Vulnerabilites related to huawei - rh2268_v2_firmware
cve-2019-0708
Vulnerability from cvelistv5
Published
2019-05-16 18:17
Modified
2024-08-04 17:51
Severity ?
EPSS score ?
Summary
A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability'.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows |
Version: 7 for 32-bit Systems Service Pack 1 Version: 7 for x64-based Systems Service Pack 1 |
||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T17:51:27.186Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-932041.pdf", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-616199.pdf", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-433987.pdf", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-832947.pdf", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-166360.pdf", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-406175.pdf", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190529-01-windows-en", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-notices/huawei-sn-20190515-01-windows-en", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/153133/Microsoft-Windows-Remote-Desktop-BlueKeep-Denial-Of-Service.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/153627/Microsoft-Windows-RDP-BlueKeep-Denial-Of-Service.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/154579/BlueKeep-RDP-Remote-Windows-Kernel-Use-After-Free.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/155389/Microsoft-Windows-7-x86-BlueKeep-RDP-Use-After-Free.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/162960/Microsoft-RDP-Remote-Code-Execution.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Windows", vendor: "Microsoft", versions: [ { status: "affected", version: "7 for 32-bit Systems Service Pack 1", }, { status: "affected", version: "7 for x64-based Systems Service Pack 1", }, ], }, { product: "Windows Server", vendor: "Microsoft", versions: [ { status: "affected", version: "2008 R2 for x64-based Systems Service Pack 1 (Core installation)", }, { status: "affected", version: "2008 R2 for Itanium-Based Systems Service Pack 1", }, { status: "affected", version: "2008 R2 for x64-based Systems Service Pack 1", }, { status: "affected", version: "2008 for 32-bit Systems Service Pack 2 (Core installation)", }, { status: "affected", version: "2008 for Itanium-Based Systems Service Pack 2", }, { status: "affected", version: "2008 for 32-bit Systems Service Pack 2", }, { status: "affected", version: "2008 for x64-based Systems Service Pack 2", }, { status: "affected", version: "2008 for x64-based Systems Service Pack 2 (Core installation)", }, ], }, ], descriptions: [ { lang: "en", value: "A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability'.", }, ], problemTypes: [ { descriptions: [ { description: "Remote Code Execution", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-06-03T17:06:16", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-932041.pdf", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-616199.pdf", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-433987.pdf", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-832947.pdf", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-166360.pdf", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-406175.pdf", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190529-01-windows-en", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-notices/huawei-sn-20190515-01-windows-en", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/153133/Microsoft-Windows-Remote-Desktop-BlueKeep-Denial-Of-Service.html", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/153627/Microsoft-Windows-RDP-BlueKeep-Denial-Of-Service.html", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/154579/BlueKeep-RDP-Remote-Windows-Kernel-Use-After-Free.html", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/155389/Microsoft-Windows-7-x86-BlueKeep-RDP-Use-After-Free.html", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/162960/Microsoft-RDP-Remote-Code-Execution.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@microsoft.com", ID: "CVE-2019-0708", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Windows", version: { version_data: [ { version_value: "7 for 32-bit Systems Service Pack 1", }, { version_value: "7 for x64-based Systems Service Pack 1", }, ], }, }, { product_name: "Windows Server", version: { version_data: [ { version_value: "2008 R2 for x64-based Systems Service Pack 1 (Core installation)", }, { version_value: "2008 R2 for Itanium-Based Systems Service Pack 1", }, { version_value: "2008 R2 for x64-based Systems Service Pack 1", }, { version_value: "2008 for 32-bit Systems Service Pack 2 (Core installation)", }, { version_value: "2008 for Itanium-Based Systems Service Pack 2", }, { version_value: "2008 for 32-bit Systems Service Pack 2", }, { version_value: "2008 for x64-based Systems Service Pack 2", }, { version_value: "2008 for x64-based Systems Service Pack 2 (Core installation)", }, ], }, }, ], }, vendor_name: "Microsoft", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability'.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Remote Code Execution", }, ], }, ], }, references: { reference_data: [ { name: "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708", refsource: "MISC", url: "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-932041.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-932041.pdf", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-616199.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-616199.pdf", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-433987.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-433987.pdf", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-832947.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-832947.pdf", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-166360.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-166360.pdf", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-406175.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-406175.pdf", }, { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190529-01-windows-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190529-01-windows-en", }, { name: "http://www.huawei.com/en/psirt/security-notices/huawei-sn-20190515-01-windows-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-notices/huawei-sn-20190515-01-windows-en", }, { name: "http://packetstormsecurity.com/files/153133/Microsoft-Windows-Remote-Desktop-BlueKeep-Denial-Of-Service.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/153133/Microsoft-Windows-Remote-Desktop-BlueKeep-Denial-Of-Service.html", }, { name: "http://packetstormsecurity.com/files/153627/Microsoft-Windows-RDP-BlueKeep-Denial-Of-Service.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/153627/Microsoft-Windows-RDP-BlueKeep-Denial-Of-Service.html", }, { name: "http://packetstormsecurity.com/files/154579/BlueKeep-RDP-Remote-Windows-Kernel-Use-After-Free.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/154579/BlueKeep-RDP-Remote-Windows-Kernel-Use-After-Free.html", }, { name: "http://packetstormsecurity.com/files/155389/Microsoft-Windows-7-x86-BlueKeep-RDP-Use-After-Free.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/155389/Microsoft-Windows-7-x86-BlueKeep-RDP-Use-After-Free.html", }, { name: "http://packetstormsecurity.com/files/162960/Microsoft-RDP-Remote-Code-Execution.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/162960/Microsoft-RDP-Remote-Code-Execution.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2019-0708", datePublished: "2019-05-16T18:17:00", dateReserved: "2018-11-26T00:00:00", dateUpdated: "2024-08-04T17:51:27.186Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Vulnerability from fkie_nvd
Published
2019-05-16 19:29
Modified
2024-11-21 04:17
Severity ?
Summary
A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability'.
References
Impacted products
{ cisaActionDue: "2022-05-03", cisaExploitAdd: "2021-11-03", cisaRequiredAction: "Apply updates per vendor instructions.", cisaVulnerabilityName: "Microsoft Remote Desktop Services Remote Code Execution Vulnerability", configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", matchCriteriaId: "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", matchCriteriaId: "5F422A8C-2C4E-42C8-B420-E0728037E15C", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", matchCriteriaId: "2ACA9287-B475-4AF7-A4DA-A7143CEF9E57", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:axiom_multix_m_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7EB36445-3462-4398-84F9-1387A7436FC7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:axiom_multix_m:-:*:*:*:*:*:*:*", matchCriteriaId: "66829DE2-25D6-4FF5-B1AA-6637AE053ACE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:axiom_vertix_md_trauma_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "733840A0-5D17-4D92-BB45-357E39CC9190", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:axiom_vertix_md_trauma:-:*:*:*:*:*:*:*", matchCriteriaId: "4FAFB504-D8F4-4589-9D25-616CB38BF257", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:axiom_vertix_solitaire_m_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A9B1B857-3051-4312-A997-99570D567D74", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:axiom_vertix_solitaire_m:-:*:*:*:*:*:*:*", matchCriteriaId: "86974C5C-C4A4-4109-B5DC-85D4F01E94D5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:mobilett_xp_digital_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7392294B-487E-4B31-B6A5-560C4F547338", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:mobilett_xp_digital:-:*:*:*:*:*:*:*", matchCriteriaId: "DC524FD4-B53D-4E22-A9A9-33EB73811CF3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:multix_pro_acss_p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DCB111CF-1760-45FE-A005-68965EEB9034", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:multix_pro_acss_p:-:*:*:*:*:*:*:*", matchCriteriaId: "46335917-7477-47B9-9D03-079D0AFD6121", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:multix_pro_p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "72E96638-0DE1-4370-B0FC-8E418BD74C71", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:multix_pro_p:-:*:*:*:*:*:*:*", matchCriteriaId: "6B9E130C-EB9B-46F2-A67A-1CB22F67E3CF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:multix_pro_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5FE644ED-DFE9-4F11-9C8B-E5EA6CF6BA1E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:multix_pro:-:*:*:*:*:*:*:*", matchCriteriaId: "1C221669-D976-4C2B-8634-2FB0583F27A2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:multix_pro_acss_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4AA78BA8-8443-441D-B629-5F5652296566", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:multix_pro_acss:-:*:*:*:*:*:*:*", matchCriteriaId: "F39B002A-3FCC-4F73-8BEA-575BD000C49F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:multix_pro_navy_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F2B6D8DF-5F9B-469E-B8F1-D59021B5D1A6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:multix_pro_navy:-:*:*:*:*:*:*:*", matchCriteriaId: "284692FE-2298-43F8-B59E-F86BA2453146", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:multix_swing_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DAD4D073-FA45-4D28-BF69-0A706C61BA32", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:multix_swing:-:*:*:*:*:*:*:*", matchCriteriaId: "69644600-D356-45A7-9E8B-91458255C252", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:multix_top_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9AFC6443-6826-4C1F-95D7-621EA0C5B547", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:multix_top:-:*:*:*:*:*:*:*", matchCriteriaId: "29DFEA58-1949-41EF-AF8A-A01E2BD64ABE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:multix_top_acss_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "98E0BDAE-DA78-439B-8368-E861BAB682EE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:multix_top_acss:-:*:*:*:*:*:*:*", matchCriteriaId: "68111C12-7DD9-4DB3-AC80-B95A5A063A09", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:multix_top_p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B92FD292-31EB-448B-BD86-8D14A758A254", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:multix_top_p:-:*:*:*:*:*:*:*", matchCriteriaId: "161AD776-6029-43EA-BDDA-FC8357699C33", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:multix_top_acss_p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FE3A3B2B-D371-49D4-B7C1-A00595282EC2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:multix_top_acss_p:-:*:*:*:*:*:*:*", matchCriteriaId: "610660AA-0AA6-434E-B824-80AE565570B7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:vertix_solitaire_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D1282797-1448-4B11-825F-49863AD4BDC4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:vertix_solitaire:-:*:*:*:*:*:*:*", matchCriteriaId: "3A4A8BC9-0249-45EB-91D7-1B57491F4951", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:atellica_solution_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "32E9780A-0015-4245-9CAE-D7573D8C4268", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:atellica_solution:-:*:*:*:*:*:*:*", matchCriteriaId: "7B264A65-9109-4629-8F20-1DD6728FAD7F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:aptio_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "502E501A-78A0-4074-BC7D-7BAFE4386337", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:aptio:-:*:*:*:*:*:*:*", matchCriteriaId: "3D8C9706-43E8-48E5-913C-FE0FDEEB489F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:streamlab_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "195AD327-F323-4902-9CDB-4C7C1B3D1F3F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:streamlab:-:*:*:*:*:*:*:*", matchCriteriaId: "BD03E0CF-4707-4C95-8703-264429D52996", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:centralink_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0D56D3C8-5731-4EE2-B79B-BB74163E3D62", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:centralink:-:*:*:*:*:*:*:*", matchCriteriaId: "500986D3-3A08-46C4-9482-88CFA6ED61B5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:viva_e_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AE2405D2-7048-4541-9526-AA2B88D2A38B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:viva_e:-:*:*:*:*:*:*:*", matchCriteriaId: "745742F2-A291-470B-8EB1-482A23873737", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:viva_twin_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D64A2198-C839-43A8-BFEB-D575B372DD7F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:viva_twin:-:*:*:*:*:*:*:*", matchCriteriaId: "BA780EE3-B6AB-4393-9997-D09CBB433C51", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:siemens:syngo_lab_process_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "B232D046-AD22-445F-8EE0-EED30BCA9DAD", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:rapidpoint_500_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FFF1E341-5481-494A-BAFF-E080E39C9DA7", versionEndIncluding: "2.3.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:rapidpoint_500:-:*:*:*:*:*:*:*", matchCriteriaId: "9A4806F5-0292-45BA-96B9-422958D0CB0F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:lantis_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4B8CA8D2-1BA4-4B58-969D-DBA7F72DA755", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:lantis:-:*:*:*:*:*:*:*", matchCriteriaId: "06FF378C-EAAD-4808-9246-010AC0A17E90", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:agile_controller-campus_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "A6B574A3-5FCD-4F3E-932D-10334180F4F0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:agile_controller-campus_firmware:v100r002c10:*:*:*:*:*:*:*", matchCriteriaId: "81635D07-BFBF-4485-B4CF-9C05620DB447", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:agile_controller-campus:-:*:*:*:*:*:*:*", matchCriteriaId: "592559FB-7551-4327-9ECE-9325F4173C85", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:bh620_v2_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DAAA4664-EB38-4693-88AD-F226D7A07C93", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:bh620_v2:-:*:*:*:*:*:*:*", matchCriteriaId: "95D21222-A1F6-4312-B833-6576F75820C2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:bh621_v2_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "FC40CC46-D679-42F8-B2C2-FF3EDA28BCF0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:bh621_v2:-:*:*:*:*:*:*:*", matchCriteriaId: "11D61715-5074-41EC-A50F-5C347D85266F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:bh622_v2_firmware:v100r001c00:*:*:*:*:*:*:*", matchCriteriaId: "617A06EA-67C0-4714-B8D8-2602E0E34029", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:bh622_v2:-:*:*:*:*:*:*:*", matchCriteriaId: "6E191F04-E8BE-4D73-89D0-42C2DB288C4D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:bh640_v2_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "93792886-51EE-4172-ACED-F195F0556A98", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:bh640_v2:-:*:*:*:*:*:*:*", matchCriteriaId: "EFBB2CA0-7556-42E8-B7C7-57F1C6477CFF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ch121_firmware:v100r001c00:*:*:*:*:*:*:*", matchCriteriaId: "668E5527-0E2F-40CD-8857-B720A6C9B802", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ch121:-:*:*:*:*:*:*:*", matchCriteriaId: "AA223DE5-F37C-4451-96A9-9DFA479591AB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ch140_firmware:v100r001c00:*:*:*:*:*:*:*", matchCriteriaId: "8D7D565C-DC70-4978-BF91-79DD99FA347C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ch140:-:*:*:*:*:*:*:*", matchCriteriaId: "8DB768F1-FA54-4043-B538-31783D941CC9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ch220_firmware:v100r001c00:*:*:*:*:*:*:*", matchCriteriaId: "E7D7D307-43F7-43AD-AA2E-F0DB66F7F9D1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ch220:-:*:*:*:*:*:*:*", matchCriteriaId: "ED03ED73-8B5C-4369-8F3A-68497718B488", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ch221_firmware:v100r001c00:*:*:*:*:*:*:*", matchCriteriaId: "685452C8-9B87-4FBC-9E27-0DF5F2B44807", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ch221:-:*:*:*:*:*:*:*", matchCriteriaId: "211005F7-2DAA-40EC-9B92-D2E866052E84", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ch222_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "E41FE7C8-77B4-4EC7-83C3-F587BDC8A18D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ch222:-:*:*:*:*:*:*:*", matchCriteriaId: "21FB1E88-3CB4-48FE-9F52-AA12D40DB944", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ch240_firmware:v100r001c00:*:*:*:*:*:*:*", matchCriteriaId: "7BC1DD2F-DE32-4EA6-9539-792FCBDEF20D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ch240:-:*:*:*:*:*:*:*", matchCriteriaId: "74027C23-3637-4ABE-A697-B20FD7B94162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ch242_firmware:v100r001c00:*:*:*:*:*:*:*", matchCriteriaId: "6185FD57-FE4F-43E2-A3EA-3AA5A299A05D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ch242:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8DA951-047B-4A88-A851-9663F2EC2CEB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ch242_v3_firmware:v100r001c00:*:*:*:*:*:*:*", matchCriteriaId: "563AC0A9-568C-4010-9142-28C88349B587", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ch242_v3:-:*:*:*:*:*:*:*", matchCriteriaId: "D2637E43-1937-4320-AAF4-3770C332B66E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:e6000_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "774E8CD3-3E77-41EB-ABC9-CE885CC90FA9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:e6000:-:*:*:*:*:*:*:*", matchCriteriaId: "1F66D29E-0B7F-45D3-BECC-21952F4A4850", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:e6000_chassis_firmware:v100r001c00:*:*:*:*:*:*:*", matchCriteriaId: "3057065D-9D25-4BE2-8392-48405063E821", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:e6000_chassis:-:*:*:*:*:*:*:*", matchCriteriaId: "748D3A0F-12FA-4755-969B-45D7B3D55147", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:gtsoftx3000_firmware:v200r001c01spc100:*:*:*:*:*:*:*", matchCriteriaId: "14C6D34F-BFE4-420C-B496-E4D82783ED7B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:gtsoftx3000_firmware:v200r002c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "8F646FC2-3A77-4971-BACC-D0CA7B9379DE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:gtsoftx3000_firmware:v200r002c10spc100:*:*:*:*:*:*:*", matchCriteriaId: "C98EEDBC-42C6-4896-83A5-8EE175F4710C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:gtsoftx3000:-:*:*:*:*:*:*:*", matchCriteriaId: "43C5827F-092C-4A94-A907-F653A55C280D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:oceanstor_18500_firmware:v100r001c30spc300:*:*:*:*:*:*:*", matchCriteriaId: "22D7738B-B2B1-423C-A7C6-A73280F085C7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:oceanstor_18500:-:*:*:*:*:*:*:*", matchCriteriaId: "B7AAE27E-EB13-43E2-A7F4-7973977AD936", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:oceanstor_18800_firmware:v100r001c30spc300:*:*:*:*:*:*:*", matchCriteriaId: "5B908D26-6C4F-4955-A284-39C4C338AEBF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:oceanstor_18800:-:*:*:*:*:*:*:*", matchCriteriaId: "B196FDFF-8A1D-4E7D-895A-1D09ADACC396", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:oceanstor_18800f_firmware:v100r001c30spc300:*:*:*:*:*:*:*", matchCriteriaId: "C46963C2-0175-4933-A2A1-4CFBA3FF4586", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:oceanstor_18800f:-:*:*:*:*:*:*:*", matchCriteriaId: "4E675B6C-C847-486F-8946-F98E271E1DC0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:oceanstor_hvs85t_firmware:v100r001c00:*:*:*:*:*:*:*", matchCriteriaId: "6188E188-7CA7-4415-835D-738A684B7639", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:oceanstor_hvs85t_firmware:v100r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "981C1A1D-352D-478A-BF04-F1D9A71C86D6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:oceanstor_hvs85t:-:*:*:*:*:*:*:*", matchCriteriaId: "675CCB4F-BB76-45DC-9E6E-3BD279995084", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:oceanstor_hvs88t_firmware:v100r001c00:*:*:*:*:*:*:*", matchCriteriaId: "B9A7C688-25E6-457B-AFBF-657EDE621FFA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:oceanstor_hvs88t_firmware:v100r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "31EBFCDE-7FB8-4CA7-9A2E-F94DD572B48B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:oceanstor_hvs88t:-:*:*:*:*:*:*:*", matchCriteriaId: "5C3C47BF-7FAA-4A6C-BBDC-CC8D28CCA611", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rh1288_v2_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "9AA159F6-CE6C-4EC9-9166-718780F752CA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rh1288_v2:-:*:*:*:*:*:*:*", matchCriteriaId: "F24DF092-9867-4381-BDFB-5AB7116DEFD4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rh1288a_v2_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "BE3450A4-4C1A-4125-8B18-3961D69D6F0B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rh1288a_v2:-:*:*:*:*:*:*:*", matchCriteriaId: "A7E91ACB-82D0-4A4E-9157-5142A26E577A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rh2265_v2_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "485D4E2A-7697-40CD-92E4-0B93CB898DD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rh2265_v2:-:*:*:*:*:*:*:*", matchCriteriaId: "D3860458-155E-47F6-A37E-730DE7A363DE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rh2268_v2_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "1E293DFF-1C3F-4180-895D-E7BC4A14FB93", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rh2268_v2:-:*:*:*:*:*:*:*", matchCriteriaId: "C6C2FB1E-2569-4AB9-95A2-DCD4AC8C7D1D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rh2285_v2_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "97C57B46-9085-458A-8A5B-A6F74E00F4D0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rh2285_v2:-:*:*:*:*:*:*:*", matchCriteriaId: "38DF8C15-4086-4F70-BCD2-BDB91900C80A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rh2285h_v2_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "449982CF-3F17-473D-9B58-3E1076B1CF1F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rh2285h_v2:-:*:*:*:*:*:*:*", matchCriteriaId: "275A2FCA-8E0A-4EFA-907B-4F6E3E954372", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rh2288_v2_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "377CAD92-7563-43D9-92A3-C05B149F65E2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rh2288_v2:-:*:*:*:*:*:*:*", matchCriteriaId: "9E1F1478-2D24-42D5-8401-3D6BAB20A7F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rh2288a_v2_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "A522BFBE-69E6-4DF8-83D3-27564AF88C6B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rh2288a_v2:-:*:*:*:*:*:*:*", matchCriteriaId: "E3CB6AA6-2424-41B2-92A7-81E788DB8396", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rh2288e_v2_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "AE64C9F3-EEEF-44CB-8C3B-0969D2A76C81", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rh2288e_v2:-:*:*:*:*:*:*:*", matchCriteriaId: "7A446D94-F39F-461D-B935-02C87058D0AE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rh2288h_v2_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "56D5E59C-5824-463B-8121-57E3689DD1C0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rh2288h_v2:-:*:*:*:*:*:*:*", matchCriteriaId: "908E0834-8E5D-43EF-A604-AAFCA6E69767", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rh2485_v2_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "5AFBF820-E15D-4E7F-AD44-D4AE5EF208FB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rh2485_v2:-:*:*:*:*:*:*:*", matchCriteriaId: "2D2E8A9D-7BC5-40D2-B85B-61D753A4D88B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rh5885_v2_firmware:v100r001c00:*:*:*:*:*:*:*", matchCriteriaId: "525FAA8B-734F-4B0D-8E32-9066CF9D939F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rh5885_v2:-:*:*:*:*:*:*:*", matchCriteriaId: "43C7EEF7-1AF2-41D8-98A6-0237524B76C8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rh5885_v3_firmware:v100r003c00:*:*:*:*:*:*:*", matchCriteriaId: "779C3401-3A97-4DFE-AD0B-E8B2A48AA04A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rh5885_v3:-:*:*:*:*:*:*:*", matchCriteriaId: "3C3BAFB9-A7C7-4199-89B2-587D650762C2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "B9E7481E-B5B8-481C-AC35-A8029AA2DF7A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "60E7CCC4-60A8-48FA-A9EA-7A327B3A29B2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*", matchCriteriaId: "FDBEFFB4-9742-48CC-BBA6-E5DCA281B343", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:seco_vsm_firmware:v200r002c00:*:*:*:*:*:*:*", matchCriteriaId: "2A756B3A-BD91-4857-869B-AF435E66BAD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:seco_vsm:-:*:*:*:*:*:*:*", matchCriteriaId: "EB7EBA07-D6A7-4C45-8C57-84E2549A4CFE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:uma_firmware:v200r001c00:*:*:*:*:*:*:*", matchCriteriaId: "207D80F3-6DB4-4BDE-AE72-38BAF4EE2B67", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:uma_firmware:v300r001c00:*:*:*:*:*:*:*", matchCriteriaId: "429F7534-D2A9-4275-9333-0786F315037E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:uma:-:*:*:*:*:*:*:*", matchCriteriaId: "E1940680-0927-4E56-83E3-3525797978B3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:x6000_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "FF613F6D-DBC7-4A35-9A8D-B948FB3C84F9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:x6000:-:*:*:*:*:*:*:*", matchCriteriaId: "24BB4E74-B9A6-4C2C-AB61-A4028CDFF614", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:x8000_firmware:v100r002c20:*:*:*:*:*:*:*", matchCriteriaId: "48CBF1C9-1DA3-4B3C-AB00-42F41248B074", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:x8000:-:*:*:*:*:*:*:*", matchCriteriaId: "02CCB6E7-0BF2-4762-BDD6-0F68B087CBF8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:elog_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "C3A696C2-836C-441C-875D-9D68F2DE25B1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:elog:-:*:*:*:*:*:*:*", matchCriteriaId: "C34C1766-B15E-4C73-AE28-F22D9296DF20", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_ecs_firmware:v300r001c00:*:*:*:*:*:*:*", matchCriteriaId: "95140BB8-911D-4F19-8C6E-DCD6FA2298AD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_ecs:-:*:*:*:*:*:*:*", matchCriteriaId: "A924CA6B-C4BB-4340-BF27-B0EE4B72F9A7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability'.", }, { lang: "es", value: "Existe una vulnerabilidad de ejecución remota de código en Remote Desktop Services, anteriormente conocido como Terminal Services, cuando un atacante no autenticado se conecta al sistema de destino mediante RDP y envía peticiones especialmente diseñadas, conocida como 'Remote Desktop Services Remote Code Execution Vulnerability'.", }, ], id: "CVE-2019-0708", lastModified: "2024-11-21T04:17:08.487", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-05-16T19:29:00.427", references: [ { source: "secure@microsoft.com", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/153133/Microsoft-Windows-Remote-Desktop-BlueKeep-Denial-Of-Service.html", }, { source: "secure@microsoft.com", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/153627/Microsoft-Windows-RDP-BlueKeep-Denial-Of-Service.html", }, { source: "secure@microsoft.com", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/154579/BlueKeep-RDP-Remote-Windows-Kernel-Use-After-Free.html", }, { source: "secure@microsoft.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/155389/Microsoft-Windows-7-x86-BlueKeep-RDP-Use-After-Free.html", }, { source: "secure@microsoft.com", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/162960/Microsoft-RDP-Remote-Code-Execution.html", }, { source: "secure@microsoft.com", tags: [ "Third Party Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190529-01-windows-en", }, { source: "secure@microsoft.com", tags: [ "Third Party Advisory", ], url: "http://www.huawei.com/en/psirt/security-notices/huawei-sn-20190515-01-windows-en", }, { source: "secure@microsoft.com", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-166360.pdf", }, { source: "secure@microsoft.com", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-406175.pdf", }, { source: "secure@microsoft.com", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-433987.pdf", }, { source: "secure@microsoft.com", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-616199.pdf", }, { source: "secure@microsoft.com", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-832947.pdf", }, { source: "secure@microsoft.com", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-932041.pdf", }, { source: "secure@microsoft.com", tags: [ "Patch", "Vendor Advisory", ], url: "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/153133/Microsoft-Windows-Remote-Desktop-BlueKeep-Denial-Of-Service.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/153627/Microsoft-Windows-RDP-BlueKeep-Denial-Of-Service.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/154579/BlueKeep-RDP-Remote-Windows-Kernel-Use-After-Free.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/155389/Microsoft-Windows-7-x86-BlueKeep-RDP-Use-After-Free.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/162960/Microsoft-RDP-Remote-Code-Execution.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190529-01-windows-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.huawei.com/en/psirt/security-notices/huawei-sn-20190515-01-windows-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-166360.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-406175.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-433987.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-616199.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-832947.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-932041.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708", }, ], sourceIdentifier: "secure@microsoft.com", vulnStatus: "Undergoing Analysis", weaknesses: [ { description: [ { lang: "en", value: "CWE-416", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }