Vulnerabilites related to huawei - ne80
var-201306-0006
Vulnerability from variot

The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack. Huawei networking equipment use a DES encryption algorithm for password and encryption. DES is publicly known to be easily cracked. plural Huawei The product uses the stored password DES Because of the use of the algorithm, a vulnerability exists in which a plaintext password is obtained.Brute force attack by attacker (Brute force attack) You may be able to get a plaintext password via. Huawei is the world's leading provider of information and communication solutions. Huawei Quidway is a series of switches developed by Huawei. The Huawei CX600 is based on Huawei's mature VRP platform and has powerful routing, L2/L3 multicast, 5-level H-QoS, packet buffering, and ACL capabilities. Multiple Huawei products are prone to a weak password encryption weakness. Successful exploits may allow an attacker to decrypt stored passwords; this may aid in further attacks. The following are vulnerable: Huawei Quidway series Huawei CX600 V600R001 Huawei CX600 V600R003C00SPC900 Huawei ME60 V600R002C07 and prior versions AR 19/29/49 R2207 and prior versions. Weak password encryption on Huawei products ===========================================

[ADVISORY INFORMATION] Title: Weak password encryption on Huawei products Release date: 13/11/2012 Credits: Roberto Paleari, Emaze Networks (roberto.paleari@emaze.net) Ivan Speziale, Emaze Networks (ivan.speziale@emaze.net)

[VULNERABILITY INFORMATION] Class: Information disclosure

[AFFECTED PRODUCTS] We confirm the presence of this security vulnerability on the following products: * Huawei Quidway series * Huawei CX600

Other models are probably also vulnerable, but they were not checked. As a consequence, passwords extracted from a victim's device can be deciphered instantaneously.

A Python procedure that decodes a given password is included below. Upon termination, procedure decrypt_password() returns the clear-text password.

from Crypto.Cipher import DES

def decode_char(c): if c == 'a': r = '?' else: r = c return ord(r) - ord('!')

def ascii_to_binary(s): assert len(s) == 24

out = [0]*18
i = 0
j = 0

for i in range(0, len(s), 4):
    y = decode_char(s[i + 0])
    y = (y << 6) & 0xffffff

    k = decode_char(s[i + 1])
    y = (y | k) & 0xffffff
    y = (y << 6) & 0xffffff

    k = decode_char(s[i + 2])
    y = (y | k) & 0xffffff
    y = (y << 6) & 0xffffff

    k = decode_char(s[i + 3])
    y = (y | k) & 0xffffff

    out[j+2] = chr(y       & 0xff)
    out[j+1] = chr((y>>8)  & 0xff)
    out[j+0] = chr((y>>16) & 0xff)

    j += 3

return "".join(out)

def decrypt_password(p): r = ascii_to_binary(p)

r = r[:16]

d = DES.new("\x01\x02\x03\x04\x05\x06\x07\x08", DES.MODE_ECB)
r = d.decrypt(r)

return r.rstrip("\x00")

[REMEDIATION] We recommend to store passwords using a proper hashing algorithm, instead of leveraging symmetric encryption. Further details are available at the following URL: http://support.huawei.com/enterprise/ReadLatestNewsAction.action?contentId=NEWS1000001141

[COPYRIGHT] Copyright(c) Emaze Networks S.p.A 2012, All rights reserved worldwide. Permission is hereby granted to redistribute this advisory, providing that no changes are made and that the copyright notices and disclaimers remain intact.

[DISCLAIMER] Emaze Networks S.p.A is not responsible for the misuse of the information provided in our security advisories. These advisories are a service to the professional security community. There are NO WARRANTIES with regard to this information. Any application or distribution of this information constitutes acceptance AS IS, at the user's own risk. This information is subject to change without notice

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201306-0006",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "acu",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r003c01spc100",
         },
         {
            model: "acu",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "acu",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001c00spc100",
         },
         {
            model: "ar g3",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "ar g3",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001c01",
         },
         {
            model: "ar g3",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r002c00spc200",
         },
         {
            model: "atn",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "atn",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001c01",
         },
         {
            model: "cx200",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r005",
         },
         {
            model: "cx300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r005",
         },
         {
            model: "cx600",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r002",
         },
         {
            model: "cx600",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v600r001",
         },
         {
            model: "cx600",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v600r002",
         },
         {
            model: "cx600",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v600r003",
         },
         {
            model: "e200e-b",
            scope: "lte",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r005c01",
         },
         {
            model: "e200e-c",
            scope: "lte",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "e200e-x1",
            scope: "lte",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r005c01",
         },
         {
            model: "e200e-x2",
            scope: "lte",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r005c01",
         },
         {
            model: "eudemon1000",
            scope: "lte",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r006c02",
         },
         {
            model: "eudemon1000e-u",
            scope: "lte",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "eudemon1000e-x",
            scope: "lte",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r002",
         },
         {
            model: "eudemon100e",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r007",
         },
         {
            model: "eudemon200",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "eudemon300",
            scope: "lte",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r006c02",
         },
         {
            model: "eudemon500",
            scope: "lte",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r006c02",
         },
         {
            model: "eudemon8000e-x",
            scope: "lte",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001c00spc600",
         },
         {
            model: "ma5200g",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r003",
         },
         {
            model: "ma5200g",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v300r003",
         },
         {
            model: "me60",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r005",
         },
         {
            model: "me60",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "me60",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v600r002",
         },
         {
            model: "me60",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v600r003",
         },
         {
            model: "me60",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v600r005c00spc600",
         },
         {
            model: "ne20",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r005",
         },
         {
            model: "ne40",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v300r005",
         },
         {
            model: "ne40e",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v600r001",
         },
         {
            model: "ne5000e",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v300r007",
         },
         {
            model: "ne5000e",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v800r002",
         },
         {
            model: "ne80",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v300r005",
         },
         {
            model: "ne80e",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v600r001",
         },
         {
            model: "ne80e",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v600r002",
         },
         {
            model: "ne80e",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v600r003",
         },
         {
            model: "nip100",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r001",
         },
         {
            model: "nip1000",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r001",
         },
         {
            model: "nip200",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r001",
         },
         {
            model: "nip2100",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r001c00",
         },
         {
            model: "nip2200",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r001c00",
         },
         {
            model: "nip5100",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r001c00",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r002",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r003",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r005",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "s3300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r002",
         },
         {
            model: "s3300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r003",
         },
         {
            model: "s3300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r005",
         },
         {
            model: "s3300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "s3300hi",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "s3300hi",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "s3700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r005",
         },
         {
            model: "s3700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "s3700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r002",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r003",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r005",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "s5300hi",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "s5300hi",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "s5306",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "s5306",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r005",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r003",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r001",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r002",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r003",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "svn2000",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "svn3000",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r002c02spc802b041",
         },
         {
            model: "svn5000",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "svn5300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r001c01b019",
         },
         {
            model: "wlan ac 6605",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "wlan ac 6605",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001c00spc100",
         },
         {
            model: "cx600",
            scope: null,
            trust: 1.2,
            vendor: "huawei",
            version: null,
         },
         {
            model: "eudemon 8160e",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v100r003c00",
         },
         {
            model: "eudemon usg5500",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v200r002",
         },
         {
            model: "e200x3",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            "model": "h3c ar\\",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "r2209",
         },
         {
            model: "ar 19\\/29\\/49",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "r2207",
         },
         {
            model: "e200x7",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "e200 usg2200",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "eudemon usg9500",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc600",
         },
         {
            model: "e200 usg5100",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "eudemon usg5300",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "ne40e\\/80e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v600r002",
         },
         {
            model: "eudemon 8080e",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v100r003c00",
         },
         {
            model: "e200e-usg2100",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v100r005c01",
         },
         {
            model: "ne40e\\/80e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v600r003",
         },
         {
            model: "e200x5",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "ne40e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v300r005",
         },
         {
            model: "ne20e-x6",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v300r005",
         },
         {
            model: "eudemon usg9300",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v100r003c00",
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar 19/29/49",
            scope: "lte",
            trust: 0.8,
            vendor: "huawei",
            version: "r2207",
         },
         {
            model: "e200e-x3",
            scope: "lte",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "e200e-x5",
            scope: "lte",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "e200e-x7",
            scope: "lte",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "e200e/usg2100",
            scope: "lte",
            trust: 0.8,
            vendor: "huawei",
            version: "v100r005c01",
         },
         {
            model: "e200e/usg2200",
            scope: "lte",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "e200e/usg5100",
            scope: "lte",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "eudemon8080e",
            scope: "lte",
            trust: 0.8,
            vendor: "huawei",
            version: "v100r003c00",
         },
         {
            model: "eudemon8160e",
            scope: "lte",
            trust: 0.8,
            vendor: "huawei",
            version: "v100r003c00",
         },
         {
            model: "eudemonusg5300",
            scope: "lte",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "eudemonusg5500",
            scope: "lte",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r002",
         },
         {
            model: "eudemonusg9300",
            scope: "lte",
            trust: 0.8,
            vendor: "huawei",
            version: "v100r003c00",
         },
         {
            model: "eudemonusg9500",
            scope: "lte",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r001c00spc600",
         },
         {
            model: "h3c ar",
            scope: "lte",
            trust: 0.8,
            vendor: "huawei",
            version: "ar x9 series r2209",
         },
         {
            model: "ne20e-x6",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v600r003",
         },
         {
            model: "ne40e",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v300r003",
         },
         {
            model: "ne40e",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v600r002",
         },
         {
            model: "ne40e",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v600r003",
         },
         {
            model: "ne40e/80e",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v300r003",
         },
         {
            model: "ne40e/80e",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v600r001",
         },
         {
            model: "ne40e/80e",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v600r002",
         },
         {
            model: "ne40e/80e",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v600r003",
         },
         {
            model: "ne80e",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v300r003",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v100r005",
         },
         {
            model: "ne5000e v300r007",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ne5000e v800r002",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ma5200g v200r003",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ma5200g v300r003",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ne40e/80e",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "atn v200r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "atn v200r001c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ne40/ne80 v300r005",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ne20e-x6 v600r003",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ne20 v200r005",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "me60",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "cx200/cx300 v100r005",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "acu v100r003c01spc100",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "acu v200r001c00spc100",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "acu v200r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "wlan ac v200r001c00",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "6605",
         },
         {
            model: "wlan ac v200r001c00spc100",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "6605",
         },
         {
            model: "s9300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300/s3300/s5300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300/s3300/s5300/s2700/s3 v100r005",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300/s3300/s5300/s3300hi/ v100r006",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s3300hi/s5300hi/s5306/s630 v200r001",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar g3 v200r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar g3 v200r001c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar g3 v200r002c00spc200",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "h3c ar ar series r2209",
            scope: "lte",
            trust: 0.6,
            vendor: "huawei",
            version: "<=x9",
         },
         {
            model: "ar r2207",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "19/29/49<=",
         },
         {
            model: "eudemon100e v200r007",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "eudemon200 v200r001",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "eudemon300&500&1000 v200r006c02",
            scope: "lte",
            trust: 0.6,
            vendor: "huawei",
            version: "<=",
         },
         {
            model: "eudemon1000e-u/usg5300 v200r001",
            scope: "lte",
            trust: 0.6,
            vendor: "huawei",
            version: "<=",
         },
         {
            model: "eudemon1000e-x/usg5500 v200r002",
            scope: "lte",
            trust: 0.6,
            vendor: "huawei",
            version: "<=",
         },
         {
            model: "eudemon8080e&8160e/usg9300 v100r003c00",
            scope: "lte",
            trust: 0.6,
            vendor: "huawei",
            version: "<=",
         },
         {
            model: "eudemon8000e-x/usg9500 v200r001c00spc600",
            scope: "lte",
            trust: 0.6,
            vendor: "huawei",
            version: "<=",
         },
         {
            model: "e200e-c&x3&x5&x7/usg2200&5100 v200r003c00",
            scope: "lte",
            trust: 0.6,
            vendor: "huawei",
            version: "<=",
         },
         {
            model: "e200e-b&x1&x2/usg2100 v100r005c01",
            scope: "lte",
            trust: 0.6,
            vendor: "huawei",
            version: "<=",
         },
         {
            model: "svn5300 v100r001c01b019",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "svn2000&5000 series v200r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "svn3000 v100r002c02spc802b041",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "nip100/200/1000 v100r001",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "nip2100&2200&5100 v100r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "quidway series",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "quidway series",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "0",
         },
         {
            model: "me60 v600r002c07",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "cx600 v600r003c00spc900",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "cx600 v600r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar r2207",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "19/29/49",
         },
         {
            model: "me60 v600r005c00spc900",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "cx600 v600r005c00spc900",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "cx600 v600r003c00spca00",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar r2209",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: "19/29/49",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#948096",
         },
         {
            db: "CNVD",
            id: "CNVD-2013-08074",
         },
         {
            db: "CNVD",
            id: "CNVD-2012-6517",
         },
         {
            db: "BID",
            id: "56510",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2012-006004",
         },
         {
            db: "NVD",
            id: "CVE-2012-4960",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:ma5200g:v300r003:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:ma5200g:v200r003:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:ne40e:v300r005:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:atn:v200r001c00:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:atn:v200r001c01:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:me60:v600r002:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:me60:v600r003:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:cx300:v100r005:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:acu:v100r003c01spc100:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:acu:v200r001c00spc100:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s9300:v100r006:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s7700:v100r003:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s5300:v100r003:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s2300:v100r005:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s3300hi:v100r006:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s5300hi:v100r006:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s3300hi:v200r001:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s5300hi:v200r001:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:ar_g3:v200r001c01:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:ar_g3:v200r002c00spc200:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:eudemon_usg5500:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "v200r002",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:eudemon_8160e:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "v100r003c00",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:e200x5:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "v200r003c00",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:e200x7:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "v200r003c00",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:h3c_ar\\(oem_in\\):*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "r2209",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:eudemon500:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "v200r006c02",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:svn3000:v100r002c02spc802b041:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:svn5000:v200r001c00:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:ne40e:v600r001:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:ne80e:v600r001:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:ne40:v300r005:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:ne80:v300r005:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:me60:v600r005c00spc600:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:cx600:v200r002:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:acu:v200r001c00:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:wlan_ac_6605:v200r001c00:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s7700:v100r006:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s2300:v100r002:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s3300:v100r005:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s5300:v100r005:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s5306:v100r006:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s6300:v100r006:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s5306:v200r001:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s6300:v200r001:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:ar_19\\/29\\/49:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "r2207",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:eudemon100e:v200r007:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:eudemon_8080e:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "v100r003c00",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:eudemon_usg9300:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "v100r003c00",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:e200_usg2200:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "v200r003c00",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:e200_usg5100:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "v200r003c00",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:eudemon1000:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "v200r006c02",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:nip5100:v100r001c00:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:nip2200:v100r001c00:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:svn2000:v200r001c00:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:svn5300:v100r001c01b019:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:ne40e\\/80e:v600r002:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:ne80e:v600r002:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:ne20e-x6:v300r005:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:ne20:v200r005:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:cx600:v600r001:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:cx600:v600r002:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:wlan_ac_6605:v200r001c00spc100:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s9300:v100r001:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s2300:v100r003:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s3300:v100r002:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s3700:v100r005:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s5700:v100r005:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s2700:v100r006:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s3700:v100r006:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s3700:v200r001:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s5700:v200r001:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:eudemon200:v200r001:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:eudemon300:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "v200r006c02",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:eudemon1000e-u:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "v200r001",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:eudemon8000e-x:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "v200r001c00spc600",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:eudemon_usg9500:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "v200r001c00spc600",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:e200e-b:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "v100r005c01",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:e200e-x1:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "v100r005c01",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:nip2100:v100r001c00:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:nip1000:v100r001:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:ne5000e:v300r007:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:ne5000e:v800r002:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:ne40e\\/80e:v600r003:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:ne80e:v600r003:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:me60:v100r005:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:me60:v100r006:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:cx600:v600r003:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:cx200:v100r005:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s9300:v100r002:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s9300:v100r003:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s3300:v100r003:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s5300:v100r002:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s2300:v100r006:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s3300:v100r006:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s5300:v100r006:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s5700:v100r006:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s6700:v100r006:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s6700:v200r001:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:ar_g3:v200r001c00:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:eudemon_usg5300:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "v200r001",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:eudemon1000e-x:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "v200r002",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:e200e-c:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "v200r003c00",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:e200x3:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "v200r003c00",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:e200e-x2:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "v100r005c01",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:e200e-usg2100:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "v100r005c01",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:nip200:v100r001:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:nip100:v100r001:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2012-4960",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Roberto Paleari and Ivan Speziale from Emaze Networks",
      sources: [
         {
            db: "BID",
            id: "56510",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201211-280",
         },
      ],
      trust: 0.9,
   },
   cve: "CVE-2012-4960",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6.5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8,
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:S/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  availabilityRequirement: "NOT DEFINED",
                  baseScore: 6.5,
                  collateralDamagePotential: "LOW-MEDIUM",
                  confidentialityImpact: "PARTIAL",
                  confidentialityRequirement: "NOT DEFINED",
                  enviromentalScore: 5.1,
                  exploitability: "FUNCTIONAL",
                  exploitabilityScore: 8,
                  id: "CVE-2012-4960",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  integrityRequirement: "NOT DEFINED",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  remediationLevel: "OFFICIAL FIX",
                  reportConfidence: "CONFIRMED",
                  severity: "MEDIUM",
                  targetDistribution: "MEDIUM",
                  trust: 0.8,
                  userInterationRequired: null,
                  vector_string: "AV:N/AC:L/Au:S/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "Single",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 6.5,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2012-4960",
                  impactScore: null,
                  integrityImpact: "Partial",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:S/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "CNVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6.5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8,
                  id: "CNVD-2013-08074",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:S/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "VULHUB",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6.5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8,
                  id: "VHN-58241",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:S/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2012-4960",
                  trust: 2.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2013-08074",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201306-403",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-58241",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#948096",
         },
         {
            db: "CNVD",
            id: "CNVD-2013-08074",
         },
         {
            db: "VULHUB",
            id: "VHN-58241",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2012-006004",
         },
         {
            db: "NVD",
            id: "CVE-2012-4960",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201306-403",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack. Huawei networking equipment use a DES encryption algorithm for password and encryption. DES is publicly known to be easily cracked. plural Huawei The product uses the stored password DES Because of the use of the algorithm, a vulnerability exists in which a plaintext password is obtained.Brute force attack by attacker (Brute force attack) You may be able to get a plaintext password via. Huawei is the world's leading provider of information and communication solutions. Huawei Quidway is a series of switches developed by Huawei. The Huawei CX600 is based on Huawei's mature VRP platform and has powerful routing, L2/L3 multicast, 5-level H-QoS, packet buffering, and ACL capabilities. Multiple Huawei products are prone to a weak password encryption weakness. \nSuccessful exploits may allow an attacker to decrypt stored passwords; this may aid in further attacks. \nThe following are vulnerable:\nHuawei Quidway series\nHuawei CX600 V600R001\nHuawei CX600 V600R003C00SPC900\nHuawei ME60 V600R002C07 and prior versions\nAR 19/29/49 R2207 and prior versions. Weak password encryption on Huawei products\n===========================================\n\n[ADVISORY INFORMATION]\nTitle:\t\tWeak password encryption on Huawei products\nRelease date:   13/11/2012\nCredits: \tRoberto Paleari, Emaze Networks (roberto.paleari@emaze.net)\n\t\tIvan Speziale,   Emaze Networks (ivan.speziale@emaze.net)\n\n[VULNERABILITY INFORMATION]\nClass: \t        Information disclosure\n\n[AFFECTED PRODUCTS]\nWe confirm the presence of this security vulnerability on the following\nproducts:\n   * Huawei Quidway series\n   * Huawei CX600\n\nOther models are probably also vulnerable, but they were not checked. As a consequence, passwords extracted from a\nvictim's device can be deciphered instantaneously. \n\nA Python procedure that decodes a given password is included below. Upon\ntermination, procedure decrypt_password() returns the clear-text password. \n\n<cut>\nfrom Crypto.Cipher import DES\n\ndef decode_char(c):\n    if c == 'a':\n        r = '?'\n    else:\n        r = c\n    return ord(r) - ord('!')\n\ndef ascii_to_binary(s):\n    assert len(s) == 24\n\n    out = [0]*18\n    i = 0\n    j = 0\n\n    for i in range(0, len(s), 4):\n        y = decode_char(s[i + 0])\n        y = (y << 6) & 0xffffff\n\n        k = decode_char(s[i + 1])\n        y = (y | k) & 0xffffff\n        y = (y << 6) & 0xffffff\n\n        k = decode_char(s[i + 2])\n        y = (y | k) & 0xffffff\n        y = (y << 6) & 0xffffff\n\n        k = decode_char(s[i + 3])\n        y = (y | k) & 0xffffff\n\n        out[j+2] = chr(y       & 0xff)\n        out[j+1] = chr((y>>8)  & 0xff)\n        out[j+0] = chr((y>>16) & 0xff)\n\n        j += 3\n\n    return \"\".join(out)\n\ndef decrypt_password(p):\n    r = ascii_to_binary(p)\n\n    r = r[:16]\n\n    d = DES.new(\"\\x01\\x02\\x03\\x04\\x05\\x06\\x07\\x08\", DES.MODE_ECB)\n    r = d.decrypt(r)\n\n    return r.rstrip(\"\\x00\")\n</cut>\n\n\n[REMEDIATION] \nWe recommend to store passwords using a proper hashing algorithm, instead of\nleveraging symmetric encryption. Further details are available at the following URL:\nhttp://support.huawei.com/enterprise/ReadLatestNewsAction.action?contentId=NEWS1000001141\n\n[COPYRIGHT]\nCopyright(c) Emaze Networks S.p.A 2012, All rights reserved worldwide. \nPermission is hereby granted to redistribute this advisory, providing that no\nchanges are made and that the copyright notices and disclaimers remain intact. \n\n[DISCLAIMER]\nEmaze Networks S.p.A is not responsible for the misuse of the information\nprovided in our security advisories. These advisories are a service to the\nprofessional security community. There are NO WARRANTIES with regard to this\ninformation. Any application or distribution of this information constitutes\nacceptance AS IS, at the user's own risk. This information is subject to change\nwithout notice",
      sources: [
         {
            db: "NVD",
            id: "CVE-2012-4960",
         },
         {
            db: "CERT/CC",
            id: "VU#948096",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2012-006004",
         },
         {
            db: "CNVD",
            id: "CNVD-2013-08074",
         },
         {
            db: "CNVD",
            id: "CNVD-2012-6517",
         },
         {
            db: "BID",
            id: "56510",
         },
         {
            db: "VULHUB",
            id: "VHN-58241",
         },
         {
            db: "PACKETSTORM",
            id: "118054",
         },
      ],
      trust: 3.87,
   },
   exploit_availability: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            reference: "https://www.scap.org.cn/vuln/vhn-58241",
            trust: 0.1,
            type: "unknown",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-58241",
         },
      ],
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2012-4960",
            trust: 4.2,
         },
         {
            db: "CERT/CC",
            id: "VU#948096",
            trust: 2.7,
         },
         {
            db: "BID",
            id: "56510",
            trust: 1.6,
         },
         {
            db: "JVN",
            id: "JVNVU90202792",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2012-006004",
            trust: 0.8,
         },
         {
            db: "PACKETSTORM",
            id: "118054",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2013-08074",
            trust: 0.6,
         },
         {
            db: "CNVD",
            id: "CNVD-2012-6517",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201211-280",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201306-403",
            trust: 0.6,
         },
         {
            db: "EXPLOIT-DB",
            id: "38020",
            trust: 0.1,
         },
         {
            db: "VULHUB",
            id: "VHN-58241",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#948096",
         },
         {
            db: "CNVD",
            id: "CNVD-2013-08074",
         },
         {
            db: "CNVD",
            id: "CNVD-2012-6517",
         },
         {
            db: "VULHUB",
            id: "VHN-58241",
         },
         {
            db: "BID",
            id: "56510",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2012-006004",
         },
         {
            db: "PACKETSTORM",
            id: "118054",
         },
         {
            db: "NVD",
            id: "CVE-2012-4960",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201211-280",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201306-403",
         },
      ],
   },
   id: "VAR-201306-0006",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2013-08074",
         },
         {
            db: "CNVD",
            id: "CNVD-2012-6517",
         },
         {
            db: "VULHUB",
            id: "VHN-58241",
         },
      ],
      trust: 2.164663294642857,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 1.2,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2013-08074",
         },
         {
            db: "CNVD",
            id: "CNVD-2012-6517",
         },
      ],
   },
   last_update_date: "2023-12-18T13:44:36.277000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Huawei-SA-20120827-01-CX600",
            trust: 0.8,
            url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm",
         },
         {
            title: "Huawei multiple product encryption is not a strong vulnerability patch",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/34800",
         },
         {
            title: "Huawei patch for multiple product password encryption vulnerabilities",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/25088",
         },
         {
            title: "Huawei Fixing measures for vulnerabilities of encryption problems in many products",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=170984",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2013-08074",
         },
         {
            db: "CNVD",
            id: "CNVD-2012-6517",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2012-006004",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201306-403",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-310",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-58241",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2012-006004",
         },
         {
            db: "NVD",
            id: "CVE-2012-4960",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.3,
            url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm",
         },
         {
            trust: 1.9,
            url: "http://www.kb.cert.org/vuls/id/948096",
         },
         {
            trust: 0.8,
            url: "about vulnerability notes",
         },
         {
            trust: 0.8,
            url: "contact us about this vulnerability",
         },
         {
            trust: 0.8,
            url: "provide a vendor statement",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-4960",
         },
         {
            trust: 0.8,
            url: "http://jvn.jp/cert/jvnvu90202792/index.html",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-4960",
         },
         {
            trust: 0.6,
            url: "http://packetstormsecurity.org/files/118054/huawei-weak-password-encryption.html",
         },
         {
            trust: 0.6,
            url: "http://www.securityfocus.com/bid/56510",
         },
         {
            trust: 0.4,
            url: "http://support.huawei.com/enterprise/readlatestnewsaction.action?contentid=news1000001141",
         },
         {
            trust: 0.3,
            url: "http://www.huawei.com/",
         },
         {
            trust: 0.3,
            url: "msg://bugtraq/201211130911.qad9ba1q022014@sf01web1.securityfocus.com",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#948096",
         },
         {
            db: "CNVD",
            id: "CNVD-2013-08074",
         },
         {
            db: "CNVD",
            id: "CNVD-2012-6517",
         },
         {
            db: "VULHUB",
            id: "VHN-58241",
         },
         {
            db: "BID",
            id: "56510",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2012-006004",
         },
         {
            db: "PACKETSTORM",
            id: "118054",
         },
         {
            db: "NVD",
            id: "CVE-2012-4960",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201211-280",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201306-403",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#948096",
         },
         {
            db: "CNVD",
            id: "CNVD-2013-08074",
         },
         {
            db: "CNVD",
            id: "CNVD-2012-6517",
         },
         {
            db: "VULHUB",
            id: "VHN-58241",
         },
         {
            db: "BID",
            id: "56510",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2012-006004",
         },
         {
            db: "PACKETSTORM",
            id: "118054",
         },
         {
            db: "NVD",
            id: "CVE-2012-4960",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201211-280",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201306-403",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2013-08-05T00:00:00",
            db: "CERT/CC",
            id: "VU#948096",
         },
         {
            date: "2013-06-25T00:00:00",
            db: "CNVD",
            id: "CNVD-2013-08074",
         },
         {
            date: "2012-11-16T00:00:00",
            db: "CNVD",
            id: "CNVD-2012-6517",
         },
         {
            date: "2013-06-20T00:00:00",
            db: "VULHUB",
            id: "VHN-58241",
         },
         {
            date: "2012-11-13T00:00:00",
            db: "BID",
            id: "56510",
         },
         {
            date: "2013-06-24T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2012-006004",
         },
         {
            date: "2012-11-13T23:22:55",
            db: "PACKETSTORM",
            id: "118054",
         },
         {
            date: "2013-06-20T15:55:00.897000",
            db: "NVD",
            id: "CVE-2012-4960",
         },
         {
            date: "2012-11-16T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201211-280",
         },
         {
            date: "2013-06-26T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201306-403",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2013-10-03T00:00:00",
            db: "CERT/CC",
            id: "VU#948096",
         },
         {
            date: "2013-07-01T00:00:00",
            db: "CNVD",
            id: "CNVD-2013-08074",
         },
         {
            date: "2012-11-16T00:00:00",
            db: "CNVD",
            id: "CNVD-2012-6517",
         },
         {
            date: "2013-08-22T00:00:00",
            db: "VULHUB",
            id: "VHN-58241",
         },
         {
            date: "2015-03-19T08:28:00",
            db: "BID",
            id: "56510",
         },
         {
            date: "2013-08-09T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2012-006004",
         },
         {
            date: "2013-08-22T03:59:17.713000",
            db: "NVD",
            id: "CVE-2012-4960",
         },
         {
            date: "2012-12-05T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201211-280",
         },
         {
            date: "2021-11-24T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201306-403",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201211-280",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201306-403",
         },
      ],
      trust: 1.2,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Huawei networking equipment weak password cipher",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#948096",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "encryption problem",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201211-280",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201306-403",
         },
      ],
      trust: 1.2,
   },
}

Vulnerability from fkie_nvd
Published
2013-06-20 15:55
Modified
2024-11-21 01:43
Severity ?
Summary
The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack.
Impacted products
Vendor Product Version
huawei acu v100r003c01spc100
huawei acu v200r001c00
huawei acu v200r001c00spc100
huawei ar_19\/29\/49 *
huawei ar_g3 v200r001c00
huawei ar_g3 v200r001c01
huawei ar_g3 v200r002c00spc200
huawei atn v200r001c00
huawei atn v200r001c01
huawei cx200 v100r005
huawei cx300 v100r005
huawei cx600 v200r002
huawei cx600 v600r001
huawei cx600 v600r002
huawei cx600 v600r003
huawei e200_usg2200 *
huawei e200_usg5100 *
huawei e200e-b *
huawei e200e-c *
huawei e200e-usg2100 *
huawei e200e-x1 *
huawei e200e-x2 *
huawei e200x3 *
huawei e200x5 *
huawei e200x7 *
huawei eudemon_8080e *
huawei eudemon_8160e *
huawei eudemon_usg5300 *
huawei eudemon_usg5500 *
huawei eudemon_usg9300 *
huawei eudemon_usg9500 *
huawei eudemon1000 *
huawei eudemon1000e-u *
huawei eudemon1000e-x *
huawei eudemon100e v200r007
huawei eudemon200 v200r001
huawei eudemon300 *
huawei eudemon500 *
huawei eudemon8000e-x *
huawei h3c_ar\(oem_in\) *
huawei ma5200g v200r003
huawei ma5200g v300r003
huawei me60 v100r005
huawei me60 v100r006
huawei me60 v600r002
huawei me60 v600r003
huawei me60 v600r005c00spc600
huawei ne20 v200r005
huawei ne20e-x6 v300r005
huawei ne40 v300r005
huawei ne40e v300r005
huawei ne40e v600r001
huawei ne40e\/80e v600r002
huawei ne40e\/80e v600r003
huawei ne5000e v300r007
huawei ne5000e v800r002
huawei ne80 v300r005
huawei ne80e v600r001
huawei ne80e v600r002
huawei ne80e v600r003
huawei nip100 v100r001
huawei nip1000 v100r001
huawei nip200 v100r001
huawei nip2100 v100r001c00
huawei nip2200 v100r001c00
huawei nip5100 v100r001c00
huawei s2300 v100r002
huawei s2300 v100r003
huawei s2300 v100r005
huawei s2300 v100r006
huawei s2700 v100r006
huawei s3300 v100r002
huawei s3300 v100r003
huawei s3300 v100r005
huawei s3300 v100r006
huawei s3300hi v100r006
huawei s3300hi v200r001
huawei s3700 v100r005
huawei s3700 v100r006
huawei s3700 v200r001
huawei s5300 v100r002
huawei s5300 v100r003
huawei s5300 v100r005
huawei s5300 v100r006
huawei s5300hi v100r006
huawei s5300hi v200r001
huawei s5306 v100r006
huawei s5306 v200r001
huawei s5700 v100r005
huawei s5700 v100r006
huawei s5700 v200r001
huawei s6300 v100r006
huawei s6300 v200r001
huawei s6700 v100r006
huawei s6700 v200r001
huawei s7700 v100r003
huawei s7700 v100r006
huawei s9300 v100r001
huawei s9300 v100r002
huawei s9300 v100r003
huawei s9300 v100r006
huawei svn2000 v200r001c00
huawei svn3000 v100r002c02spc802b041
huawei svn5000 v200r001c00
huawei svn5300 v100r001c01b019
huawei wlan_ac_6605 v200r001c00
huawei wlan_ac_6605 v200r001c00spc100



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:acu:v100r003c01spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE81EA02-600F-42CE-92C8-7E1D127E9B7C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:acu:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A906E7E-7A10-474B-91C4-A30F7FAF55D8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:acu:v200r001c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5D1A17D-1CDD-4539-897E-A6067EAD1EE2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:ar_19\\/29\\/49:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "82396118-3290-4683-902D-4955E81B84F9",
                     versionEndIncluding: "r2207",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:ar_g3:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B19CE2AB-251D-478A-913C-65B5E0BBA0B5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:ar_g3:v200r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "18BA268A-EF28-477C-AC24-38E322FFE553",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:ar_g3:v200r002c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "554B2AC0-F4C6-4805-BB39-642D6D292A97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:atn:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BB1A47C-FB4F-4EF8-A614-95F3B2E6065D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:atn:v200r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "C26B81D9-0A62-4F6E-A9A4-5B22F08E0882",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:cx200:v100r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "A24ECC75-1032-4DFD-A0C3-315ABB68C50F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:cx300:v100r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F9BA9C4-65A8-4D9D-A21C-CEB53DB2E513",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:cx600:v200r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "D71F25CF-F4DE-4FC5-82E9-179CFFA4CA61",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:cx600:v600r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D94D86A-C025-4A96-A700-D676B90CBBF7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:cx600:v600r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F61F187-74C5-4C50-9F91-6303C87582B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:cx600:v600r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB2B2269-0784-4DE2-B48A-9A36F9B30F96",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:e200_usg2200:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9151ED5E-04DD-4221-9669-C8112168A507",
                     versionEndIncluding: "v200r003c00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:e200_usg5100:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F63E41F8-8408-4E7A-A423-ACC2C44B3141",
                     versionEndIncluding: "v200r003c00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:e200e-b:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8235FC6D-220F-4F75-BDD2-77FA661F33A2",
                     versionEndIncluding: "v100r005c01",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:e200e-c:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "04FF6514-05AF-4D86-9B10-B50BC8D0622D",
                     versionEndIncluding: "v200r003c00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:e200e-usg2100:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D14FD9A2-90D5-493C-9BC7-095EBD644114",
                     versionEndIncluding: "v100r005c01",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:e200e-x1:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "25B60ADA-D40C-48C5-A237-DEE5DD372933",
                     versionEndIncluding: "v100r005c01",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:e200e-x2:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C3502D88-6168-41E3-8641-4045C9EA9B90",
                     versionEndIncluding: "v100r005c01",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:e200x3:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F6DBFF5-0B0B-4F0D-96A1-D2D487AE57C7",
                     versionEndIncluding: "v200r003c00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:e200x5:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AF99475-D5A4-407E-8A7F-D6642186E5B6",
                     versionEndIncluding: "v200r003c00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:e200x7:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D68DD7D-29F9-460E-9D9C-A70F0DD489B1",
                     versionEndIncluding: "v200r003c00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:eudemon_8080e:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E5A801B9-7BB4-4E06-8ED2-D9EF565F313E",
                     versionEndIncluding: "v100r003c00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:eudemon_8160e:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E9D04EF-A73F-4BF6-AB34-3C489156BBD3",
                     versionEndIncluding: "v100r003c00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:eudemon_usg5300:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3510EF8C-F3EB-4531-A0A8-8E0734652E26",
                     versionEndIncluding: "v200r001",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:eudemon_usg5500:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F08A74A7-65FC-424C-ACAD-B6A6ED27FF60",
                     versionEndIncluding: "v200r002",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:eudemon_usg9300:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "788B8EBF-16FA-4FDD-B07A-5A4F6E6B310A",
                     versionEndIncluding: "v100r003c00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:eudemon_usg9500:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8C625CA3-BD79-42E8-91B4-539E90FBF0C5",
                     versionEndIncluding: "v200r001c00spc600",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:eudemon1000:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AFF18B94-150C-413F-B6D4-47B5E05DF4BA",
                     versionEndIncluding: "v200r006c02",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:eudemon1000e-u:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DBB0AFBD-5F0E-494A-A752-9EE2F81DF2C5",
                     versionEndIncluding: "v200r001",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:eudemon1000e-x:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "11D8297A-362B-4056-A94F-9D49FF0B56B7",
                     versionEndIncluding: "v200r002",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:eudemon100e:v200r007:*:*:*:*:*:*:*",
                     matchCriteriaId: "956ED431-6CE1-4873-BDC3-7832F5867C28",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:eudemon200:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "5679FA9F-B4E5-42A9-9B9A-3601BE785CC4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:eudemon300:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "014E4B7B-E107-40B6-9B18-F5610959EA8B",
                     versionEndIncluding: "v200r006c02",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:eudemon500:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA4ACA-0104-4A93-9FBC-DC0496A1EB70",
                     versionEndIncluding: "v200r006c02",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:eudemon8000e-x:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B686C4E-FD19-42B0-87A5-162D72C47BE0",
                     versionEndIncluding: "v200r001c00spc600",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:h3c_ar\\(oem_in\\):*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FBDEE398-3BC9-4855-952F-44B37BF9F478",
                     versionEndIncluding: "r2209",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:ma5200g:v200r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D17E429-865D-4677-872E-1E191BB0A6DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:ma5200g:v300r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD2ADD48-FBB4-4E65-8486-757D2ADA4DA3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:me60:v100r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "1AF75F78-2B91-47C3-B5AE-F4C9769B5AD8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:me60:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "18496123-2B0E-46D1-88F6-85897B2B65B4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:me60:v600r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0045741-3B14-435E-8B12-B536751DD24F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:me60:v600r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE8094F7-FAB2-4624-B2ED-467B40ADA260",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:me60:v600r005c00spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "4BC19826-AC6E-4DE1-95CA-49D4BB6F6644",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:ne20:v200r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "49D7692F-6EA0-4A5E-B841-2B49332FCC5D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:ne20e-x6:v300r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "C555EAC5-1E45-4BE5-8C69-DB1916A2EBF8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:ne40:v300r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "AFF2311E-D7DE-4C7C-BD88-4B947BD4F8E8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:ne40e:v300r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "B23A5D99-8458-4285-ABF8-FA0D2F49B811",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:ne40e:v600r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "5348DF82-072D-4B3B-9919-B5478420A98F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:ne40e\\/80e:v600r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "54C3C26D-0FD0-48B9-A168-E9C6605DCB0E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:ne40e\\/80e:v600r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D4D3971-B2DA-44EC-97A1-CFF436BF44F6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:ne5000e:v300r007:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDA4A9B6-378D-4F4B-B88D-C13859E6236B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:ne5000e:v800r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF6322F0-0749-4C3D-9144-D92A64B9D5FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:ne80:v300r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "74801C9A-31D1-4E74-9211-9AB67B5FEAB7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:ne80e:v600r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA2D277B-08F0-4F6A-BC99-FBBCA4F5207D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:ne80e:v600r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "A81A4563-15DC-4125-9E3D-5B9FB0360EA2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:ne80e:v600r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "449449A2-28B2-4A9A-A2C9-84A18596AEDF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:nip100:v100r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BE4E8E1-AF7C-49E9-9758-887EFD8CB8F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:nip1000:v100r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "90FF10E6-4080-4186-83DE-37703A468F3E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:nip200:v100r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B0009DF-D44E-4D96-909F-B911D7BA127B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:nip2100:v100r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8CE9794-9A67-4F65-A81A-EE00AE714A88",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:nip2200:v100r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3DC0192-8E8B-4E0C-A91C-92094A167878",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:nip5100:v100r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9317FE4B-95F0-4615-9FA1-683D644BC3E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s2300:v100r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "871BB53D-F86F-4E3D-8DF7-875C8C1C7FDE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s2300:v100r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E655344-8341-4FFA-BBED-F5D5A15759D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s2300:v100r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "662EDAE9-2B0F-4774-8790-2C62997764FC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s2300:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "22621191-B2CD-4BA9-B6F1-8D59850604A6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s2700:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "142335E6-A4F5-4CC4-8D86-835C3E0E5211",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s3300:v100r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF7B5B70-1540-490F-8486-31639DB54F12",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s3300:v100r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "33864641-EB9A-4CCC-9057-26D22AD839BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s3300:v100r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "59AD4C23-6315-4B97-85BB-1074F36F7291",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s3300:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "972BB8A0-27D8-4A0A-865E-57E37F70A484",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s3300hi:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "41435CB4-537C-45DC-B8DB-0C1F38F1D222",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s3300hi:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D5FE313-7374-4D7A-9A01-F389311710C5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s3700:v100r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "7EF096DC-B6F4-4763-AC6B-72CB46AB1976",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s3700:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1171FC3-5A2E-40C6-85FF-AF7E78F96C87",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s3700:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "A706C2B0-5E15-4C90-910F-0ABB65573C93",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s5300:v100r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "2295584A-2664-45AE-BA0C-1B0411F29A13",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s5300:v100r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDA542A3-7BB3-42B6-ACBB-D00AD4AD707A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s5300:v100r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "5361C4C5-BBC5-42FE-A575-985B57EF575E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s5300:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "75A90C9F-8DAE-45B4-BB78-6080A434E5FC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s5300hi:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "175A8714-CD80-472B-9507-829EBC59B805",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s5300hi:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "81195EA9-D62B-492D-AA37-EF7AD17AED7C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s5306:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "47052A6F-E532-42B6-9B4B-46424A1F6377",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s5306:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B22E5AB-DAF6-4020-A62E-BE6FBE57D3DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:v100r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C178B6F-8608-4BBE-A8D8-8798FB1D75E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "29CAD535-0216-4048-BFDA-863AA5425BA9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "9424F3B6-A280-4043-A670-3768D9515631",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s6300:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "4FB869CD-37F8-4E77-8065-B9C8FADED40C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s6300:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "C22B5DE3-03ED-4ED4-BD86-278197FA3FC4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "652F2CCF-41FE-4DEC-8179-FF285AB99E52",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "66149AA8-E897-4563-97EC-C5EDCDBE072B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:v100r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B3F7637-0B4C-40D0-B814-B19F10118795",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "04686A95-05CF-4ACC-89E5-2140DFC423F7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s9300:v100r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "63BB797D-2C82-4A55-A26A-61A6C1C86888",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s9300:v100r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "465F6E51-0676-4443-9122-CB2AD59C7516",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s9300:v100r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "94970073-415B-4358-833F-CC220653376D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s9300:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "F26E31D2-31F8-4D4F-AD3A-44C59B22B121",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:svn2000:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "59513736-11B7-47E6-B5C4-D33F9E032BEC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:svn3000:v100r002c02spc802b041:*:*:*:*:*:*:*",
                     matchCriteriaId: "931A86E3-43C1-4C72-8425-862C33A2DBA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:svn5000:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "15EBA968-C3E0-430E-944D-B4DA30B932C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:svn5300:v100r001c01b019:*:*:*:*:*:*:*",
                     matchCriteriaId: "17A15567-DC96-4513-8681-93CE26B4FA07",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:wlan_ac_6605:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1968B0D3-1653-459A-865D-79DBB9AADEE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:wlan_ac_6605:v200r001c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "7490231F-7FAB-4875-812F-657B7BF4F136",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack.",
      },
      {
         lang: "es",
         value: "Los Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, y NIP5100 utiliza el algoritmo DES para las contraseñas almacenados, lo que hace que sea más fácil para los atacantes dependientes de contexto obtener contraseñas de texto simple a través de un ataque de fuerza bruta.",
      },
   ],
   id: "CVE-2012-4960",
   lastModified: "2024-11-21T01:43:49.593",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "PARTIAL",
               baseScore: 6.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:S/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2013-06-20T15:55:00.897",
   references: [
      {
         source: "cret@cert.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm",
      },
      {
         source: "cret@cert.org",
         tags: [
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/948096",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/948096",
      },
   ],
   sourceIdentifier: "cret@cert.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-310",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

cve-2012-4960
Vulnerability from cvelistv5
Published
2013-06-20 15:00
Modified
2024-08-06 20:50
Severity ?
Summary
The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T20:50:18.270Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "VU#948096",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "http://www.kb.cert.org/vuls/id/948096",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2012-12-17T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2013-08-22T09:00:00",
            orgId: "37e5125f-f79b-445b-8fad-9564f167944b",
            shortName: "certcc",
         },
         references: [
            {
               name: "VU#948096",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "http://www.kb.cert.org/vuls/id/948096",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cert@cert.org",
               ID: "CVE-2012-4960",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "VU#948096",
                     refsource: "CERT-VN",
                     url: "http://www.kb.cert.org/vuls/id/948096",
                  },
                  {
                     name: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "37e5125f-f79b-445b-8fad-9564f167944b",
      assignerShortName: "certcc",
      cveId: "CVE-2012-4960",
      datePublished: "2013-06-20T15:00:00",
      dateReserved: "2012-09-17T00:00:00",
      dateUpdated: "2024-08-06T20:50:18.270Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}