B8F-B4BC-429D-9685-C30B47810B32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D137236-B70C-4AC9-A041-5857FE01F293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E335D2-FE4B-4316-8827-4741EC9AA674",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "62F5005B-13E9-49EB-82A1-9A03F3583037",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B184673-1E6E-44F8-82FB-42E42E0F19D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "D588964F-A5F2-4D5C-AE5D-17962E599370",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "3189382E-6846-4713-A92F-ABD03683F4A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3983A57-2F07-4D21-9093-1DFEAB310E26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA3EF476-42D7-4758-8DCB-373F46BF1CF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DEA387B-4F45-438F-8086-6E80B553163C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "018039EB-7265-4B71-B462-4734FD1D0503",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "931FD3B3-A333-4277-AE55-494F5DB9F09F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45C3AF58-E030-4E12-A2FD-A4337A5021ED",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF7A4D51-314B-4A77-86A7-9C5237BC4275",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "A70F8924-DC80-4D6F-BA3E-DBFE32FED788",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F6EACB9-6832-4B2A-9C5B-C1E2747D6359",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "01BC9042-0485-437F-811F-F8898B3B7EA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A29049D-F472-4772-8750-20730DA624E9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "999117E9-90C8-4E76-90B5-7D364C0B84BF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "492DABB3-66CF-47E9-92D4-518154559A7C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D28E0627-0B19-4616-933E-76294F83813F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45ED506D-5094-476B-83F0-CBBED04EF348",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "22007E6A-68FC-4AF4-A570-95873AFBF882",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "11D1A4CC-2F7E-40AF-8874-EE3986176623",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C329182-E16A-4E89-A43C-0DB90BDE4AA5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC8205DE-4325-4DA8-90D1-8969642F8FAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:usg9520_firmware:v300r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CE2D4CD-42FB-4290-8EB9-F1496F9B89BA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "60030EDB-682F-4107-80FC-5F03CE75131D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "D94DE238-F32F-48D9-86D1-ED1F5D6F1663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B31E688-B5EC-47FE-92B7-C3CF0C9FEF8E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "96AFE94D-EDC7-4372-A1BF-8089D5551AD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "92747AD5-0EED-44E8-BCB6-6663442ACD8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:usg9580_firmware:v300r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "24845D47-3AF8-43BA-9844-6529F8DAABD3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14C9D3E2-B016-4238-A170-6C4AD1B3B76C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ADEC8B2-CD7F-4246-88C0-E27B939829AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6208C34-D92D-4605-B4AF-6EA597CBA0F2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have a memory leak vulnerability in H323 protocol. The vulnerability is due to insufficient verification of the packets. An unauthenticated, remote attacker could exploit this vulnerability by sending crafted packets. A successful exploit could cause a memory leak and eventual denial of service (DoS) condition on an affected device."
    },
    {
      "lang": "es",
      "value": "Los dispositivos Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02 y V100R011C03 tienen una vulnerabilidad de fuga de memoria en el protocolo H323. Esta vulnerabilidad se debe a una protecci\u00f3n de de verificaci\u00f3n de paquetes insuficiente. Un atacante remoto no autenticado podr\u00eda explotar esta vulnerabilidad enviando paquetes manipulados. Una explotaci\u00f3n con \u00e9xito podr\u00eda provocar una fuga de memoria y una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un dispositivo afectado."
    }
  ],
  "id": "CVE-2017-15332",
  "lastModified": "2024-11-21T03:14:28.893",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-02-15T16:29:00.377",
  "references": [
    {
      "source": "psirt@huawei.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en"
    }
  ],
  "sourceIdentifier": "psirt@huawei.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-772"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:17
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, MAX PRESENCE V100R001C00, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10 have a denial of service vulnerability in the specific module. An authenticated, local attacker may craft a specific XML file to the affected products. Due to improper handling of input, successful exploit will cause some service abnormal.
Impacted products
Vendor Product Version
huawei ar120-s_firmware v200r006c10
huawei ar120-s_firmware v200r007c00
huawei ar120-s_firmware v200r008c20
huawei ar120-s_firmware v200r008c30
huawei ar120-s -
huawei ar1200_firmware v200r006c10
huawei ar1200_firmware v200r006c13
huawei ar1200_firmware v200r007c00
huawei ar1200_firmware v200r007c01
huawei ar1200_firmware v200r007c02
huawei ar1200_firmware v200r008c20
huawei ar1200_firmware v200r008c30
huawei ar1200 -
huawei ar1200-s_firmware v200r006c10
huawei ar1200-s_firmware v200r007c00
huawei ar1200-s_firmware v200r008c20
huawei ar1200-s_firmware v200r008c30
huawei ar1200-s -
huawei ar150_firmware v200r006c10
huawei ar150_firmware v200r007c00
huawei ar150_firmware v200r007c01
huawei ar150_firmware v200r007c02
huawei ar150_firmware v200r008c20
huawei ar150_firmware v200r008c30
huawei ar150 -
huawei ar150-s_firmware v200r006c10
huawei ar150-s_firmware v200r007c00
huawei ar150-s_firmware v200r008c20
huawei ar150-s_firmware v200r008c30
huawei ar150-s -
huawei ar160_firmware v200r006c10
huawei ar160_firmware v200r006c12
huawei ar160_firmware v200r007c00
huawei ar160_firmware v200r007c01
huawei ar160_firmware v200r007c02
huawei ar160_firmware v200r008c20
huawei ar160_firmware v200r008c30
huawei ar160 -
huawei ar200_firmware v200r006c10
huawei ar200_firmware v200r007c00
huawei ar200_firmware v200r007c01
huawei ar200_firmware v200r008c20
huawei ar200_firmware v200r008c30
huawei ar200 -
huawei ar200-s_firmware v200r006c10
huawei ar200-s_firmware v200r007c00
huawei ar200-s_firmware v200r008c20
huawei ar200-s_firmware v200r008c30
huawei ar200-s -
huawei ar2200_firmware v200r006c10
huawei ar2200_firmware v200r006c13
huawei ar2200_firmware v200r006c16
huawei ar2200_firmware v200r007c00
huawei ar2200_firmware v200r007c01
huawei ar2200_firmware v200r007c02
huawei ar2200_firmware v200r008c20
huawei ar2200_firmware v200r008c30
huawei ar2200 -
huawei ar2200-s_firmware v200r006c10
huawei ar2200-s_firmware v200r007c00
huawei ar2200-s_firmware v200r008c20
huawei ar2200-s_firmware v200r008c30
huawei ar2200-s -
huawei ar3200_firmware v200r006c10
huawei ar3200_firmware v200r006c11
huawei ar3200_firmware v200r007c00
huawei ar3200_firmware v200r007c01
huawei ar3200_firmware v200r007c02
huawei ar3200_firmware v200r008c00
huawei ar3200_firmware v200r008c10
huawei ar3200_firmware v200r008c20
huawei ar3200_firmware v200r008c30
huawei ar3200 -
huawei ar3600_firmware v200r006c10
huawei ar3600_firmware v200r007c00
huawei ar3600_firmware v200r007c01
huawei ar3600_firmware v200r008c20
huawei ar3600 -
huawei ar510_firmware v200r006c10
huawei ar510_firmware v200r006c12
huawei ar510_firmware v200r006c13
huawei ar510_firmware v200r006c15
huawei ar510_firmware v200r006c16
huawei ar510_firmware v200r006c17
huawei ar510_firmware v200r007c00
huawei ar510_firmware v200r008c20
huawei ar510_firmware v200r008c30
huawei ar510 -
huawei dp300_firmware v500r002c00
huawei dp300 -
huawei max_presence_firmware v100r001c00
huawei max_presence -
huawei netengine16ex_firmware v200r006c10
huawei netengine16ex_firmware v200r007c00
huawei netengine16ex_firmware v200r008c20
huawei netengine16ex_firmware v200r008c30
huawei netengine16ex -
huawei rp200_firmware v500r002c00
huawei rp200_firmware v600r006c00
huawei rp200 -
huawei srg1300_firmware v200r006c10
huawei srg1300_firmware v200r007c00
huawei srg1300_firmware v200r007c02
huawei srg1300_firmware v200r008c20
huawei srg1300_firmware v200r008c30
huawei srg1300 -
huawei srg2300_firmware v200r006c10
huawei srg2300_firmware v200r007c00
huawei srg2300_firmware v200r007c02
huawei srg2300_firmware v200r008c20
huawei srg2300_firmware v200r008c30
huawei srg2300 -
huawei srg3300_firmware v200r006c10
huawei srg3300_firmware v200r007c00
huawei srg3300_firmware v200r008c20
huawei srg3300_firmware v200r008c30
huawei srg3300 -
huawei te30_firmware v100r001c02
huawei te30_firmware v100r001c10
huawei te30_firmware v500r002c00
huawei te30_firmware v600r006c00
huawei te30 -
huawei te40_firmware v500r002c00
huawei te40_firmware v600r006c00
huawei te40 -
huawei te50_firmware v500r002c00
huawei te50_firmware v600r006c00
huawei te50 -
huawei te60_firmware v100r001c01
huawei te60_firmware v100r001c10
huawei te60_firmware v500r002c00
huawei te60_firmware v600r006c00
huawei te60 -
huawei tp3106_firmware v100r002c00
huawei tp3106 -
huawei tp3206_firmware v100r002c00
huawei tp3206_firmware v100r002c10
huawei tp3206 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD9E894-321E-4A61-9DA6-677042DDD739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "79DA91B4-77A6-4A37-8799-5E548184D49C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "42376C56-573F-4A88-B18E-43F636B17B41",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0CFDB51-BF44-4433-AB2A-CFF553F8D640",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFE416CD-53B5-4E08-BB30-682887740C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*",
              "matchCriteriaId": "83D6C34F-ED85-461D-89AF-3B8C439867FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "F64071E5-6ACD-4E51-9162-B0FF3DC08E07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "334E0095-CF32-497D-85AC-AE8AEDE4EC50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "4459EF03-890E-446E-8702-8F7CE499FB48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "C623D44E-463B-49A3-81F8-AD219E035B09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4BA4150-8CA8-48BF-9D45-ABC8AC710060",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBB60F62-0715-4C1E-B352-A3D61B56E2AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D125153E-FE39-49A7-95AA-9482C78E7114",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DB071D6-18CE-4FC5-855E-01E64F15BD3D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B053C248-3CC2-476D-95A7-90EDD8EAAD69",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0D92A6F-B30C-4E09-91FC-9C7FFF375710",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "455D7A4E-523E-40C8-958D-59D128F3E797",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C3B0016-0A4A-471F-BBEA-D2E485587B41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C1B1393-1D47-448D-A5FF-0B2EF74CF172",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B64AE02-D345-4628-A086-7C63C255707C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8DC83BF-B7AA-4654-95A2-54C43F379A9A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "526371A8-11FE-4D00-AFBB-8E867A320B27",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "72BC8C3E-420F-49D1-9E58-98E4E23A024F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "787AC5E3-CE88-491D-8211-BAB11112019D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "868602DB-D063-4BE4-A02B-936433CD8231",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0A35FE7-D526-455A-934B-08D54A0302A9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A72083-717F-4C71-A2D7-62E1C64FEE94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAB93A84-773E-4DDF-B8B6-8705D2000CBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF92D98E-60C8-43F9-B6F7-D43193D102EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "34CCEC64-BD07-49F7-8804-98A74257F060",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "A685289C-08B1-43D4-9970-84A7FC75E54B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "21DBC628-F348-4204-B212-11E8E6A0AC8A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "137A007D-A498-483F-8B4F-DCA118B25F11",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7C77ADC-2511-4630-B5F5-F2991EA39E0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "622686BB-9302-449F-9351-75B189D1B184",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "5186D104-FD41-4F54-9923-25B0C8C09E22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "D139E125-0A75-4094-ABFD-A47DAE94CDC4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7114E20-407A-4B1C-9FCE-FF367B50E0E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE9B95EB-A848-4311-8500-9C909784393E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE2EC4F9-EB14-4628-9F89-34168BBD6A56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "B487D436-B96E-4781-AFFD-2136154F9166",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F042B27-F875-4BA3-9002-E5ADC544208B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5C732C2-60D0-4CC9-A2C4-76F6478159EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "F377CE1E-77A7-447F-B692-A54682A26BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5CCF46F-1B0F-4829-BB28-758777313451",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50662078-4827-4706-AE29-170E2239C5AE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "32119825-AF22-44AA-8D04-1FAACF9E2E89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A2BC38B-D016-4E83-A14E-FE8575135DD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "B897F931-00B2-4FDF-90CE-5077416E42BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "99EEE539-796F-4638-9EE1-0BC1BE25CA1F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5862E1A5-0222-4059-B9D7-716A6D0EB8CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB9A3444-A485-4B87-B910-F3DA5C8E5D74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "9752658E-3CF5-4D9E-98FB-D15FD892479C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "0595B3AA-8911-44AF-996B-2F431517FBED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A842B77-C902-4B20-A171-3F98C75E6160",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "B01969DE-DC37-4F2F-BB9B-5242810A8317",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9309E1AA-0C4E-422C-9307-A8DD0AE5D576",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "26CFB676-658E-4DEF-8C29-13CA633D7270",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D395DD8-E338-457E-A4E6-D3A08DE1B571",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3600_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B650408-1E40-49DF-9271-6248CC1DCC89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E52BCED-46D1-4ED9-9A8A-41AA4B88A1AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D30DC2EA-1F76-4CA6-BAC2-8DC796BE50B1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "41A14BFE-B957-4BD9-AD25-01011BF9BF95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4072905-CA96-44F9-8868-BB20BDC56EE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CE13681-CF1A-4765-B35A-E6E674C334B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F77B216-3E00-4EC0-9BEB-6ACD322874C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F06D60-CC92-4B27-9248-40C9CD8EF000",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*",
              "matchCriteriaId": "03F01709-8D14-4C0D-9990-0BC01AAEE1B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "50C579A9-2768-4202-9171-BC803554E923",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2EB46B1-A4FE-42AD-BA60-8134A34F5901",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCD9E893-609B-4C97-82E6-0651AEC39D14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "8871106B-D3AF-4CFB-A544-1FA411642428",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F3483B2-9EB6-4E34-900A-945C04A3160D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:max_presence_firmware:v100r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D15C564B-B409-4304-AF39-AD971BC8E82B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:max_presence:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E933011-8C8D-47C2-BD80-1D7D040755F8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE7A0E2C-8383-443D-8625-77CBC53D2140",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA500A69-F8E4-46A8-9B46-F318F9110C3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "51387999-E9D0-497F-A309-CA5E3126EB00",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6224ECC-6949-4204-94D1-C7374C142A50",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "16C1ED34-BC94-4AAC-ADF4-5FCD637E5B4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "67731A77-1DD4-49B2-B437-2850C9583750",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98275088-2FBE-42F4-AAEC-DF02950B803D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DF1DFD2-5337-45CA-A1A9-2E6622536027",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "B319F31F-94D7-468F-8F71-96F40867AEA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "27D882C1-BFE2-4C29-86FF-C10F86323D5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "D32B9C4A-6005-4B82-B809-FF3DBF47C17B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "D485D5E3-3819-4F3A-B841-ACB6253ACF2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D10EBBF2-8F03-472C-96DB-C72E426E4E38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F0AF0C0-46BF-4984-8378-954DF82EE227",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BAF601C-B8EC-42F5-95F4-274F8492F57E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "309B9B0E-3639-4913-9DE4-9D4DAE6B0065",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4619CF2C-AB5D-475A-ACF6-61EE02306F7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E497D97B-F044-4F9A-84B0-378978FBDC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8E57098-7E8D-4956-82E6-1474A50569C8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43681AE7-5C12-4772-85A9-0A10177C6CFD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "686651A5-6F2F-4AF3-9B96-FF5905F2303A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA3EF476-42D7-4758-8DCB-373F46BF1CF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DEA387B-4F45-438F-8086-6E80B553163C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "018039EB-7265-4B71-B462-4734FD1D0503",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "931FD3B3-A333-4277-AE55-494F5DB9F09F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45C3AF58-E030-4E12-A2FD-A4337A5021ED",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF7A4D51-314B-4A77-86A7-9C5237BC4275",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "A70F8924-DC80-4D6F-BA3E-DBFE32FED788",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F6EACB9-6832-4B2A-9C5B-C1E2747D6359",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "01BC9042-0485-437F-811F-F8898B3B7EA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A29049D-F472-4772-8750-20730DA624E9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "999117E9-90C8-4E76-90B5-7D364C0B84BF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "492DABB3-66CF-47E9-92D4-518154559A7C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D28E0627-0B19-4616-933E-76294F83813F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:tp3206_firmware:v100r002c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8C4071A-502F-46E4-80FF-C6647161A178",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45ED506D-5094-476B-83F0-CBBED04EF348",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, MAX PRESENCE V100R001C00, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10 have a denial of service vulnerability in the specific module. An authenticated, local attacker may craft a specific XML file to the affected products. Due to improper handling of input, successful exploit will cause some service abnormal."
    },
    {
      "lang": "es",
      "value": "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, MAX PRESENCE V100R001C00, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00 y V100R002C10 tienen una vulnerabilidad de denegaci\u00f3n de servicio en el m\u00f3dulo espec\u00edfico. Un atacante local autenticado podr\u00eda manipular un archivo XML espec\u00edfico de los productos afectados. Dada la gesti\u00f3n incorrecta de las entradas, la explotaci\u00f3n con \u00e9xito podr\u00eda provocar que algunos servicios funcionen err\u00f3neamente."
    }
  ],
  "id": "CVE-2017-17292",
  "lastModified": "2024-11-21T03:17:45.990",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "LOW",
          "baseScore": 3.3,
          "baseSeverity": "LOW",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-02-15T16:29:03.157",
  "references": [
    {
      "source": "psirt@huawei.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171213-06-xml-en"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171213-06-xml-en"
    }
  ],
  "sourceIdentifier": "psirt@huawei.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}