Search criteria
20 vulnerabilities found for s5300 by huawei
VAR-201704-0422
Vulnerability from variot - Updated: 2024-02-13 22:59Huawei AR3200 with software V200R007C00, V200R005C32, V200R005C20; S12700 with software V200R008C00, V200R007C00; S5300 with software V200R008C00, V200R007C00, V200R006C00; S5700 with software V200R008C00, V200R007C00, V200R006C00; S6300 with software V200R008C00, V200R007C00; S6700 with software V200R008C00, V200R007C00; S7700 with software V200R008C00, V200R007C00, V200R006C00; S9300 with software V200R008C00, V200R007C00, V200R006C00; and S9700 with software V200R008C00, V200R007C00, V200R006C00 allow remote attackers to send abnormal Multiprotocol Label Switching (MPLS) packets to cause memory exhaustion. The Huawei AR3200 is a Huawei router. The S9700, S5300, S5700, S6300, S6700, S7700, S9300, and S9700 are Huawei switch devices. A number of Huawei products have a memory leak vulnerability. The Multi-Protocol Labeling (MPLS) packet processing module of the device repeatedly requests the memory when processing abnormal packets. There is a risk that the continuous attack will cause the memory to run out. An attacker could exploit this vulnerability to cause the device to run out of memory. The Huawei AR3200 and others are all products of China's Huawei (Huawei). The following products are affected: Huawei AR3200 V200R007C00 Version, V200R005C32 Version, V200R005C20 Version; S12700 V200R008C00 Version, V200R007C00 Version; S5300 V200R008C00 Version, V200R007C00 Version, V200R006C00 Version; S5700 V200R008C00 Version, V200R007C00 Version, V200R006C00 Version; S6300 V200R008C00 Version, V200R007C00 Version; S6700 V200R008C00 version, V200R007C00 version; S7700 V200R008C00 version, V200R007C00 version, V200R006C00 version; S9300 V200R008C00 version, V2007C00 version, V200R006C00 version;
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201704-0422",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "s9300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "ar3200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "ar3200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c32"
},
{
"model": "ar3200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c20"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "ar3200",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s12700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s6300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s6700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s7700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "ar3200 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ar3200 v200r005c32",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ar3200 v200r005c20",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11302"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008269"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-187"
},
{
"db": "NVD",
"id": "CVE-2016-8797"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:ar3200_firmware:v200r005c32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar3200_firmware:v200r005c20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2016-8797"
}
]
},
"cve": "CVE-2016-8797",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 5.0,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2016-8797",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.9,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2016-11302",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-97617",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2016-8797",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2016-8797",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2016-11302",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201704-187",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-97617",
"trust": 0.1,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2016-8797",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11302"
},
{
"db": "VULHUB",
"id": "VHN-97617"
},
{
"db": "VULMON",
"id": "CVE-2016-8797"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008269"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-187"
},
{
"db": "NVD",
"id": "CVE-2016-8797"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei AR3200 with software V200R007C00, V200R005C32, V200R005C20; S12700 with software V200R008C00, V200R007C00; S5300 with software V200R008C00, V200R007C00, V200R006C00; S5700 with software V200R008C00, V200R007C00, V200R006C00; S6300 with software V200R008C00, V200R007C00; S6700 with software V200R008C00, V200R007C00; S7700 with software V200R008C00, V200R007C00, V200R006C00; S9300 with software V200R008C00, V200R007C00, V200R006C00; and S9700 with software V200R008C00, V200R007C00, V200R006C00 allow remote attackers to send abnormal Multiprotocol Label Switching (MPLS) packets to cause memory exhaustion. The Huawei AR3200 is a Huawei router. The S9700, S5300, S5700, S6300, S6700, S7700, S9300, and S9700 are Huawei switch devices. A number of Huawei products have a memory leak vulnerability. The Multi-Protocol Labeling (MPLS) packet processing module of the device repeatedly requests the memory when processing abnormal packets. There is a risk that the continuous attack will cause the memory to run out. An attacker could exploit this vulnerability to cause the device to run out of memory. The Huawei AR3200 and others are all products of China\u0027s Huawei (Huawei). The following products are affected: Huawei AR3200 V200R007C00 Version, V200R005C32 Version, V200R005C20 Version; S12700 V200R008C00 Version, V200R007C00 Version; S5300 V200R008C00 Version, V200R007C00 Version, V200R006C00 Version; S5700 V200R008C00 Version, V200R007C00 Version, V200R006C00 Version; S6300 V200R008C00 Version, V200R007C00 Version; S6700 V200R008C00 version, V200R007C00 version; S7700 V200R008C00 version, V200R007C00 version, V200R006C00 version; S9300 V200R008C00 version, V2007C00 version, V200R006C00 version;",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-8797"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008269"
},
{
"db": "CNVD",
"id": "CNVD-2016-11302"
},
{
"db": "VULHUB",
"id": "VHN-97617"
},
{
"db": "VULMON",
"id": "CVE-2016-8797"
}
],
"trust": 2.34
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-8797",
"trust": 3.2
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008269",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201704-187",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2016-11302",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-97617",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2016-8797",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11302"
},
{
"db": "VULHUB",
"id": "VHN-97617"
},
{
"db": "VULMON",
"id": "CVE-2016-8797"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008269"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-187"
},
{
"db": "NVD",
"id": "CVE-2016-8797"
}
]
},
"id": "VAR-201704-0422",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11302"
},
{
"db": "VULHUB",
"id": "VHN-97617"
}
],
"trust": 1.496474832857143
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11302"
}
]
},
"last_update_date": "2024-02-13T22:59:50.414000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "huawei-sa-20160608-01-mpls",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160608-01-mpls-en"
},
{
"title": "Patches for memory leaks in various Huawei products",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/84093"
},
{
"title": "Various Huawei product memory leak vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=69035"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11302"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008269"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-187"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-399",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-97617"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008269"
},
{
"db": "NVD",
"id": "CVE-2016-8797"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160608-01-mpls-en"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-8797"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2016-8797"
},
{
"trust": 0.6,
"url": "http://www.huawei.com/cn/psirt/security-advisories/2016/huawei-sa-20160608-01-mpls-cn"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/399.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11302"
},
{
"db": "VULHUB",
"id": "VHN-97617"
},
{
"db": "VULMON",
"id": "CVE-2016-8797"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008269"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-187"
},
{
"db": "NVD",
"id": "CVE-2016-8797"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2016-11302"
},
{
"db": "VULHUB",
"id": "VHN-97617"
},
{
"db": "VULMON",
"id": "CVE-2016-8797"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008269"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-187"
},
{
"db": "NVD",
"id": "CVE-2016-8797"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-11-18T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-11302"
},
{
"date": "2017-04-02T00:00:00",
"db": "VULHUB",
"id": "VHN-97617"
},
{
"date": "2017-04-02T00:00:00",
"db": "VULMON",
"id": "CVE-2016-8797"
},
{
"date": "2017-05-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-008269"
},
{
"date": "2017-04-07T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201704-187"
},
{
"date": "2017-04-02T20:59:01.860000",
"db": "NVD",
"id": "CVE-2016-8797"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-11-18T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-11302"
},
{
"date": "2017-04-11T00:00:00",
"db": "VULHUB",
"id": "VHN-97617"
},
{
"date": "2017-04-11T00:00:00",
"db": "VULMON",
"id": "CVE-2016-8797"
},
{
"date": "2017-05-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-008269"
},
{
"date": "2017-04-07T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201704-187"
},
{
"date": "2017-04-11T01:03:45.743000",
"db": "NVD",
"id": "CVE-2016-8797"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201704-187"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei Vulnerability that can consume memory in product software",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-008269"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "resource management error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201704-187"
}
],
"trust": 0.6
}
}
VAR-201704-0437
Vulnerability from variot - Updated: 2023-12-18 14:01Huawei S9300 with software before V100R006SPH013 and S2300,S3300,S5300,S6300 with software before V100R006SPH010 support Y.1731 and therefore have the Y.1731 vulnerability in processing special packets. The vulnerability causes the restart of switches. plural Huawei The product contains a data processing vulnerability.Denial of service (DoS) An attack could be made. The S9300, S2300, S3300, S5300, and S6300 are various types of switches introduced by Huawei. An attacker could exploit this vulnerability to reboot the device. The following products and versions are affected: Huawei S9300 V100R006C00SPC500 Version, V100R006C00SPC800 Version; S2300 V100R006C00SPC800 Version, V100R006C01SPC100 Version, V100R006C03 Version; S3300 V100R006C00SPC800 Version, V100R006C01SPC100 Version, V100R006C03 Version; S5300 V100R006C00SPC800 Version, V100R006C01SPC100 Version, V100R006C03 Version; S6300 V100R006C00SPC800 Version, V100R006C01SPC100 The version is V100R006C03
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201704-0437",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "s9300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c00spc500"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c03"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c01spc100"
},
{
"model": "s3300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c01spc100"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c00spc800"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c01spc100"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c03"
},
{
"model": "s3300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c03"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c00spc800"
},
{
"model": "s3300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c00spc800"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c00spc800"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c03"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c00spc800"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c01spc100"
},
{
"model": "s2300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s3300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s6300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v100r006c00spc800",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v100r006c01spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v100r006c03",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v100r006c00spc500",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v100r006c00spc800",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v100r006c00spc800",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v100r006c01spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v100r006c03",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s3300 v100r006c00spc800",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s3300 v100r006c01spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s3300 v100r006c03",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v100r006c00spc800",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v100r006c01spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v100r006c03",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-05108"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008274"
},
{
"db": "NVD",
"id": "CVE-2014-3223"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-213"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v100r006c00spc500:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v100r006c00spc800:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s3300_firmware:v100r006c01spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s3300_firmware:v100r006c03:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s3300_firmware:v100r006c00spc800:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s3300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s2300_firmware:v100r006c01spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2300_firmware:v100r006c03:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2300_firmware:v100r006c00spc800:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v100r006c03:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v100r006c01spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v100r006c00spc800:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v100r006c03:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v100r006c01spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v100r006c00spc800:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2014-3223"
}
]
},
"cve": "CVE-2014-3223",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 7.8,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2014-3223",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2017-05108",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-71162",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2014-3223",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2014-3223",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2017-05108",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201704-213",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-71162",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-05108"
},
{
"db": "VULHUB",
"id": "VHN-71162"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008274"
},
{
"db": "NVD",
"id": "CVE-2014-3223"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-213"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei S9300 with software before V100R006SPH013 and S2300,S3300,S5300,S6300 with software before V100R006SPH010 support Y.1731 and therefore have the Y.1731 vulnerability in processing special packets. The vulnerability causes the restart of switches. plural Huawei The product contains a data processing vulnerability.Denial of service (DoS) An attack could be made. The S9300, S2300, S3300, S5300, and S6300 are various types of switches introduced by Huawei. An attacker could exploit this vulnerability to reboot the device. The following products and versions are affected: Huawei S9300 V100R006C00SPC500 Version, V100R006C00SPC800 Version; S2300 V100R006C00SPC800 Version, V100R006C01SPC100 Version, V100R006C03 Version; S3300 V100R006C00SPC800 Version, V100R006C01SPC100 Version, V100R006C03 Version; S5300 V100R006C00SPC800 Version, V100R006C01SPC100 Version, V100R006C03 Version; S6300 V100R006C00SPC800 Version, V100R006C01SPC100 The version is V100R006C03",
"sources": [
{
"db": "NVD",
"id": "CVE-2014-3223"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008274"
},
{
"db": "CNVD",
"id": "CNVD-2017-05108"
},
{
"db": "VULHUB",
"id": "VHN-71162"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2014-3223",
"trust": 3.1
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008274",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201704-213",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2017-05108",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-71162",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-05108"
},
{
"db": "VULHUB",
"id": "VHN-71162"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008274"
},
{
"db": "NVD",
"id": "CVE-2014-3223"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-213"
}
]
},
"id": "VAR-201704-0437",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-05108"
},
{
"db": "VULHUB",
"id": "VHN-71162"
}
],
"trust": 1.5761652277777778
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-05108"
}
]
},
"last_update_date": "2023-12-18T14:01:39.495000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Huawei-SA-20140317-01",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/hw-329625"
},
{
"title": "Huawei switch Y.1731 denial of service vulnerability patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/92443"
},
{
"title": "Repair measures for various Huawei switch security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=69059"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-05108"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008274"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-213"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-19",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-71162"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008274"
},
{
"db": "NVD",
"id": "CVE-2014-3223"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.3,
"url": "http://www.huawei.com/en/psirt/security-advisories/hw-329625"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3223"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2014-3223"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-05108"
},
{
"db": "VULHUB",
"id": "VHN-71162"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008274"
},
{
"db": "NVD",
"id": "CVE-2014-3223"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-213"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2017-05108"
},
{
"db": "VULHUB",
"id": "VHN-71162"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008274"
},
{
"db": "NVD",
"id": "CVE-2014-3223"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-213"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-04-23T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-05108"
},
{
"date": "2017-04-02T00:00:00",
"db": "VULHUB",
"id": "VHN-71162"
},
{
"date": "2017-05-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-008274"
},
{
"date": "2017-04-02T20:59:00.237000",
"db": "NVD",
"id": "CVE-2014-3223"
},
{
"date": "2017-04-06T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201704-213"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-04-23T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-05108"
},
{
"date": "2017-04-05T00:00:00",
"db": "VULHUB",
"id": "VHN-71162"
},
{
"date": "2017-05-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-008274"
},
{
"date": "2017-04-05T15:06:06.637000",
"db": "NVD",
"id": "CVE-2014-3223"
},
{
"date": "2017-04-06T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201704-213"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201704-213"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei Data processing vulnerabilities in products",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-008274"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "lack of information",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201704-213"
}
],
"trust": 0.6
}
}
VAR-201704-0502
Vulnerability from variot - Updated: 2023-12-18 13:48Huawei S5300 with software V200R003C00, V200R007C00, V200R008C00, V200R009C00; S5700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C03, V200R007C00, V200R008C00, V200R009C00; S6300 with software V200R003C00, V200R005C00, V200R008C00, V200R009C00; S6700 with software V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R008C00, V200R009C00; S7700 with software V200R007C00, V200R008C00, V200R009C00; S9300 with software V200R007C00, V200R008C00, V200R009C00; S9700 with software V200R007C00, V200R008C00, V200R009C00; and S12700 with software V200R007C00, V200R007C01, V200R008C00, V200R009C00 allow the attacker to cause a denial of service condition by sending malformed MPLS packets. Multiple Huawei Product has a service disruption (DoS) There are vulnerabilities that are put into a state.An attacker could create a malformed MPLS Service interruption due to packet transmission (DoS) There is a possibility of being put into a state. Huawei S9700 is the S series switch of China Huawei. A denial of service vulnerability exists in several Huawei products due to the failure of the program to properly verify MultiprotocolLabelSwitching (MPLS) messages. Multiple Huawei products are prone to a remote denial-of-service vulnerability. Attackers can exploit this issue to crash the affected device, denying service to legitimate users. The following products and versions are affected: Huawei S9700 V200R009C00 , V200R008C00 , V200R007C00 ; Huawei S9300 V200R009C00 , V200R008C00 , V200R007C00 ; Huawei S7700 V200R009C00 , V200R008C00 , V200R007C00 ; Huawei S6700 V200R009C00 , V200R008C00 , V200R005C00 , V200R003C00 , V200R002C00 , V200R001C01 , V200R001C00 ; Huawei S6300 V200R009C00 , V200R008C00 , V200R005C00 , V200R003C00 ; Huawei S5700 V200R009C00 , V200R008C00 , V200R007C00 , V200R005C00 , V200R003C00 , V200R002C00 , V200R001C00 ; Huawei S5300 V200R009C00 , V200R008C00 , V200R007C00 , V200R003C00 ; Huawei S12700 V200R009C00 , V200R008C00 , V200R007C01 , V200R007C00
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201704-0502",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "s9300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r009c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r009c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r009c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s5700 v200r005c00",
"scope": null,
"trust": 1.5,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r008c00",
"scope": null,
"trust": 1.5,
"vendor": "huawei",
"version": null
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r009c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c01"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r009c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r009c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r009c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c03"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c01"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r009c00"
},
{
"model": "s7700 v200r008c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r008c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r001c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r001c01",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r002c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r003c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r008c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r003c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r005c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r008c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r002c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r003c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r008c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r003c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r007c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r008c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r008c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r007c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r007c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r007c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r007c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r007c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r009c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r009c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r009c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r009c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r009c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r009c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r009c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r007c01",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s12700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s6300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s6700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s7700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r001c01",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r005c03",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r009c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r005c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r001c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r009c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r009c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r009c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r009c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r009c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r009c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r009c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r009c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11388"
},
{
"db": "BID",
"id": "94285"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008266"
},
{
"db": "NVD",
"id": "CVE-2016-8773"
},
{
"db": "CNNVD",
"id": "CNNVD-201611-370"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s12700_firmware:v200r007c01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s12700_firmware:v200r009c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r003c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r009c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r009c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r001c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r002c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r005c03:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r009c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r003c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r005c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r003c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r005c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r009c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r001c01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r001c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r002c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r009c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r009c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r009c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2016-8773"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor reported this issue.",
"sources": [
{
"db": "BID",
"id": "94285"
}
],
"trust": 0.3
},
"cve": "CVE-2016-8773",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 5.0,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2016-8773",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2016-11388",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-97593",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2016-8773",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2016-8773",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2016-11388",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201611-370",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-97593",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11388"
},
{
"db": "VULHUB",
"id": "VHN-97593"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008266"
},
{
"db": "NVD",
"id": "CVE-2016-8773"
},
{
"db": "CNNVD",
"id": "CNNVD-201611-370"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei S5300 with software V200R003C00, V200R007C00, V200R008C00, V200R009C00; S5700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C03, V200R007C00, V200R008C00, V200R009C00; S6300 with software V200R003C00, V200R005C00, V200R008C00, V200R009C00; S6700 with software V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R008C00, V200R009C00; S7700 with software V200R007C00, V200R008C00, V200R009C00; S9300 with software V200R007C00, V200R008C00, V200R009C00; S9700 with software V200R007C00, V200R008C00, V200R009C00; and S12700 with software V200R007C00, V200R007C01, V200R008C00, V200R009C00 allow the attacker to cause a denial of service condition by sending malformed MPLS packets. Multiple Huawei Product has a service disruption (DoS) There are vulnerabilities that are put into a state.An attacker could create a malformed MPLS Service interruption due to packet transmission (DoS) There is a possibility of being put into a state. Huawei S9700 is the S series switch of China Huawei. A denial of service vulnerability exists in several Huawei products due to the failure of the program to properly verify MultiprotocolLabelSwitching (MPLS) messages. Multiple Huawei products are prone to a remote denial-of-service vulnerability. \nAttackers can exploit this issue to crash the affected device, denying service to legitimate users. The following products and versions are affected: Huawei S9700 V200R009C00 , V200R008C00 , V200R007C00 ; Huawei S9300 V200R009C00 , V200R008C00 , V200R007C00 ; Huawei S7700 V200R009C00 , V200R008C00 , V200R007C00 ; Huawei S6700 V200R009C00 , V200R008C00 , V200R005C00 , V200R003C00 , V200R002C00 , V200R001C01 , V200R001C00 ; Huawei S6300 V200R009C00 , V200R008C00 , V200R005C00 , V200R003C00 ; Huawei S5700 V200R009C00 , V200R008C00 , V200R007C00 , V200R005C00 , V200R003C00 , V200R002C00 , V200R001C00 ; Huawei S5300 V200R009C00 , V200R008C00 , V200R007C00 , V200R003C00 ; Huawei S12700 V200R009C00 , V200R008C00 , V200R007C01 , V200R007C00 ",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-8773"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008266"
},
{
"db": "CNVD",
"id": "CNVD-2016-11388"
},
{
"db": "BID",
"id": "94285"
},
{
"db": "VULHUB",
"id": "VHN-97593"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-8773",
"trust": 3.4
},
{
"db": "BID",
"id": "94285",
"trust": 2.6
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008266",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201611-370",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2016-11388",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-97593",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11388"
},
{
"db": "VULHUB",
"id": "VHN-97593"
},
{
"db": "BID",
"id": "94285"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008266"
},
{
"db": "NVD",
"id": "CVE-2016-8773"
},
{
"db": "CNNVD",
"id": "CNNVD-201611-370"
}
]
},
"id": "VAR-201704-0502",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11388"
},
{
"db": "VULHUB",
"id": "VHN-97593"
}
],
"trust": 1.5252524428571426
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11388"
}
]
},
"last_update_date": "2023-12-18T13:48:39.743000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "huawei-sa-20161111-01-mpls",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161111-01-mpls-en"
},
{
"title": "Patch for Denial of Service Vulnerability (CNVD-2016-11388) for multiple Huawei products",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/84128"
},
{
"title": "Multiple Huawei Fixes for product input validation vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=65729"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11388"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008266"
},
{
"db": "CNNVD",
"id": "CNNVD-201611-370"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-97593"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008266"
},
{
"db": "NVD",
"id": "CVE-2016-8773"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.3,
"url": "http://www.securityfocus.com/bid/94285"
},
{
"trust": 1.7,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161111-01-mpls-en"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-8773"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2016-8773"
},
{
"trust": 0.6,
"url": "http://www.huawei.com/cn/psirt/security-advisories/2016/huawei-sa-20161111-01-mpls-cn"
},
{
"trust": 0.3,
"url": "http://www.huawei.com"
},
{
"trust": 0.3,
"url": "http://www.huawei.com/en/psirt/security-advisories/2016/huawei-sa-20161111-01-mpls-en"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11388"
},
{
"db": "VULHUB",
"id": "VHN-97593"
},
{
"db": "BID",
"id": "94285"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008266"
},
{
"db": "NVD",
"id": "CVE-2016-8773"
},
{
"db": "CNNVD",
"id": "CNNVD-201611-370"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2016-11388"
},
{
"db": "VULHUB",
"id": "VHN-97593"
},
{
"db": "BID",
"id": "94285"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008266"
},
{
"db": "NVD",
"id": "CVE-2016-8773"
},
{
"db": "CNNVD",
"id": "CNNVD-201611-370"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-11-22T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-11388"
},
{
"date": "2017-04-02T00:00:00",
"db": "VULHUB",
"id": "VHN-97593"
},
{
"date": "2016-11-11T00:00:00",
"db": "BID",
"id": "94285"
},
{
"date": "2017-05-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-008266"
},
{
"date": "2017-04-02T20:59:01.407000",
"db": "NVD",
"id": "CVE-2016-8773"
},
{
"date": "2016-11-18T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201611-370"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-11-22T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-11388"
},
{
"date": "2017-04-11T00:00:00",
"db": "VULHUB",
"id": "VHN-97593"
},
{
"date": "2016-11-24T01:09:00",
"db": "BID",
"id": "94285"
},
{
"date": "2017-05-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-008266"
},
{
"date": "2017-04-11T01:13:07.097000",
"db": "NVD",
"id": "CVE-2016-8773"
},
{
"date": "2016-11-18T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201611-370"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201611-370"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Multiple Huawei Service disruption in products (DoS) Vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-008266"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "input validation",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201611-370"
}
],
"trust": 0.6
}
}
VAR-201306-0006
Vulnerability from variot - Updated: 2023-12-18 13:44The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack. Huawei networking equipment use a DES encryption algorithm for password and encryption. DES is publicly known to be easily cracked. plural Huawei The product uses the stored password DES Because of the use of the algorithm, a vulnerability exists in which a plaintext password is obtained.Brute force attack by attacker (Brute force attack) You may be able to get a plaintext password via. Huawei is the world's leading provider of information and communication solutions. Huawei Quidway is a series of switches developed by Huawei. The Huawei CX600 is based on Huawei's mature VRP platform and has powerful routing, L2/L3 multicast, 5-level H-QoS, packet buffering, and ACL capabilities. Multiple Huawei products are prone to a weak password encryption weakness. Successful exploits may allow an attacker to decrypt stored passwords; this may aid in further attacks. The following are vulnerable: Huawei Quidway series Huawei CX600 V600R001 Huawei CX600 V600R003C00SPC900 Huawei ME60 V600R002C07 and prior versions AR 19/29/49 R2207 and prior versions. Weak password encryption on Huawei products ===========================================
[ADVISORY INFORMATION] Title: Weak password encryption on Huawei products Release date: 13/11/2012 Credits: Roberto Paleari, Emaze Networks (roberto.paleari@emaze.net) Ivan Speziale, Emaze Networks (ivan.speziale@emaze.net)
[VULNERABILITY INFORMATION] Class: Information disclosure
[AFFECTED PRODUCTS] We confirm the presence of this security vulnerability on the following products: * Huawei Quidway series * Huawei CX600
Other models are probably also vulnerable, but they were not checked. As a consequence, passwords extracted from a victim's device can be deciphered instantaneously.
A Python procedure that decodes a given password is included below. Upon termination, procedure decrypt_password() returns the clear-text password.
from Crypto.Cipher import DES
def decode_char(c): if c == 'a': r = '?' else: r = c return ord(r) - ord('!')
def ascii_to_binary(s): assert len(s) == 24
out = [0]*18
i = 0
j = 0
for i in range(0, len(s), 4):
y = decode_char(s[i + 0])
y = (y << 6) & 0xffffff
k = decode_char(s[i + 1])
y = (y | k) & 0xffffff
y = (y << 6) & 0xffffff
k = decode_char(s[i + 2])
y = (y | k) & 0xffffff
y = (y << 6) & 0xffffff
k = decode_char(s[i + 3])
y = (y | k) & 0xffffff
out[j+2] = chr(y & 0xff)
out[j+1] = chr((y>>8) & 0xff)
out[j+0] = chr((y>>16) & 0xff)
j += 3
return "".join(out)
def decrypt_password(p): r = ascii_to_binary(p)
r = r[:16]
d = DES.new("\x01\x02\x03\x04\x05\x06\x07\x08", DES.MODE_ECB)
r = d.decrypt(r)
return r.rstrip("\x00")
[REMEDIATION] We recommend to store passwords using a proper hashing algorithm, instead of leveraging symmetric encryption. Further details are available at the following URL: http://support.huawei.com/enterprise/ReadLatestNewsAction.action?contentId=NEWS1000001141
[COPYRIGHT] Copyright(c) Emaze Networks S.p.A 2012, All rights reserved worldwide. Permission is hereby granted to redistribute this advisory, providing that no changes are made and that the copyright notices and disclaimers remain intact.
[DISCLAIMER] Emaze Networks S.p.A is not responsible for the misuse of the information provided in our security advisories. These advisories are a service to the professional security community. There are NO WARRANTIES with regard to this information. Any application or distribution of this information constitutes acceptance AS IS, at the user's own risk. This information is subject to change without notice
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201306-0006",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "acu",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r003c01spc100"
},
{
"model": "acu",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "acu",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00spc100"
},
{
"model": "ar g3",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "ar g3",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c01"
},
{
"model": "ar g3",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r002c00spc200"
},
{
"model": "atn",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "atn",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c01"
},
{
"model": "cx200",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r005"
},
{
"model": "cx300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r005"
},
{
"model": "cx600",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "cx600",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v600r001"
},
{
"model": "cx600",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v600r002"
},
{
"model": "cx600",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v600r003"
},
{
"model": "e200e-b",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r005c01"
},
{
"model": "e200e-c",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "e200e-x1",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r005c01"
},
{
"model": "e200e-x2",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r005c01"
},
{
"model": "eudemon1000",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r006c02"
},
{
"model": "eudemon1000e-u",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "eudemon1000e-x",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "eudemon100e",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r007"
},
{
"model": "eudemon200",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "eudemon300",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r006c02"
},
{
"model": "eudemon500",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r006c02"
},
{
"model": "eudemon8000e-x",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00spc600"
},
{
"model": "ma5200g",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r003"
},
{
"model": "ma5200g",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v300r003"
},
{
"model": "me60",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r005"
},
{
"model": "me60",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "me60",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v600r002"
},
{
"model": "me60",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v600r003"
},
{
"model": "me60",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v600r005c00spc600"
},
{
"model": "ne20",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r005"
},
{
"model": "ne40",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v300r005"
},
{
"model": "ne40e",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v600r001"
},
{
"model": "ne5000e",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v300r007"
},
{
"model": "ne5000e",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v800r002"
},
{
"model": "ne80",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v300r005"
},
{
"model": "ne80e",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v600r001"
},
{
"model": "ne80e",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v600r002"
},
{
"model": "ne80e",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v600r003"
},
{
"model": "nip100",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r001"
},
{
"model": "nip1000",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r001"
},
{
"model": "nip200",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r001"
},
{
"model": "nip2100",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r001c00"
},
{
"model": "nip2200",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r001c00"
},
{
"model": "nip5100",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r001c00"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r002"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r003"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r005"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "s3300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r002"
},
{
"model": "s3300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r003"
},
{
"model": "s3300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r005"
},
{
"model": "s3300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "s3300hi",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "s3300hi",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "s3700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r005"
},
{
"model": "s3700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "s3700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r002"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r003"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r005"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "s5300hi",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "s5300hi",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "s5306",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "s5306",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r005"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r003"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r001"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r002"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r003"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "svn2000",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "svn3000",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r002c02spc802b041"
},
{
"model": "svn5000",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "svn5300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r001c01b019"
},
{
"model": "wlan ac 6605",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "wlan ac 6605",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00spc100"
},
{
"model": "cx600",
"scope": null,
"trust": 1.2,
"vendor": "huawei",
"version": null
},
{
"model": "eudemon 8160e",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"model": "eudemon usg5500",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "e200x3",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "h3c ar\\",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "r2209"
},
{
"model": "ar 19\\/29\\/49",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "r2207"
},
{
"model": "e200x7",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "e200 usg2200",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "eudemon usg9500",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc600"
},
{
"model": "e200 usg5100",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "eudemon usg5300",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "ne40e\\/80e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v600r002"
},
{
"model": "eudemon 8080e",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"model": "e200e-usg2100",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r005c01"
},
{
"model": "ne40e\\/80e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v600r003"
},
{
"model": "e200x5",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "ne40e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v300r005"
},
{
"model": "ne20e-x6",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v300r005"
},
{
"model": "eudemon usg9300",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "ar 19/29/49",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "r2207"
},
{
"model": "e200e-x3",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "e200e-x5",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "e200e-x7",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "e200e/usg2100",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r005c01"
},
{
"model": "e200e/usg2200",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "e200e/usg5100",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "eudemon8080e",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"model": "eudemon8160e",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"model": "eudemonusg5300",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "eudemonusg5500",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "eudemonusg9300",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"model": "eudemonusg9500",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001c00spc600"
},
{
"model": "h3c ar",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "ar x9 series r2209"
},
{
"model": "ne20e-x6",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v600r003"
},
{
"model": "ne40e",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v300r003"
},
{
"model": "ne40e",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v600r002"
},
{
"model": "ne40e",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v600r003"
},
{
"model": "ne40e/80e",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v300r003"
},
{
"model": "ne40e/80e",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v600r001"
},
{
"model": "ne40e/80e",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v600r002"
},
{
"model": "ne40e/80e",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v600r003"
},
{
"model": "ne80e",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v300r003"
},
{
"model": "s2700",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r005"
},
{
"model": "ne5000e v300r007",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ne5000e v800r002",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ma5200g v200r003",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ma5200g v300r003",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ne40e/80e",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "atn v200r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "atn v200r001c01",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ne40/ne80 v300r005",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ne20e-x6 v600r003",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ne20 v200r005",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "me60",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "cx200/cx300 v100r005",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "acu v100r003c01spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "acu v200r001c00spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "acu v200r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "wlan ac v200r001c00",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "6605"
},
{
"model": "wlan ac v200r001c00spc100",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "6605"
},
{
"model": "s9300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300/s3300/s5300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300/s3300/s5300/s2700/s3 v100r005",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300/s3300/s5300/s3300hi/ v100r006",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s3300hi/s5300hi/s5306/s630 v200r001",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ar g3 v200r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ar g3 v200r001c01",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ar g3 v200r002c00spc200",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "h3c ar ar series r2209",
"scope": "lte",
"trust": 0.6,
"vendor": "huawei",
"version": "\u003c=x9"
},
{
"model": "ar r2207",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "19/29/49\u003c="
},
{
"model": "eudemon100e v200r007",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "eudemon200 v200r001",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "eudemon300\u0026500\u00261000 v200r006c02",
"scope": "lte",
"trust": 0.6,
"vendor": "huawei",
"version": "\u003c="
},
{
"model": "eudemon1000e-u/usg5300 v200r001",
"scope": "lte",
"trust": 0.6,
"vendor": "huawei",
"version": "\u003c="
},
{
"model": "eudemon1000e-x/usg5500 v200r002",
"scope": "lte",
"trust": 0.6,
"vendor": "huawei",
"version": "\u003c="
},
{
"model": "eudemon8080e\u00268160e/usg9300 v100r003c00",
"scope": "lte",
"trust": 0.6,
"vendor": "huawei",
"version": "\u003c="
},
{
"model": "eudemon8000e-x/usg9500 v200r001c00spc600",
"scope": "lte",
"trust": 0.6,
"vendor": "huawei",
"version": "\u003c="
},
{
"model": "e200e-c\u0026x3\u0026x5\u0026x7/usg2200\u00265100 v200r003c00",
"scope": "lte",
"trust": 0.6,
"vendor": "huawei",
"version": "\u003c="
},
{
"model": "e200e-b\u0026x1\u0026x2/usg2100 v100r005c01",
"scope": "lte",
"trust": 0.6,
"vendor": "huawei",
"version": "\u003c="
},
{
"model": "svn5300 v100r001c01b019",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "svn2000\u00265000 series v200r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "svn3000 v100r002c02spc802b041",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "nip100/200/1000 v100r001",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "nip2100\u00262200\u00265100 v100r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "quidway series",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "quidway series",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "0"
},
{
"model": "me60 v600r002c07",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "cx600 v600r003c00spc900",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "cx600 v600r001",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "ar r2207",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "19/29/49"
},
{
"model": "me60 v600r005c00spc900",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "cx600 v600r005c00spc900",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "cx600 v600r003c00spca00",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "ar r2209",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": "19/29/49"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#948096"
},
{
"db": "CNVD",
"id": "CNVD-2013-08074"
},
{
"db": "CNVD",
"id": "CNVD-2012-6517"
},
{
"db": "BID",
"id": "56510"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006004"
},
{
"db": "NVD",
"id": "CVE-2012-4960"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:ma5200g:v300r003:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:ma5200g:v200r003:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:ne40e:v300r005:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:atn:v200r001c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:atn:v200r001c01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:me60:v600r002:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:me60:v600r003:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:cx300:v100r005:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:acu:v100r003c01spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:acu:v200r001c00spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s9300:v100r006:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s7700:v100r003:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s5300:v100r003:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s2300:v100r005:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s3300hi:v100r006:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s5300hi:v100r006:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s3300hi:v200r001:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s5300hi:v200r001:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:ar_g3:v200r001c01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:ar_g3:v200r002c00spc200:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:eudemon_usg5500:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v200r002",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:eudemon_8160e:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v100r003c00",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:e200x5:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v200r003c00",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:e200x7:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v200r003c00",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:h3c_ar\\(oem_in\\):*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "r2209",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:eudemon500:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v200r006c02",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:svn3000:v100r002c02spc802b041:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:svn5000:v200r001c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:ne40e:v600r001:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:ne80e:v600r001:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:ne40:v300r005:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:ne80:v300r005:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:me60:v600r005c00spc600:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:cx600:v200r002:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:acu:v200r001c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:wlan_ac_6605:v200r001c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s7700:v100r006:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s2300:v100r002:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s3300:v100r005:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s5300:v100r005:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s5306:v100r006:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s6300:v100r006:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s5306:v200r001:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s6300:v200r001:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:ar_19\\/29\\/49:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "r2207",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:eudemon100e:v200r007:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:eudemon_8080e:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v100r003c00",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:eudemon_usg9300:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v100r003c00",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:e200_usg2200:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v200r003c00",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:e200_usg5100:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v200r003c00",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:eudemon1000:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v200r006c02",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:nip5100:v100r001c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:nip2200:v100r001c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:svn2000:v200r001c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:svn5300:v100r001c01b019:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:ne40e\\/80e:v600r002:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:ne80e:v600r002:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:ne20e-x6:v300r005:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:ne20:v200r005:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:cx600:v600r001:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:cx600:v600r002:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:wlan_ac_6605:v200r001c00spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s9300:v100r001:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s2300:v100r003:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s3300:v100r002:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s3700:v100r005:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s5700:v100r005:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s2700:v100r006:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s3700:v100r006:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s3700:v200r001:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s5700:v200r001:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:eudemon200:v200r001:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:eudemon300:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v200r006c02",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:eudemon1000e-u:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v200r001",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:eudemon8000e-x:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v200r001c00spc600",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:eudemon_usg9500:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v200r001c00spc600",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:e200e-b:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v100r005c01",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:e200e-x1:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v100r005c01",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:nip2100:v100r001c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:nip1000:v100r001:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:ne5000e:v300r007:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:ne5000e:v800r002:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:ne40e\\/80e:v600r003:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:ne80e:v600r003:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:me60:v100r005:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:me60:v100r006:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:cx600:v600r003:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:cx200:v100r005:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s9300:v100r002:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s9300:v100r003:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s3300:v100r003:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s5300:v100r002:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s2300:v100r006:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s3300:v100r006:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s5300:v100r006:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s5700:v100r006:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s6700:v100r006:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s6700:v200r001:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:ar_g3:v200r001c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:eudemon_usg5300:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v200r001",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:eudemon1000e-x:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v200r002",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:e200e-c:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v200r003c00",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:e200x3:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v200r003c00",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:e200e-x2:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v100r005c01",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:e200e-usg2100:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v100r005c01",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:nip200:v100r001:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:nip100:v100r001:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2012-4960"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Roberto Paleari and Ivan Speziale from Emaze Networks",
"sources": [
{
"db": "BID",
"id": "56510"
},
{
"db": "CNNVD",
"id": "CNNVD-201211-280"
}
],
"trust": 0.9
},
"cve": "CVE-2012-4960",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT DEFINED",
"baseScore": 6.5,
"collateralDamagePotential": "LOW-MEDIUM",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT DEFINED",
"enviromentalScore": 5.1,
"exploitability": "FUNCTIONAL",
"exploitabilityScore": 8.0,
"id": "CVE-2012-4960",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT DEFINED",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"remediationLevel": "OFFICIAL FIX",
"reportConfidence": "CONFIRMED",
"severity": "MEDIUM",
"targetDistribution": "MEDIUM",
"trust": 0.8,
"userInterationRequired": null,
"vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "Single",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 6.5,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2012-4960",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"id": "CNVD-2013-08074",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"id": "VHN-58241",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:S/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2012-4960",
"trust": 2.6,
"value": "MEDIUM"
},
{
"author": "CNVD",
"id": "CNVD-2013-08074",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201306-403",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-58241",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#948096"
},
{
"db": "CNVD",
"id": "CNVD-2013-08074"
},
{
"db": "VULHUB",
"id": "VHN-58241"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006004"
},
{
"db": "NVD",
"id": "CVE-2012-4960"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-403"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack. Huawei networking equipment use a DES encryption algorithm for password and encryption. DES is publicly known to be easily cracked. plural Huawei The product uses the stored password DES Because of the use of the algorithm, a vulnerability exists in which a plaintext password is obtained.Brute force attack by attacker (Brute force attack) You may be able to get a plaintext password via. Huawei is the world\u0027s leading provider of information and communication solutions. Huawei Quidway is a series of switches developed by Huawei. The Huawei CX600 is based on Huawei\u0027s mature VRP platform and has powerful routing, L2/L3 multicast, 5-level H-QoS, packet buffering, and ACL capabilities. Multiple Huawei products are prone to a weak password encryption weakness. \nSuccessful exploits may allow an attacker to decrypt stored passwords; this may aid in further attacks. \nThe following are vulnerable:\nHuawei Quidway series\nHuawei CX600 V600R001\nHuawei CX600 V600R003C00SPC900\nHuawei ME60 V600R002C07 and prior versions\nAR 19/29/49 R2207 and prior versions. Weak password encryption on Huawei products\n===========================================\n\n[ADVISORY INFORMATION]\nTitle:\t\tWeak password encryption on Huawei products\nRelease date: 13/11/2012\nCredits: \tRoberto Paleari, Emaze Networks (roberto.paleari@emaze.net)\n\t\tIvan Speziale, Emaze Networks (ivan.speziale@emaze.net)\n\n[VULNERABILITY INFORMATION]\nClass: \t Information disclosure\n\n[AFFECTED PRODUCTS]\nWe confirm the presence of this security vulnerability on the following\nproducts:\n * Huawei Quidway series\n * Huawei CX600\n\nOther models are probably also vulnerable, but they were not checked. As a consequence, passwords extracted from a\nvictim\u0027s device can be deciphered instantaneously. \n\nA Python procedure that decodes a given password is included below. Upon\ntermination, procedure decrypt_password() returns the clear-text password. \n\n\u003ccut\u003e\nfrom Crypto.Cipher import DES\n\ndef decode_char(c):\n if c == \u0027a\u0027:\n r = \u0027?\u0027\n else:\n r = c\n return ord(r) - ord(\u0027!\u0027)\n\ndef ascii_to_binary(s):\n assert len(s) == 24\n\n out = [0]*18\n i = 0\n j = 0\n\n for i in range(0, len(s), 4):\n y = decode_char(s[i + 0])\n y = (y \u003c\u003c 6) \u0026 0xffffff\n\n k = decode_char(s[i + 1])\n y = (y | k) \u0026 0xffffff\n y = (y \u003c\u003c 6) \u0026 0xffffff\n\n k = decode_char(s[i + 2])\n y = (y | k) \u0026 0xffffff\n y = (y \u003c\u003c 6) \u0026 0xffffff\n\n k = decode_char(s[i + 3])\n y = (y | k) \u0026 0xffffff\n\n out[j+2] = chr(y \u0026 0xff)\n out[j+1] = chr((y\u003e\u003e8) \u0026 0xff)\n out[j+0] = chr((y\u003e\u003e16) \u0026 0xff)\n\n j += 3\n\n return \"\".join(out)\n\ndef decrypt_password(p):\n r = ascii_to_binary(p)\n\n r = r[:16]\n\n d = DES.new(\"\\x01\\x02\\x03\\x04\\x05\\x06\\x07\\x08\", DES.MODE_ECB)\n r = d.decrypt(r)\n\n return r.rstrip(\"\\x00\")\n\u003c/cut\u003e\n\n\n[REMEDIATION] \nWe recommend to store passwords using a proper hashing algorithm, instead of\nleveraging symmetric encryption. Further details are available at the following URL:\nhttp://support.huawei.com/enterprise/ReadLatestNewsAction.action?contentId=NEWS1000001141\n\n[COPYRIGHT]\nCopyright(c) Emaze Networks S.p.A 2012, All rights reserved worldwide. \nPermission is hereby granted to redistribute this advisory, providing that no\nchanges are made and that the copyright notices and disclaimers remain intact. \n\n[DISCLAIMER]\nEmaze Networks S.p.A is not responsible for the misuse of the information\nprovided in our security advisories. These advisories are a service to the\nprofessional security community. There are NO WARRANTIES with regard to this\ninformation. Any application or distribution of this information constitutes\nacceptance AS IS, at the user\u0027s own risk. This information is subject to change\nwithout notice",
"sources": [
{
"db": "NVD",
"id": "CVE-2012-4960"
},
{
"db": "CERT/CC",
"id": "VU#948096"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006004"
},
{
"db": "CNVD",
"id": "CNVD-2013-08074"
},
{
"db": "CNVD",
"id": "CNVD-2012-6517"
},
{
"db": "BID",
"id": "56510"
},
{
"db": "VULHUB",
"id": "VHN-58241"
},
{
"db": "PACKETSTORM",
"id": "118054"
}
],
"trust": 3.87
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-58241",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-58241"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2012-4960",
"trust": 4.2
},
{
"db": "CERT/CC",
"id": "VU#948096",
"trust": 2.7
},
{
"db": "BID",
"id": "56510",
"trust": 1.6
},
{
"db": "JVN",
"id": "JVNVU90202792",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006004",
"trust": 0.8
},
{
"db": "PACKETSTORM",
"id": "118054",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2013-08074",
"trust": 0.6
},
{
"db": "CNVD",
"id": "CNVD-2012-6517",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-201211-280",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-201306-403",
"trust": 0.6
},
{
"db": "EXPLOIT-DB",
"id": "38020",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-58241",
"trust": 0.1
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#948096"
},
{
"db": "CNVD",
"id": "CNVD-2013-08074"
},
{
"db": "CNVD",
"id": "CNVD-2012-6517"
},
{
"db": "VULHUB",
"id": "VHN-58241"
},
{
"db": "BID",
"id": "56510"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006004"
},
{
"db": "PACKETSTORM",
"id": "118054"
},
{
"db": "NVD",
"id": "CVE-2012-4960"
},
{
"db": "CNNVD",
"id": "CNNVD-201211-280"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-403"
}
]
},
"id": "VAR-201306-0006",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-08074"
},
{
"db": "CNVD",
"id": "CNVD-2012-6517"
},
{
"db": "VULHUB",
"id": "VHN-58241"
}
],
"trust": 2.164663294642857
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 1.2
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-08074"
},
{
"db": "CNVD",
"id": "CNVD-2012-6517"
}
]
},
"last_update_date": "2023-12-18T13:44:36.277000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Huawei-SA-20120827-01-CX600",
"trust": 0.8,
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
},
{
"title": "Huawei multiple product encryption is not a strong vulnerability patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/34800"
},
{
"title": "Huawei patch for multiple product password encryption vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/25088"
},
{
"title": "Huawei Fixing measures for vulnerabilities of encryption problems in many products",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=170984"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-08074"
},
{
"db": "CNVD",
"id": "CNVD-2012-6517"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006004"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-403"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-310",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-58241"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006004"
},
{
"db": "NVD",
"id": "CVE-2012-4960"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.3,
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
},
{
"trust": 1.9,
"url": "http://www.kb.cert.org/vuls/id/948096"
},
{
"trust": 0.8,
"url": "about vulnerability notes"
},
{
"trust": 0.8,
"url": "contact us about this vulnerability"
},
{
"trust": 0.8,
"url": "provide a vendor statement"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-4960"
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnvu90202792/index.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-4960"
},
{
"trust": 0.6,
"url": "http://packetstormsecurity.org/files/118054/huawei-weak-password-encryption.html"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/bid/56510"
},
{
"trust": 0.4,
"url": "http://support.huawei.com/enterprise/readlatestnewsaction.action?contentid=news1000001141"
},
{
"trust": 0.3,
"url": "http://www.huawei.com/"
},
{
"trust": 0.3,
"url": "msg://bugtraq/201211130911.qad9ba1q022014@sf01web1.securityfocus.com"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#948096"
},
{
"db": "CNVD",
"id": "CNVD-2013-08074"
},
{
"db": "CNVD",
"id": "CNVD-2012-6517"
},
{
"db": "VULHUB",
"id": "VHN-58241"
},
{
"db": "BID",
"id": "56510"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006004"
},
{
"db": "PACKETSTORM",
"id": "118054"
},
{
"db": "NVD",
"id": "CVE-2012-4960"
},
{
"db": "CNNVD",
"id": "CNNVD-201211-280"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-403"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#948096"
},
{
"db": "CNVD",
"id": "CNVD-2013-08074"
},
{
"db": "CNVD",
"id": "CNVD-2012-6517"
},
{
"db": "VULHUB",
"id": "VHN-58241"
},
{
"db": "BID",
"id": "56510"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006004"
},
{
"db": "PACKETSTORM",
"id": "118054"
},
{
"db": "NVD",
"id": "CVE-2012-4960"
},
{
"db": "CNNVD",
"id": "CNNVD-201211-280"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-403"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-08-05T00:00:00",
"db": "CERT/CC",
"id": "VU#948096"
},
{
"date": "2013-06-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-08074"
},
{
"date": "2012-11-16T00:00:00",
"db": "CNVD",
"id": "CNVD-2012-6517"
},
{
"date": "2013-06-20T00:00:00",
"db": "VULHUB",
"id": "VHN-58241"
},
{
"date": "2012-11-13T00:00:00",
"db": "BID",
"id": "56510"
},
{
"date": "2013-06-24T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2012-006004"
},
{
"date": "2012-11-13T23:22:55",
"db": "PACKETSTORM",
"id": "118054"
},
{
"date": "2013-06-20T15:55:00.897000",
"db": "NVD",
"id": "CVE-2012-4960"
},
{
"date": "2012-11-16T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201211-280"
},
{
"date": "2013-06-26T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201306-403"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-10-03T00:00:00",
"db": "CERT/CC",
"id": "VU#948096"
},
{
"date": "2013-07-01T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-08074"
},
{
"date": "2012-11-16T00:00:00",
"db": "CNVD",
"id": "CNVD-2012-6517"
},
{
"date": "2013-08-22T00:00:00",
"db": "VULHUB",
"id": "VHN-58241"
},
{
"date": "2015-03-19T08:28:00",
"db": "BID",
"id": "56510"
},
{
"date": "2013-08-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2012-006004"
},
{
"date": "2013-08-22T03:59:17.713000",
"db": "NVD",
"id": "CVE-2012-4960"
},
{
"date": "2012-12-05T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201211-280"
},
{
"date": "2021-11-24T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201306-403"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201211-280"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-403"
}
],
"trust": 1.2
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei networking equipment weak password cipher",
"sources": [
{
"db": "CERT/CC",
"id": "VU#948096"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "encryption problem",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201211-280"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-403"
}
],
"trust": 1.2
}
}
VAR-201604-0306
Vulnerability from variot - Updated: 2023-12-18 13:44Huawei Quidway S9700, S5700, S5300, S9300, and S7700 switches with software before V200R003SPH012 allow remote attackers to cause a denial of service (switch restart) via crafted traffic. Huawei S9300, S5700, S5300, S9300, and S7700 are all S series switches of Huawei. There are security vulnerabilities in various HuaweiQuidway switches. Multiple Huawei Quidway S-Series Switches are prone to a denial-of-service vulnerability. Huawei Quidway S9700, S5700, S5300, S9300, and S7700 are all S-series switch products of China's Huawei (Huawei). The following products and versions are affected: Huawei Quidway S9700, S5700, S5300, S9300, and S7700 using software versions earlier than V200R003SPH012
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201604-0306",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "s9300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "quidway s9700",
"scope": null,
"trust": 1.4,
"vendor": "huawei",
"version": null
},
{
"model": "quidway s5700",
"scope": null,
"trust": 1.4,
"vendor": "huawei",
"version": null
},
{
"model": "quidway s5300",
"scope": null,
"trust": 1.4,
"vendor": "huawei",
"version": null
},
{
"model": "quidway s9300",
"scope": null,
"trust": 1.4,
"vendor": "huawei",
"version": null
},
{
"model": "quidway s7700",
"scope": null,
"trust": 1.4,
"vendor": "huawei",
"version": null
},
{
"model": "quidway",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003sph012"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02160"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-002072"
},
{
"db": "NVD",
"id": "CVE-2016-3678"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-178"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:huawei:s7700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:huawei:s5700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:huawei:s9300_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:huawei:s5300_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:huawei:s9700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2016-3678"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor reported this issue.",
"sources": [
{
"db": "BID",
"id": "85731"
}
],
"trust": 0.3
},
"cve": "CVE-2016-3678",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": true,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 7.8,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2016-3678",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2016-02160",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-92497",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2016-3678",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2016-3678",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2016-02160",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201604-178",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-92497",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02160"
},
{
"db": "VULHUB",
"id": "VHN-92497"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-002072"
},
{
"db": "NVD",
"id": "CVE-2016-3678"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-178"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei Quidway S9700, S5700, S5300, S9300, and S7700 switches with software before V200R003SPH012 allow remote attackers to cause a denial of service (switch restart) via crafted traffic. Huawei S9300, S5700, S5300, S9300, and S7700 are all S series switches of Huawei. There are security vulnerabilities in various HuaweiQuidway switches. Multiple Huawei Quidway S-Series Switches are prone to a denial-of-service vulnerability. Huawei Quidway S9700, S5700, S5300, S9300, and S7700 are all S-series switch products of China\u0027s Huawei (Huawei). The following products and versions are affected: Huawei Quidway S9700, S5700, S5300, S9300, and S7700 using software versions earlier than V200R003SPH012",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-3678"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-002072"
},
{
"db": "CNVD",
"id": "CNVD-2016-02160"
},
{
"db": "BID",
"id": "85731"
},
{
"db": "VULHUB",
"id": "VHN-92497"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-3678",
"trust": 3.4
},
{
"db": "JVNDB",
"id": "JVNDB-2016-002072",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201604-178",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2016-02160",
"trust": 0.6
},
{
"db": "BID",
"id": "85731",
"trust": 0.3
},
{
"db": "VULHUB",
"id": "VHN-92497",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02160"
},
{
"db": "VULHUB",
"id": "VHN-92497"
},
{
"db": "BID",
"id": "85731"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-002072"
},
{
"db": "NVD",
"id": "CVE-2016-3678"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-178"
}
]
},
"id": "VAR-201604-0306",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02160"
},
{
"db": "VULHUB",
"id": "VHN-92497"
}
],
"trust": 1.2715110655555555
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02160"
}
]
},
"last_update_date": "2023-12-18T13:44:13.822000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "huawei-sa-20160330-01-switch",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160330-01-switch-en"
},
{
"title": "Patches for multiple HuaweiQuidway switch denial of service vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/73980"
},
{
"title": "Multiple Huawei Quidway Repair measures for switch denial of service vulnerability",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=60879"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02160"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-002072"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-178"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-92497"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-002072"
},
{
"db": "NVD",
"id": "CVE-2016-3678"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.6,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160330-01-switch-en"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-3678"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-3678"
},
{
"trust": 0.3,
"url": "http://www.huawei.com"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02160"
},
{
"db": "VULHUB",
"id": "VHN-92497"
},
{
"db": "BID",
"id": "85731"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-002072"
},
{
"db": "NVD",
"id": "CVE-2016-3678"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-178"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2016-02160"
},
{
"db": "VULHUB",
"id": "VHN-92497"
},
{
"db": "BID",
"id": "85731"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-002072"
},
{
"db": "NVD",
"id": "CVE-2016-3678"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-178"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-04-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-02160"
},
{
"date": "2016-04-11T00:00:00",
"db": "VULHUB",
"id": "VHN-92497"
},
{
"date": "2016-03-30T00:00:00",
"db": "BID",
"id": "85731"
},
{
"date": "2016-04-18T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-002072"
},
{
"date": "2016-04-11T15:59:10.597000",
"db": "NVD",
"id": "CVE-2016-3678"
},
{
"date": "2016-04-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201604-178"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-04-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-02160"
},
{
"date": "2016-04-14T00:00:00",
"db": "VULHUB",
"id": "VHN-92497"
},
{
"date": "2016-03-30T00:00:00",
"db": "BID",
"id": "85731"
},
{
"date": "2016-04-18T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-002072"
},
{
"date": "2016-04-14T20:18:10.387000",
"db": "NVD",
"id": "CVE-2016-3678"
},
{
"date": "2016-04-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201604-178"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201604-178"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei Quidway Denial of service in switch product software (DoS) Vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-002072"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "input validation",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201604-178"
}
],
"trust": 0.6
}
}
VAR-201609-0096
Vulnerability from variot - Updated: 2023-12-18 13:39Memory leak in Huawei S9300, S5300, S5700, S6700, S7700, S9700, and S12700 devices allows remote attackers to cause a denial of service (memory consumption and restart) via a large number of malformed packets. The Huawei S7700, S9300, S9700, and S12700 are Huawei's intelligent routing switches. A remote denial of service vulnerability exists in several HuaweiSwitches. The following products and versions are affected: Huawei S9300 V200R001C00 , V200R003C00 , V200R005C00 , V200R006C00 , V200R008C00 , S5300 V200R001C00 , V200R002C00 , V200R003C00 , V200R005C00 , V200R005C01 , V200R005C02 , V200R006C00 , V200R007C00 , V200R008C00 , S5700 V200R001C00 , V200R001C01 , V200R002C00 , V200R003C00 , V200R003C02 , V200R005C00 , V200R006C00 , V200R008C00 , S6300 V200R001C00 , V200R002C00 , V200R003C00 , V200R005C00 , V200R005C01 , V200R005C02 , V200R008C00 , S6700 V200R001C00 , V200R001C01 , V200R002C00 , V200R003C00 , V200R008C00 , S7700 V200R001C00 , V200R002C00 , V200R003C00 , V200R005C00 , V200R006C00 , V200R008C00 , S9700 V200R001C00 , V200R001C01 , V200R002C00 , V200R003C00, V200R005C00, V200R006C00, V200R008C00, S12700 V200R005C00, V200R006C00, V200R008C00
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201609-0096",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "s9300",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "v200r001c01"
},
{
"model": "s9700",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r005c01"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r005c02"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c01"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r003c02"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r005c01"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r005c02"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c01"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s5700 v200r001c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r003c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r005c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r003c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r005c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r003c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r005c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r005c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r001c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r002c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r006c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r001c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r001c01",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r002c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r006c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r008c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r006c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r008c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r001c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r001c01",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r002c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r003c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r008c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r001c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r002c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r003c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r005c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r005c01",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r005c02",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r008c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r001c01",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r002c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r003c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r003c02",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r005c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r006c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r008c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r003c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r005c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r005c01",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r005c02",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r006c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r008c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r001c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r006c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r008c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s12700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s6300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s6700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s7700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r002c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r008sph005",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r008c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r003sph019",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r008sph005",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r008c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r003sph019",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r008sph005",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r008c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r003sph019",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r008sph005",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r005sph012",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r005c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r008sph005",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r005sph012",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r005c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r008sph005",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r008c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5300li v200r003sph011",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r008sph005",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r008c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r003sph019",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r008sph005",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r008c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "v200r008sph005",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": "7700"
},
{
"model": "v200r003sph019",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": "7700"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-08070"
},
{
"db": "BID",
"id": "92968"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-005041"
},
{
"db": "NVD",
"id": "CVE-2016-6518"
},
{
"db": "CNNVD",
"id": "CNNVD-201609-365"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r003c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r005c01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r001c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r002c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r005c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r005c02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s12700_firmware:v200r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s12700_firmware:v200r005c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r001c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r003c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r005c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r005c01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r005c02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r002c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r002c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r003c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r005c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r001c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r001c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r002c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r003c02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r001c01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r001c01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r003c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r001c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r002c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r002c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r003c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r005c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r001c01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r001c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r003c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r005c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r001c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2016-6518"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor reported the issue.",
"sources": [
{
"db": "BID",
"id": "92968"
}
],
"trust": 0.3
},
"cve": "CVE-2016-6518",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 5.0,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2016-6518",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"exploitabilityScore": 4.9,
"id": "CNVD-2016-08070",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "LOW",
"trust": 0.6,
"vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-95338",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2016-6518",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2016-6518",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2016-08070",
"trust": 0.6,
"value": "LOW"
},
{
"author": "CNNVD",
"id": "CNNVD-201609-365",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-95338",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-08070"
},
{
"db": "VULHUB",
"id": "VHN-95338"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-005041"
},
{
"db": "NVD",
"id": "CVE-2016-6518"
},
{
"db": "CNNVD",
"id": "CNNVD-201609-365"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Memory leak in Huawei S9300, S5300, S5700, S6700, S7700, S9700, and S12700 devices allows remote attackers to cause a denial of service (memory consumption and restart) via a large number of malformed packets. The Huawei S7700, S9300, S9700, and S12700 are Huawei\u0027s intelligent routing switches. A remote denial of service vulnerability exists in several HuaweiSwitches. The following products and versions are affected: Huawei S9300 V200R001C00 , V200R003C00 , V200R005C00 , V200R006C00 , V200R008C00 , S5300 V200R001C00 , V200R002C00 , V200R003C00 , V200R005C00 , V200R005C01 , V200R005C02 , V200R006C00 , V200R007C00 , V200R008C00 , S5700 V200R001C00 , V200R001C01 , V200R002C00 , V200R003C00 , V200R003C02 , V200R005C00 , V200R006C00 , V200R008C00 , S6300 V200R001C00 , V200R002C00 , V200R003C00 , V200R005C00 , V200R005C01 , V200R005C02 , V200R008C00 , S6700 V200R001C00 , V200R001C01 , V200R002C00 , V200R003C00 , V200R008C00 , S7700 V200R001C00 , V200R002C00 , V200R003C00 , V200R005C00 , V200R006C00 , V200R008C00 , S9700 V200R001C00 , V200R001C01 , V200R002C00 , V200R003C00, V200R005C00, V200R006C00, V200R008C00, S12700 V200R005C00, V200R006C00, V200R008C00",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-6518"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-005041"
},
{
"db": "CNVD",
"id": "CNVD-2016-08070"
},
{
"db": "BID",
"id": "92968"
},
{
"db": "VULHUB",
"id": "VHN-95338"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-6518",
"trust": 3.4
},
{
"db": "BID",
"id": "92968",
"trust": 2.6
},
{
"db": "JVNDB",
"id": "JVNDB-2016-005041",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201609-365",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2016-08070",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-95338",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-08070"
},
{
"db": "VULHUB",
"id": "VHN-95338"
},
{
"db": "BID",
"id": "92968"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-005041"
},
{
"db": "NVD",
"id": "CVE-2016-6518"
},
{
"db": "CNNVD",
"id": "CNNVD-201609-365"
}
]
},
"id": "VAR-201609-0096",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-08070"
},
{
"db": "VULHUB",
"id": "VHN-95338"
}
],
"trust": 1.5096517435897436
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-08070"
}
]
},
"last_update_date": "2023-12-18T13:39:10.113000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "huawei-sa-20160914-01-sep",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160914-01-sep-en"
},
{
"title": "Patches for several HuaweiSwitches Remote Denial of Service Vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/81677"
},
{
"title": "Multiple Huawei Repair measures for product remote denial of service vulnerability",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=64163"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-08070"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-005041"
},
{
"db": "CNNVD",
"id": "CNNVD-201609-365"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-399",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-95338"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-005041"
},
{
"db": "NVD",
"id": "CVE-2016-6518"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.6,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160914-01-sep-en"
},
{
"trust": 2.3,
"url": "http://www.securityfocus.com/bid/92968"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-6518"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-6518"
},
{
"trust": 0.3,
"url": "http://www.huawei.com"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-08070"
},
{
"db": "VULHUB",
"id": "VHN-95338"
},
{
"db": "BID",
"id": "92968"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-005041"
},
{
"db": "NVD",
"id": "CVE-2016-6518"
},
{
"db": "CNNVD",
"id": "CNNVD-201609-365"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2016-08070"
},
{
"db": "VULHUB",
"id": "VHN-95338"
},
{
"db": "BID",
"id": "92968"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-005041"
},
{
"db": "NVD",
"id": "CVE-2016-6518"
},
{
"db": "CNNVD",
"id": "CNNVD-201609-365"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-09-26T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-08070"
},
{
"date": "2016-09-26T00:00:00",
"db": "VULHUB",
"id": "VHN-95338"
},
{
"date": "2016-09-14T00:00:00",
"db": "BID",
"id": "92968"
},
{
"date": "2016-10-04T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-005041"
},
{
"date": "2016-09-26T15:59:01.780000",
"db": "NVD",
"id": "CVE-2016-6518"
},
{
"date": "2016-09-19T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201609-365"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-09-26T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-08070"
},
{
"date": "2016-09-28T00:00:00",
"db": "VULHUB",
"id": "VHN-95338"
},
{
"date": "2016-09-14T00:00:00",
"db": "BID",
"id": "92968"
},
{
"date": "2016-10-04T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-005041"
},
{
"date": "2016-09-28T13:48:45.757000",
"db": "NVD",
"id": "CVE-2016-6518"
},
{
"date": "2016-09-27T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201609-365"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201609-365"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei Service disruption on devices (DoS) Vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-005041"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "resource management error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201609-365"
}
],
"trust": 0.6
}
}
VAR-201601-0158
Vulnerability from variot - Updated: 2023-12-18 13:34Huawei S5300 Campus Series switches with software before V200R005SPH008 do not mask the password when uploading files, which allows physically proximate attackers to obtain sensitive password information by reading the display. HuaweiEthernetSwitch is an Ethernet switch product from China Huawei. A security vulnerability exists in HuaweiEthernetSwitch, which allows an attacker to submit a special request for sensitive information. Attackers can exploit this issue to obtain sensitive information that may aid in launching further attacks. There is a security vulnerability in the Huawei S5300 using software versions earlier than V200R005SPH008. The vulnerability stems from the fact that the program does not hide passwords when uploading files
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201601-0158",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "s5300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r005c02"
},
{
"model": "s5300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5300",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r005sph008"
},
{
"model": "ethernet switches",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r005c02",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r005sph008",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-00361"
},
{
"db": "BID",
"id": "80359"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006831"
},
{
"db": "NVD",
"id": "CVE-2015-8675"
},
{
"db": "CNNVD",
"id": "CNNVD-201601-272"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r005c02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s5300:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2015-8675"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor reported the issue.",
"sources": [
{
"db": "BID",
"id": "80359"
}
],
"trust": 0.3
},
"cve": "CVE-2015-8675",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"trust": 1.0,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Local",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 2.1,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2015-8675",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Low",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CNVD-2016-00361",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "LOW",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "VHN-86636",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "LOW",
"trust": 0.1,
"vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.5,
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2015-8675",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2015-8675",
"trust": 0.8,
"value": "Low"
},
{
"author": "CNVD",
"id": "CNVD-2016-00361",
"trust": 0.6,
"value": "LOW"
},
{
"author": "CNNVD",
"id": "CNNVD-201601-272",
"trust": 0.6,
"value": "LOW"
},
{
"author": "VULHUB",
"id": "VHN-86636",
"trust": 0.1,
"value": "LOW"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-00361"
},
{
"db": "VULHUB",
"id": "VHN-86636"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006831"
},
{
"db": "NVD",
"id": "CVE-2015-8675"
},
{
"db": "CNNVD",
"id": "CNNVD-201601-272"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei S5300 Campus Series switches with software before V200R005SPH008 do not mask the password when uploading files, which allows physically proximate attackers to obtain sensitive password information by reading the display. HuaweiEthernetSwitch is an Ethernet switch product from China Huawei. A security vulnerability exists in HuaweiEthernetSwitch, which allows an attacker to submit a special request for sensitive information. \nAttackers can exploit this issue to obtain sensitive information that may aid in launching further attacks. There is a security vulnerability in the Huawei S5300 using software versions earlier than V200R005SPH008. The vulnerability stems from the fact that the program does not hide passwords when uploading files",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-8675"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006831"
},
{
"db": "CNVD",
"id": "CNVD-2016-00361"
},
{
"db": "BID",
"id": "80359"
},
{
"db": "VULHUB",
"id": "VHN-86636"
}
],
"trust": 2.52
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-86636",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-86636"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-8675",
"trust": 3.4
},
{
"db": "BID",
"id": "80359",
"trust": 1.6
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006831",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201601-272",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2016-00361",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-86636",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-00361"
},
{
"db": "VULHUB",
"id": "VHN-86636"
},
{
"db": "BID",
"id": "80359"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006831"
},
{
"db": "NVD",
"id": "CVE-2015-8675"
},
{
"db": "CNNVD",
"id": "CNNVD-201601-272"
}
]
},
"id": "VAR-201601-0158",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-00361"
},
{
"db": "VULHUB",
"id": "VHN-86636"
}
],
"trust": 1.4677305
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-00361"
}
]
},
"last_update_date": "2023-12-18T13:34:27.129000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Huawei-SA-20160112-01-Switch",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160112-01-switch-en"
},
{
"title": "HuaweiEthernetSwitch Local Information Disclosure Vulnerability Patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/70248"
},
{
"title": "Huawei S5300 Fixes for local information disclosure vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=59611"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-00361"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006831"
},
{
"db": "CNNVD",
"id": "CNNVD-201601-272"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-255",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-86636"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006831"
},
{
"db": "NVD",
"id": "CVE-2015-8675"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.0,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160112-01-switch-en"
},
{
"trust": 1.2,
"url": "http://www.securityfocus.com/bid/80359"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8675"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-8675"
},
{
"trust": 0.3,
"url": "http://www.huawei.com"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-00361"
},
{
"db": "VULHUB",
"id": "VHN-86636"
},
{
"db": "BID",
"id": "80359"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006831"
},
{
"db": "NVD",
"id": "CVE-2015-8675"
},
{
"db": "CNNVD",
"id": "CNNVD-201601-272"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2016-00361"
},
{
"db": "VULHUB",
"id": "VHN-86636"
},
{
"db": "BID",
"id": "80359"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006831"
},
{
"db": "NVD",
"id": "CVE-2015-8675"
},
{
"db": "CNNVD",
"id": "CNNVD-201601-272"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-01-20T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-00361"
},
{
"date": "2016-01-15T00:00:00",
"db": "VULHUB",
"id": "VHN-86636"
},
{
"date": "2016-01-12T00:00:00",
"db": "BID",
"id": "80359"
},
{
"date": "2016-01-26T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-006831"
},
{
"date": "2016-01-15T19:59:00.117000",
"db": "NVD",
"id": "CVE-2015-8675"
},
{
"date": "2016-01-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201601-272"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-01-20T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-00361"
},
{
"date": "2016-01-21T00:00:00",
"db": "VULHUB",
"id": "VHN-86636"
},
{
"date": "2016-01-12T00:00:00",
"db": "BID",
"id": "80359"
},
{
"date": "2016-01-26T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-006831"
},
{
"date": "2016-01-21T17:29:09.397000",
"db": "NVD",
"id": "CVE-2015-8675"
},
{
"date": "2016-01-18T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201601-272"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "BID",
"id": "80359"
},
{
"db": "CNNVD",
"id": "CNNVD-201601-272"
}
],
"trust": 0.9
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei S5300 Vulnerability in the acquisition of important password information in series switch software",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-006831"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "trust management",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201601-272"
}
],
"trust": 0.6
}
}
VAR-201706-0187
Vulnerability from variot - Updated: 2023-12-18 13:29The user authentication module in Huawei Campus switches S5700, S5300, S6300, and S6700 with software before V200R001SPH012 and S7700, S9300, and S9700 with software before V200R001SPH015 allows remote attackers to cause a denial of service (device restart) via vectors involving authentication, which trigger an array access violation. Huawei Campus Series Switches are prone to a denial-of-service vulnerability. Attackers can exploit this issue to restart the affected device, denying service to legitimate users. Huawei Campus switches S5700, etc. are all switch products of China's Huawei (Huawei). The user authentication module is a module for user login authentication. The following products and versions are affected: Huawei Campus switches S5700 V200R001SPH012 Version; Campus switches S5300 V200R001SPH012 Version; Campus switches S6300 V200R001SPH012 Version; Campus switches S6700 V200R001SPH012 Version; Campus switches S7700 V200R001SPH012 Version; Campus switches S9300 V200R001SPH012 Version; Campus switches S9700 V200R001SPH012 Version
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201706-0187",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "s6700",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s9700",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s9300",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s7700",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s5700",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s5300",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s6300",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s5300",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001sph012"
},
{
"model": "s5700",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001sph012"
},
{
"model": "s6300",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001sph012"
},
{
"model": "s6700",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001sph012"
},
{
"model": "s7700",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001sph015"
},
{
"model": "s9300",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001sph015"
},
{
"model": "s9700",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001sph015"
},
{
"model": "s5300",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s5700",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s6700",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s9700",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s6300",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s7700",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s9300",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "v200r001c00spc300"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-007609"
},
{
"db": "NVD",
"id": "CVE-2015-2800"
},
{
"db": "CNNVD",
"id": "CNNVD-201504-531"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v200r001c00spc300",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:campus_s5700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v200r001c00spc300",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:campus_s5300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v200r001c00spc300",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:campus_s6300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v200r001c00spc300",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:campus_s6700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v200r001c00spc300",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:campus_s7700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v200r001c00spc300",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:campus_s9300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v200r001c00spc300",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:campus_s9700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2015-2800"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "vhunter",
"sources": [
{
"db": "BID",
"id": "73355"
},
{
"db": "CNNVD",
"id": "CNNVD-201504-531"
}
],
"trust": 0.9
},
"cve": "CVE-2015-2800",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 7.8,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2015-2800",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-80761",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2015-2800",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2015-2800",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201504-531",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-80761",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-80761"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007609"
},
{
"db": "NVD",
"id": "CVE-2015-2800"
},
{
"db": "CNNVD",
"id": "CNNVD-201504-531"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The user authentication module in Huawei Campus switches S5700, S5300, S6300, and S6700 with software before V200R001SPH012 and S7700, S9300, and S9700 with software before V200R001SPH015 allows remote attackers to cause a denial of service (device restart) via vectors involving authentication, which trigger an array access violation. Huawei Campus Series Switches are prone to a denial-of-service vulnerability. \nAttackers can exploit this issue to restart the affected device, denying service to legitimate users. Huawei Campus switches S5700, etc. are all switch products of China\u0027s Huawei (Huawei). The user authentication module is a module for user login authentication. The following products and versions are affected: Huawei Campus switches S5700 V200R001SPH012 Version; Campus switches S5300 V200R001SPH012 Version; Campus switches S6300 V200R001SPH012 Version; Campus switches S6700 V200R001SPH012 Version; Campus switches S7700 V200R001SPH012 Version; Campus switches S9300 V200R001SPH012 Version; Campus switches S9700 V200R001SPH012 Version",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-2800"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007609"
},
{
"db": "BID",
"id": "73355"
},
{
"db": "VULHUB",
"id": "VHN-80761"
}
],
"trust": 1.98
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-2800",
"trust": 2.8
},
{
"db": "BID",
"id": "73355",
"trust": 2.0
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007609",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201504-531",
"trust": 0.7
},
{
"db": "VULHUB",
"id": "VHN-80761",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-80761"
},
{
"db": "BID",
"id": "73355"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007609"
},
{
"db": "NVD",
"id": "CVE-2015-2800"
},
{
"db": "CNNVD",
"id": "CNNVD-201504-531"
}
]
},
"id": "VAR-201706-0187",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-80761"
}
],
"trust": 0.66499138
},
"last_update_date": "2023-12-18T13:29:17.104000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Huawei-SA-20150319-01-Campus switch",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/hw-418554"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-007609"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-287",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-80761"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007609"
},
{
"db": "NVD",
"id": "CVE-2015-2800"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/73355"
},
{
"trust": 1.7,
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-418554.htm"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2800"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2015-2800"
},
{
"trust": 0.3,
"url": "http://www.huawei.com/"
},
{
"trust": 0.3,
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/archive/hw-418554.htm"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-80761"
},
{
"db": "BID",
"id": "73355"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007609"
},
{
"db": "NVD",
"id": "CVE-2015-2800"
},
{
"db": "CNNVD",
"id": "CNNVD-201504-531"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-80761"
},
{
"db": "BID",
"id": "73355"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007609"
},
{
"db": "NVD",
"id": "CVE-2015-2800"
},
{
"db": "CNNVD",
"id": "CNNVD-201504-531"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-06-08T00:00:00",
"db": "VULHUB",
"id": "VHN-80761"
},
{
"date": "2015-03-19T00:00:00",
"db": "BID",
"id": "73355"
},
{
"date": "2017-07-07T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-007609"
},
{
"date": "2017-06-08T16:29:00.403000",
"db": "NVD",
"id": "CVE-2015-2800"
},
{
"date": "2015-03-19T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201504-531"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-06-20T00:00:00",
"db": "VULHUB",
"id": "VHN-80761"
},
{
"date": "2015-05-07T17:22:00",
"db": "BID",
"id": "73355"
},
{
"date": "2017-07-07T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-007609"
},
{
"date": "2017-06-20T13:20:13.737000",
"db": "NVD",
"id": "CVE-2015-2800"
},
{
"date": "2017-06-09T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201504-531"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201504-531"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei Campus Service operation interruption in user authentication module of switch products (DoS) Vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-007609"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "authorization issue",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201504-531"
}
],
"trust": 0.6
}
}
VAR-201801-0087
Vulnerability from variot - Updated: 2023-12-18 13:24Multiple Huawei Campus switches allow remote attackers to enumerate usernames via vectors involving use of SSH by the maintenance terminal. plural Huawei Campus A switch product contains an information disclosure vulnerability.Information may be obtained. Huawei Campus Series Switches is China's Huawei series of Campus switches. Huawei Campus Series Switches has a user enumeration vulnerability that allows an attacker to exploit a vulnerability to obtain a valid username and initiate further attacks. An attacker may leverage this issue to harvest valid usernames, which may aid in further attacks. A remote attacker can use this vulnerability to log in to the server through SSH to guess whether a user name exists on the switch device based on the information returned by the server
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201801-0087",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "s3700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c05"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c05"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c05"
},
{
"model": "s3300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c05"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "s9300e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s9300e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s9300e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s2300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s2700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s3300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s3700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s6300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s6700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s7700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9300e",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "campus series switches",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-05162"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008459"
},
{
"db": "NVD",
"id": "CVE-2014-5394"
},
{
"db": "CNNVD",
"id": "CNNVD-201408-326"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300e_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300e_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300e_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s9300e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s2300_firmware:v100r006c05:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s2700_firmware:v100r006c05:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s3300_firmware:v100r006c05:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s3300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s3700_firmware:v100r006c05:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s3700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2014-5394"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei",
"sources": [
{
"db": "BID",
"id": "69302"
},
{
"db": "CNNVD",
"id": "CNNVD-201408-326"
}
],
"trust": 0.9
},
"cve": "CVE-2014-5394",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 4.3,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2014-5394",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2014-05162",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-73335",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.2,
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
{
"attackComplexity": "High",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 5.9,
"baseSeverity": "Medium",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2014-5394",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2014-5394",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CNVD",
"id": "CNVD-2014-05162",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201408-326",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-73335",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-05162"
},
{
"db": "VULHUB",
"id": "VHN-73335"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008459"
},
{
"db": "NVD",
"id": "CVE-2014-5394"
},
{
"db": "CNNVD",
"id": "CNNVD-201408-326"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Multiple Huawei Campus switches allow remote attackers to enumerate usernames via vectors involving use of SSH by the maintenance terminal. plural Huawei Campus A switch product contains an information disclosure vulnerability.Information may be obtained. Huawei Campus Series Switches is China\u0027s Huawei series of Campus switches. Huawei Campus Series Switches has a user enumeration vulnerability that allows an attacker to exploit a vulnerability to obtain a valid username and initiate further attacks. \nAn attacker may leverage this issue to harvest valid usernames, which may aid in further attacks. A remote attacker can use this vulnerability to log in to the server through SSH to guess whether a user name exists on the switch device based on the information returned by the server",
"sources": [
{
"db": "NVD",
"id": "CVE-2014-5394"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008459"
},
{
"db": "CNVD",
"id": "CNVD-2014-05162"
},
{
"db": "BID",
"id": "69302"
},
{
"db": "VULHUB",
"id": "VHN-73335"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2014-5394",
"trust": 2.8
},
{
"db": "BID",
"id": "69302",
"trust": 2.6
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008459",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201408-326",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2014-05162",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-73335",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-05162"
},
{
"db": "VULHUB",
"id": "VHN-73335"
},
{
"db": "BID",
"id": "69302"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008459"
},
{
"db": "NVD",
"id": "CVE-2014-5394"
},
{
"db": "CNNVD",
"id": "CNNVD-201408-326"
}
]
},
"id": "VAR-201801-0087",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-05162"
},
{
"db": "VULHUB",
"id": "VHN-73335"
}
],
"trust": 1.3045695790909089
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-05162"
}
]
},
"last_update_date": "2023-12-18T13:24:12.542000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Huawei-SA-20140820-01-Campus Switch",
"trust": 0.8,
"url": "http://www.huawei.com/us/psirt/security-advisories/2014/hw-362701"
},
{
"title": "Huawei Campus Series Switches User Enumeration Patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/49234"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-05162"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008459"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-200",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-73335"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008459"
},
{
"db": "NVD",
"id": "CVE-2014-5394"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.3,
"url": "http://www.securityfocus.com/bid/69302"
},
{
"trust": 1.7,
"url": "http://www.huawei.com/us/psirt/security-advisories/2014/hw-362701"
},
{
"trust": 1.7,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97763"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-5394"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2014-5394"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-05162"
},
{
"db": "VULHUB",
"id": "VHN-73335"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008459"
},
{
"db": "NVD",
"id": "CVE-2014-5394"
},
{
"db": "CNNVD",
"id": "CNNVD-201408-326"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2014-05162"
},
{
"db": "VULHUB",
"id": "VHN-73335"
},
{
"db": "BID",
"id": "69302"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008459"
},
{
"db": "NVD",
"id": "CVE-2014-5394"
},
{
"db": "CNNVD",
"id": "CNNVD-201408-326"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-08-22T00:00:00",
"db": "CNVD",
"id": "CNVD-2014-05162"
},
{
"date": "2018-01-08T00:00:00",
"db": "VULHUB",
"id": "VHN-73335"
},
{
"date": "2014-08-20T00:00:00",
"db": "BID",
"id": "69302"
},
{
"date": "2018-02-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-008459"
},
{
"date": "2018-01-08T19:29:00.610000",
"db": "NVD",
"id": "CVE-2014-5394"
},
{
"date": "2014-08-21T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201408-326"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-08-22T00:00:00",
"db": "CNVD",
"id": "CNVD-2014-05162"
},
{
"date": "2018-01-29T00:00:00",
"db": "VULHUB",
"id": "VHN-73335"
},
{
"date": "2015-03-19T09:24:00",
"db": "BID",
"id": "69302"
},
{
"date": "2018-02-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-008459"
},
{
"date": "2018-01-29T19:03:59.157000",
"db": "NVD",
"id": "CVE-2014-5394"
},
{
"date": "2018-01-09T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201408-326"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201408-326"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei Campus Information disclosure vulnerability in switch products",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-008459"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "information disclosure",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201408-326"
}
],
"trust": 0.6
}
}
VAR-201801-0045
Vulnerability from variot - Updated: 2023-12-18 13:24Multiple heap-based buffer overflows in the eSap software platform in Huawei Campus S9300, S7700, S9700, S5300, S5700, S6300, and S6700 series switches; AR150, AR160, AR200, AR1200, AR2200, AR3200, AR530, NetEngine16EX, SRG1300, SRG2300, and SRG3300 series routers; and WLAN AC6005, AC6605, and ACU2 access controllers allow remote attackers to cause a denial of service (device restart) via a crafted length field in a packet. plural Huawei The product contains a buffer error vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. HuaweiCampusS9300 and other products are all products of China Huawei. CampusS9300 and other devices are all switch devices. WLAN AC6005 and so on are all access controller devices. eSapsoftwareplatform is a set of ESAP software platforms running on it. A heap buffer overflow vulnerability exists in eSapsoftwareplatform in several Huawei products. The Campus S9300 and others are switches. The following products and versions are affected: Huawei Campus S9300/ S7700/ S9700 Series switch V200R001C00SPC300 Version, V200R002C00SPC100 Version, V200R003C00SPC500 Version; Campus S5300/ S5700/ S6300/ S6700 Series switch V200R001C00SPC300 Version, V200R002C00SPC100 Version, V200R003C00SPC300 Version; AR150/ AR160/ AR200/ AR1200/ AR2200/ AR3200/ AR530/ NetEngine16EX/ SRG1300/ SRG2300/ SRG3300 series router V200R003C01SPC900 Version, V200R003C01SPC300 Version, V200R003C01SPC100 Version, V200R003C00SPC200 Version, V200R003C00SPC100 Version, V200R005C00SPC100 Version, V200R005C00SPC200 Version; WLAN AC6005/6605 V200R003C00SPC100 Version, V200R003C00SPC200 Version, V200R003C00SPC300 Version , V200R003C00SPC500 version, V200R005C00SPC100 version; WLAN ACU2 V200R005C00SPC100 version
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201801-0045",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "wlan ac6605",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc200"
},
{
"model": "wlan ac6005",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc200"
},
{
"model": "wlan ac6605",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "wlan ac6605",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r005c00spc100"
},
{
"model": "wlan ac6005",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "wlan acu2",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r005c00spc100"
},
{
"model": "wlan ac6005",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r005c00spc100"
},
{
"model": "wlan ac6605",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc100"
},
{
"model": "wlan ac6605",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "wlan ac6005",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "ar160",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc900"
},
{
"model": "ar2200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc200"
},
{
"model": "srg1300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc300"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc100"
},
{
"model": "ar160",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc200"
},
{
"model": "ar160",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc300"
},
{
"model": "ar3200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc100"
},
{
"model": "srg2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc100"
},
{
"model": "ar1200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc200"
},
{
"model": "ar2200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc100"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "ar160",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc100"
},
{
"model": "netengine16ex",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc200"
},
{
"model": "srg1300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc100"
},
{
"model": "ar530",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc900"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "srg2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc900"
},
{
"model": "ar530",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc200"
},
{
"model": "srg2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc300"
},
{
"model": "srg3300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc100"
},
{
"model": "ar1200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc100"
},
{
"model": "ar200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc100"
},
{
"model": "ar530",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc100"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "netengine16ex",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc100"
},
{
"model": "srg2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc100"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "ar150",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc100"
},
{
"model": "srg3300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc200"
},
{
"model": "ar1200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc100"
},
{
"model": "ar2200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc200"
},
{
"model": "ar1200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc900"
},
{
"model": "ar200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc100"
},
{
"model": "ar1200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc300"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc100"
},
{
"model": "netengine16ex",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc900"
},
{
"model": "ar200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc300"
},
{
"model": "srg1300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc200"
},
{
"model": "ar150",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc100"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc100"
},
{
"model": "netengine16ex",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc200"
},
{
"model": "netengine16ex",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc300"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc100"
},
{
"model": "ar150",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc300"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc100"
},
{
"model": "ar2200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc100"
},
{
"model": "netengine16ex",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc100"
},
{
"model": "ar3200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc100"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc100"
},
{
"model": "ar2200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc900"
},
{
"model": "ar160",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc100"
},
{
"model": "ar2200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc300"
},
{
"model": "srg3300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc200"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc100"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "srg1300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc900"
},
{
"model": "ar530",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc100"
},
{
"model": "srg1300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc200"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "ar530",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc100"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "srg1300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc100"
},
{
"model": "srg2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc100"
},
{
"model": "ar200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc200"
},
{
"model": "srg3300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc100"
},
{
"model": "ar530",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc300"
},
{
"model": "ar150",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc200"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "srg2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc200"
},
{
"model": "srg3300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc900"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "srg3300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc300"
},
{
"model": "ar3200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc200"
},
{
"model": "netengine16ex",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc100"
},
{
"model": "srg3300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc100"
},
{
"model": "ar160",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc200"
},
{
"model": "ar200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc900"
},
{
"model": "ar1200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc200"
},
{
"model": "ar200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc200"
},
{
"model": "ar150",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc900"
},
{
"model": "wlan ac6005",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc100"
},
{
"model": "ar3200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc100"
},
{
"model": "ar150",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc200"
},
{
"model": "ar1200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc100"
},
{
"model": "ar200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc100"
},
{
"model": "srg1300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc100"
},
{
"model": "ar160",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc100"
},
{
"model": "ar530",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc200"
},
{
"model": "ar2200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc100"
},
{
"model": "srg2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc200"
},
{
"model": "ar150",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc100"
},
{
"model": "ar3200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc900"
},
{
"model": "ar3200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc200"
},
{
"model": "ar3200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc300"
},
{
"model": "ar1200",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "ar150",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "ar160",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "ar200",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "ar2200",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "ar3200",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "ar530",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "campus s5300",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "firmware"
},
{
"model": "campus s5700",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "firmware"
},
{
"model": "campus s6300",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "firmware"
},
{
"model": "campus s6700",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "firmware"
},
{
"model": "campus s7700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "campus s9300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "campus s9700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "netengine16ex",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "srg1300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "srg2300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "srg3300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "wlan ac 6005",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "wlan ac 6605",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "firmware"
},
{
"model": "wlan acu2",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "campus s7700 v200r002c00spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s7700 v200r003c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s9300 v200r001c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s9300 v200r002c00spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s9300 v200r003c00spc500",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s7700 v200r003c00spc500",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s9700 v200r001c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s9700 v200r002c00spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s9700 v200r003c00spc500",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s5300 v200r001c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s5300 v200r002c00spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s5300 v200r003c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s5700 v200r001c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s5700 v200r002c00spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s5700 v200r003c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s6300 v200r001c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s6300 v200r002c00spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s6300 v200r003c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s6700 v200r001c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s6700 v200r002c00spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s6700 v200r003c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "wlan v200r003c00spc100",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "6605"
},
{
"model": "wlan v200r003c00spc200",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "6605"
},
{
"model": "wlan v200r003c00spc300",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "6605"
},
{
"model": "wlan v200r003c00spc500",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "6605"
},
{
"model": "wlan v200r005c00spc100",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "6605"
},
{
"model": "wlan ac6005 v200r003c00spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "wlan ac6005 v200r003c00spc200",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "wlan ac6005 v200r003c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "wlan ac6005 v200r003c00spc500",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "wlan ac6005 v200r005c00spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "wlan acu2 v200r005c00spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-03422"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008513"
},
{
"db": "NVD",
"id": "CVE-2014-4705"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-1088"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:ar150_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar150_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar150_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar150_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar150_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar150_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar150_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:ar160_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar160_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar160_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar160_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar160_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar160_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar160_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:ar200_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar200_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar200_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar200_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar200_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar200_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar200_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:ar1200_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar1200_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar1200_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar1200_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar1200_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar1200_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar1200_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:ar2200_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar2200_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar2200_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar2200_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar2200_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar2200_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar2200_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:ar3200_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar3200_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar3200_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar3200_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar3200_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar3200_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar3200_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:ar530_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar530_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar530_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar530_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar530_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar530_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar530_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:ar530:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:srg1300_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:srg1300_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:srg1300_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:srg1300_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:srg1300_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:srg1300_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:srg1300_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:srg2300_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:srg2300_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:srg2300_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:srg2300_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:srg2300_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:srg2300_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:srg2300_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:srg3300_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:srg3300_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:srg3300_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:srg3300_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:srg3300_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:srg3300_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:srg3300_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:wlan_ac6005_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:wlan_ac6005_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:wlan_ac6005_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:wlan_ac6005_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:wlan_ac6005_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:wlan_ac6005:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:wlan_ac6605_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:wlan_ac6605_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:wlan_ac6605_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:wlan_ac6605_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:wlan_ac6605_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:wlan_ac6605:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:wlan_acu2_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:wlan_acu2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2014-4705"
}
]
},
"cve": "CVE-2014-4705",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 7.8,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2014-4705",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2018-03422",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-72646",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2014-4705",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2014-4705",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2018-03422",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201801-1088",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-72646",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-03422"
},
{
"db": "VULHUB",
"id": "VHN-72646"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008513"
},
{
"db": "NVD",
"id": "CVE-2014-4705"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-1088"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Multiple heap-based buffer overflows in the eSap software platform in Huawei Campus S9300, S7700, S9700, S5300, S5700, S6300, and S6700 series switches; AR150, AR160, AR200, AR1200, AR2200, AR3200, AR530, NetEngine16EX, SRG1300, SRG2300, and SRG3300 series routers; and WLAN AC6005, AC6605, and ACU2 access controllers allow remote attackers to cause a denial of service (device restart) via a crafted length field in a packet. plural Huawei The product contains a buffer error vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. HuaweiCampusS9300 and other products are all products of China Huawei. CampusS9300 and other devices are all switch devices. WLAN AC6005 and so on are all access controller devices. eSapsoftwareplatform is a set of ESAP software platforms running on it. A heap buffer overflow vulnerability exists in eSapsoftwareplatform in several Huawei products. The Campus S9300 and others are switches. The following products and versions are affected: Huawei Campus S9300/ S7700/ S9700 Series switch V200R001C00SPC300 Version, V200R002C00SPC100 Version, V200R003C00SPC500 Version; Campus S5300/ S5700/ S6300/ S6700 Series switch V200R001C00SPC300 Version, V200R002C00SPC100 Version, V200R003C00SPC300 Version; AR150/ AR160/ AR200/ AR1200/ AR2200/ AR3200/ AR530/ NetEngine16EX/ SRG1300/ SRG2300/ SRG3300 series router V200R003C01SPC900 Version, V200R003C01SPC300 Version, V200R003C01SPC100 Version, V200R003C00SPC200 Version, V200R003C00SPC100 Version, V200R005C00SPC100 Version, V200R005C00SPC200 Version; WLAN AC6005/6605 V200R003C00SPC100 Version, V200R003C00SPC200 Version, V200R003C00SPC300 Version , V200R003C00SPC500 version, V200R005C00SPC100 version; WLAN ACU2 V200R005C00SPC100 version",
"sources": [
{
"db": "NVD",
"id": "CVE-2014-4705"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008513"
},
{
"db": "CNVD",
"id": "CNVD-2018-03422"
},
{
"db": "VULHUB",
"id": "VHN-72646"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2014-4705",
"trust": 3.1
},
{
"db": "SECUNIA",
"id": "59349",
"trust": 2.3
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008513",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201801-1088",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2018-03422",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-72646",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-03422"
},
{
"db": "VULHUB",
"id": "VHN-72646"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008513"
},
{
"db": "NVD",
"id": "CVE-2014-4705"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-1088"
}
]
},
"id": "VAR-201801-0045",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-03422"
},
{
"db": "VULHUB",
"id": "VHN-72646"
}
],
"trust": 1.5067365069565217
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-03422"
}
]
},
"last_update_date": "2023-12-18T13:24:12.576000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Huawei-SA-20140616-01-eSap",
"trust": 0.8,
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345171.htm"
},
{
"title": "Patch of various Huawei products eSapsoftwareplatform heap buffer overflow vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/116581"
},
{
"title": "Multiple Huawei product eSap software platform Buffer error vulnerability fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=78164"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-03422"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008513"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-1088"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-72646"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008513"
},
{
"db": "NVD",
"id": "CVE-2014-4705"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.3,
"url": "http://secunia.com/advisories/59349"
},
{
"trust": 2.3,
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345171.htm"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-4705"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2014-4705"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-03422"
},
{
"db": "VULHUB",
"id": "VHN-72646"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008513"
},
{
"db": "NVD",
"id": "CVE-2014-4705"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-1088"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2018-03422"
},
{
"db": "VULHUB",
"id": "VHN-72646"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008513"
},
{
"db": "NVD",
"id": "CVE-2014-4705"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-1088"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-02-23T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-03422"
},
{
"date": "2018-01-30T00:00:00",
"db": "VULHUB",
"id": "VHN-72646"
},
{
"date": "2018-03-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-008513"
},
{
"date": "2018-01-30T17:29:00.227000",
"db": "NVD",
"id": "CVE-2014-4705"
},
{
"date": "2018-01-31T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201801-1088"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-02-23T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-03422"
},
{
"date": "2018-02-26T00:00:00",
"db": "VULHUB",
"id": "VHN-72646"
},
{
"date": "2018-03-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-008513"
},
{
"date": "2018-02-26T19:31:25.060000",
"db": "NVD",
"id": "CVE-2014-4705"
},
{
"date": "2018-01-31T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201801-1088"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201801-1088"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei Product buffer error vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-008513"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer overflow",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201801-1088"
}
],
"trust": 0.6
}
}
VAR-201711-0985
Vulnerability from variot - Updated: 2023-12-18 13:14AC6005 V200R006C10SPC200,AC6605 V200R006C10SPC200,AR1200 with software V200R005C10CP0582T, V200R005C10HP0581T, V200R005C20SPC026T,AR200 with software V200R005C20SPC026T,AR3200 V200R005C20SPC026T,CloudEngine 12800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 5800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 6800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 7800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 8800 with software V100R006C00, V200R001C00,E600 V200R008C00,S12700 with software V200R005C00, V200R006C00, V200R007C00, V200R008C00,S1700 with software V100R006C00, V100R007C00, V200R006C00,S2300 with software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S2700 with software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S5300 with software V100R005C00, V100R006C00, V100R006C01, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S5700 with software V100R005C00, V100R006C00, V100R006C01, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S6300 with software V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R008C00,S6700 with software V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S7700 with software V100R003C00, V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S9300 with software V100R001C00, V100R002C00, V100R003C00, V100R006C00, V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R008C10,S9700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00,Secospace USG6600 V500R001C00SPC050 have a MaxAge LSA vulnerability due to improper OSPF implementation. When the device receives special LSA packets, the LS (Link Status) age would be set to MaxAge, 3600 seconds. An attacker can exploit this vulnerability to poison the route table and launch a DoS attack. plural Huawei The product contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. HuaweiAC6005 and other products are all products of China Huawei. HuaweiAC6005 is an access control device. The CloudEngine 12800 is a data center switch device. The OSPF protocol of several Huawei products has a MaxAgeLSA vulnerability. The following products and versions are affected: Huawei AC6005 V200R006C10SPC200 Version; AC6605 V200R006C10SPC200 Version; AR1200 V200R005C10CP0582T Version, V200R005C10HP0581T Version, V200R005C20SPC026T Version; AR200 V200R005C20SPC026T Version; AR3200 V200R005C20SPC026T Version; CloudEngine 12800 V100R003C00 Version, V100R005C00 Version, V100R005C10 Version, V100R006C00 Version, V200R001C00 Version; CloudEngine 5800 V100R003C00 Version, V100R005C00 Version, V100R005C10 Version, V100R006C00 Version, V200R001C00 Version; CloudEngine 6800 V100R003C00 Version, V100R005C00 Version, V100R005C10 Version, V100R006C00 Version, V200R001C00 Version; CloudEngine 7800 V100R003C00 Version, V100R005C00 Version, V100R005C10 Version, V100R006C00 Version, V200R001C00 Version; CloudEngine 8800 V100R006C00, V200R001C00; E600 V200R008C00; S12700 V200R005C00, V200R006C00, V200R007C00, V200R008C00; S1700
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201711-0985",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "secospace usg6600",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v500r001c30"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "secospace usg6600",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v500r001c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "secospace usg6600",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v500r001c20"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s9700 v200r008c00",
"scope": null,
"trust": 1.2,
"vendor": "huawei",
"version": null
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s1700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "cloudengine 7800",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "ar1200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c20spc026t"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "cloudengine 5800",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "ar200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c20spc026t"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c03"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "ac6005",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c10spc200"
},
{
"model": "cloudengine 12800",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "cloudengine 7800",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r005c00"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c02"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r001c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "cloudengine 12800",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r005c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c05"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "ar3200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c20spc026t"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c02"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c10"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "cloudengine 5800",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s1700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c02"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c10"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c01"
},
{
"model": "cloudengine 7800",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c02"
},
{
"model": "cloudengine 12800",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r005c00"
},
{
"model": "e600",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "cloudengine 8800",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c10"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "cloudengine 12800",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c01"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "cloudengine 7800",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r005c10"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "cloudengine 6800",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "cloudengine 5800",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r005c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c01"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "cloudengine 12800",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r005c10"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "cloudengine 6800",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r005c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c01"
},
{
"model": "ar1200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c10cp0582t"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c03"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c01"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c01"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "ar1200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c10hp0581t"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c02"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c01"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c02"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "cloudengine 8800",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "cloudengine 5800",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r005c10"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c03"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c10"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c10"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c01"
},
{
"model": "cloudengine 6800",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c01"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r005c00"
},
{
"model": "cloudengine 5800",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r005c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "cloudengine 7800",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s1700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r007c00"
},
{
"model": "cloudengine 6800",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r005c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c05"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c10"
},
{
"model": "ac6605",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c10spc200"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c02"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c02"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c10"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c03"
},
{
"model": "cloudengine 6800",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r005c10"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r002c00"
},
{
"model": "ac6005",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "ac6605",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "ar1200",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "ar200",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "ar3200",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "cloudengine 12800",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "cloudengine 5800",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "cloudengine 6800",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "cloudengine 7800",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "cloudengine 8800",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "e600",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s12700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s1700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s2300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s2700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s6300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s6700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s7700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "secospace usg6600",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "secospace usg6600 v500r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "cloudengine v100r003c00",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "12800"
},
{
"model": "cloudengine v100r005c00",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "12800"
},
{
"model": "cloudengine v100r005c10",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "12800"
},
{
"model": "s12700 v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r002c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "cloudengine v100r006c00",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "12800"
},
{
"model": "cloudengine v100r005c00",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "5800"
},
{
"model": "cloudengine v100r005c10",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "5800"
},
{
"model": "cloudengine v100r006c00",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "5800"
},
{
"model": "cloudengine v100r005c00",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "6800"
},
{
"model": "cloudengine v100r005c10",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "6800"
},
{
"model": "cloudengine v100r006c00",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "6800"
},
{
"model": "cloudengine v100r005c00",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "7800"
},
{
"model": "cloudengine v100r005c10",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "7800"
},
{
"model": "cloudengine v100r006c00",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "7800"
},
{
"model": "cloudengine v100r006c00",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "8800"
},
{
"model": "cloudengine v100r003c00",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "5800"
},
{
"model": "cloudengine v100r003c00",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "6800"
},
{
"model": "cloudengine v100r003c00",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "7800"
},
{
"model": "cloudengine v200r001c00",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "12800"
},
{
"model": "cloudengine v200r001c00",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "6800"
},
{
"model": "cloudengine v200r001c00",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "7800"
},
{
"model": "cloudengine v200r001c00",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "8800"
},
{
"model": "ac6005 v200r006c10spc200",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ar1200 v200r005c10cp0582t",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ar200 v200r005c20spc026t",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ar3200 v200r005c20spc026t",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "secospace usg6600 v500r001c20",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "secospace usg6600 v500r001c30",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ac6605 v200r006c10spc200",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ar1200 v200r005c10hp0581t",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ar1200 v200r005c20spc026t",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "cloudengine v200r001c00",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "5800"
},
{
"model": "e600 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s1700 v100r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s1700 v100r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s1700 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v100r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v100r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v100r006c05",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v200r003c02",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v200r003c10",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v200r005c01",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v200r005c02",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v200r005c03",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v100r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v100r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v100r006c03",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v100r006c05",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v200r003c02",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v200r003c10",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v200r005c01",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v200r005c02",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v200r005c03",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v100r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v100r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v100r006c01",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r001c01",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r002c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r003c02",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r003c10",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v100r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v100r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v100r006c01",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r001c01",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r002c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r003c02",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r003c10",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v100r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r001c01",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r002c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r003c02",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r003c10",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v100r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r001c01",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r002c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r003c02",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r003c10",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v100r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v100r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r001c01",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r002c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v100r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v100r002c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v100r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v100r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r002c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r008c10",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-37678"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010631"
},
{
"db": "NVD",
"id": "CVE-2017-8147"
},
{
"db": "CNNVD",
"id": "CNNVD-201711-982"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:ac6005_firmware:v200r006c10spc200:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:ac6005:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:ac6605_firmware:v200r006c10spc200:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:ac6605:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:ar1200_firmware:v200r005c20spc026t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar1200_firmware:v200r005c10hp0581t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar1200_firmware:v200r005c10cp0582t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:ar200_firmware:v200r005c20spc026t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:ar3200_firmware:v200r005c20spc026t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:cloudengine_12800_firmware:v100r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r001c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:cloudengine_12800_firmware:v100r003c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:cloudengine_12800_firmware:v100r005c10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:cloudengine_12800_firmware:v100r005c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:cloudengine_12800:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:cloudengine_5800_firmware:v100r005c10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:cloudengine_5800_firmware:v100r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:cloudengine_5800_firmware:v200r001c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:cloudengine_5800_firmware:v100r003c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:cloudengine_5800_firmware:v100r005c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:cloudengine_5800:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:cloudengine_6800_firmware:v100r005c10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:cloudengine_6800_firmware:v100r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:cloudengine_6800_firmware:v200r001c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:cloudengine_6800_firmware:v100r003c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:cloudengine_6800_firmware:v100r005c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:cloudengine_6800:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:cloudengine_7800_firmware:v100r005c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:cloudengine_7800_firmware:v100r005c10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:cloudengine_7800_firmware:v100r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:cloudengine_7800_firmware:v200r001c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:cloudengine_7800_firmware:v100r003c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:cloudengine_7800:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:cloudengine_8800_firmware:v200r001c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:cloudengine_8800_firmware:v100r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:cloudengine_8800:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:e600_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:e600:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s12700_firmware:v200r005c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s12700_firmware:v200r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s1700_firmware:v100r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s1700_firmware:v100r007c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s1700_firmware:v200r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s2300_firmware:v200r005c01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2300_firmware:v200r005c02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2300_firmware:v200r005c03:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2300_firmware:v200r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2300_firmware:v100r005c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2300_firmware:v100r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2300_firmware:v100r006c03:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2300_firmware:v100r006c05:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2300_firmware:v200r003c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2300_firmware:v200r003c10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2300_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2300_firmware:v200r003c02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2300_firmware:v200r005c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2300_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s2700_firmware:v200r005c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2700_firmware:v200r005c01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2700_firmware:v200r005c02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2700_firmware:v200r005c03:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2700_firmware:v100r005c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2700_firmware:v100r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2700_firmware:v100r006c03:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2700_firmware:v200r003c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2700_firmware:v200r003c10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2700_firmware:v200r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2700_firmware:v100r006c05:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2700_firmware:v200r003c02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2700_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r002c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r003c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r003c02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r003c10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r005c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v100r005c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v100r006c01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r001c01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v100r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r001c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r002c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r003c02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r003c10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v100r005c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v100r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r001c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v100r006c01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r001c01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r003c02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r003c10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r005c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v100r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r001c01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r003c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r001c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r002c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v100r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r001c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r001c01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r002c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r003c02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r005c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r003c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r003c10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r001c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r001c01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r002c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r003c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v100r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r005c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v100r003c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r002c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r003c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r005c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v100r002c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v100r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v100r001c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v100r003c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r001c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r008c10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r001c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r002c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r005c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r003c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2017-8147"
}
]
},
"cve": "CVE-2017-8147",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 5.0,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2017-8147",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2017-37678",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-116350",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2017-8147",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2017-8147",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2017-37678",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201711-982",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-116350",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-37678"
},
{
"db": "VULHUB",
"id": "VHN-116350"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010631"
},
{
"db": "NVD",
"id": "CVE-2017-8147"
},
{
"db": "CNNVD",
"id": "CNNVD-201711-982"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "AC6005 V200R006C10SPC200,AC6605 V200R006C10SPC200,AR1200 with software V200R005C10CP0582T, V200R005C10HP0581T, V200R005C20SPC026T,AR200 with software V200R005C20SPC026T,AR3200 V200R005C20SPC026T,CloudEngine 12800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 5800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 6800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 7800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 8800 with software V100R006C00, V200R001C00,E600 V200R008C00,S12700 with software V200R005C00, V200R006C00, V200R007C00, V200R008C00,S1700 with software V100R006C00, V100R007C00, V200R006C00,S2300 with software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S2700 with software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S5300 with software V100R005C00, V100R006C00, V100R006C01, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S5700 with software V100R005C00, V100R006C00, V100R006C01, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S6300 with software V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R008C00,S6700 with software V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S7700 with software V100R003C00, V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S9300 with software V100R001C00, V100R002C00, V100R003C00, V100R006C00, V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R008C10,S9700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00,Secospace USG6600 V500R001C00SPC050 have a MaxAge LSA vulnerability due to improper OSPF implementation. When the device receives special LSA packets, the LS (Link Status) age would be set to MaxAge, 3600 seconds. An attacker can exploit this vulnerability to poison the route table and launch a DoS attack. plural Huawei The product contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. HuaweiAC6005 and other products are all products of China Huawei. HuaweiAC6005 is an access control device. The CloudEngine 12800 is a data center switch device. The OSPF protocol of several Huawei products has a MaxAgeLSA vulnerability. The following products and versions are affected: Huawei AC6005 V200R006C10SPC200 Version; AC6605 V200R006C10SPC200 Version; AR1200 V200R005C10CP0582T Version, V200R005C10HP0581T Version, V200R005C20SPC026T Version; AR200 V200R005C20SPC026T Version; AR3200 V200R005C20SPC026T Version; CloudEngine 12800 V100R003C00 Version, V100R005C00 Version, V100R005C10 Version, V100R006C00 Version, V200R001C00 Version; CloudEngine 5800 V100R003C00 Version, V100R005C00 Version, V100R005C10 Version, V100R006C00 Version, V200R001C00 Version; CloudEngine 6800 V100R003C00 Version, V100R005C00 Version, V100R005C10 Version, V100R006C00 Version, V200R001C00 Version; CloudEngine 7800 V100R003C00 Version, V100R005C00 Version, V100R005C10 Version, V100R006C00 Version, V200R001C00 Version; CloudEngine 8800 V100R006C00, V200R001C00; E600 V200R008C00; S12700 V200R005C00, V200R006C00, V200R007C00, V200R008C00; S1700",
"sources": [
{
"db": "NVD",
"id": "CVE-2017-8147"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010631"
},
{
"db": "CNVD",
"id": "CNVD-2017-37678"
},
{
"db": "VULHUB",
"id": "VHN-116350"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2017-8147",
"trust": 3.1
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010631",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201711-982",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2017-37678",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-116350",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-37678"
},
{
"db": "VULHUB",
"id": "VHN-116350"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010631"
},
{
"db": "NVD",
"id": "CVE-2017-8147"
},
{
"db": "CNNVD",
"id": "CNNVD-201711-982"
}
]
},
"id": "VAR-201711-0985",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-37678"
},
{
"db": "VULHUB",
"id": "VHN-116350"
}
],
"trust": 1.538758527333333
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-37678"
}
]
},
"last_update_date": "2023-12-18T13:14:05.774000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "huawei-sa-20170720-01-ospf",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170720-01-ospf-en"
},
{
"title": "A patch for the MaxAgeLSA vulnerability exists in the OSPF protocol of various Huawei products.",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/111227"
},
{
"title": "Multiple Huawei Product security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=76692"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-37678"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010631"
},
{
"db": "CNNVD",
"id": "CNNVD-201711-982"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-116350"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010631"
},
{
"db": "NVD",
"id": "CVE-2017-8147"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170720-01-ospf-en"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-8147"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-8147"
},
{
"trust": 0.6,
"url": "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20170720-01-ospf-cn"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-37678"
},
{
"db": "VULHUB",
"id": "VHN-116350"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010631"
},
{
"db": "NVD",
"id": "CVE-2017-8147"
},
{
"db": "CNNVD",
"id": "CNNVD-201711-982"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2017-37678"
},
{
"db": "VULHUB",
"id": "VHN-116350"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010631"
},
{
"db": "NVD",
"id": "CVE-2017-8147"
},
{
"db": "CNNVD",
"id": "CNNVD-201711-982"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-12-20T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-37678"
},
{
"date": "2017-11-22T00:00:00",
"db": "VULHUB",
"id": "VHN-116350"
},
{
"date": "2017-12-20T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-010631"
},
{
"date": "2017-11-22T19:29:03.257000",
"db": "NVD",
"id": "CVE-2017-8147"
},
{
"date": "2017-11-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201711-982"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-12-20T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-37678"
},
{
"date": "2017-12-08T00:00:00",
"db": "VULHUB",
"id": "VHN-116350"
},
{
"date": "2017-12-20T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-010631"
},
{
"date": "2017-12-08T14:47:28.643000",
"db": "NVD",
"id": "CVE-2017-8147"
},
{
"date": "2020-11-06T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201711-982"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201711-982"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei Vulnerability related to input validation in products",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-010631"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "input validation error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201711-982"
}
],
"trust": 0.6
}
}
VAR-201802-0445
Vulnerability from variot - Updated: 2023-12-18 13:13IPv6 function in Huawei Quidway S2700 V200R003C00SPC300, Quidway S5300 V200R003C00SPC300, Quidway S5700 V200R003C00SPC300, S2300 V200R003C00, V200R003C00SPC300T, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S2700 V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S5300 V200R003C00, V200R003C00SPC300T, V200R003C00SPC600, V200R003C02, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R005C05, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S5700 V200R003C00, V200R003C00SPC316T, V200R003C00SPC600, V200R003C02, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S600-E V200R008C00, V200R009C00, S6300 V200R003C00, V200R005C00, V200R007C00, V200R008C00, V200R009C00, S6700 V200R003C00, V200R005C00, V200R005C01, V200R005C02, V200R007C00, V200R008C00, V200R009C00 has an out-of-bounds read vulnerability. An unauthenticated attacker may send crafted malformed IPv6 packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause device to reset. plural Huawei The product contains an out-of-bounds vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Huawei Quidway S2700 and other Huawei S series switches are Huawei products. The following products and versions are affected: Huawei Quidway S2700 V200R003C00SPC300 Version; Quidway S5300 V200R003C00SPC300 Version; Quidway S5700 V200R003C00SPC300 Version; S2300 V200R003C00 Version, V200R003C00SPC300T Version, V200R005C00 Version, V200R006C00 Version, V200R007C00 Version, V200R008C00 Version, V200R009C00 Version; S2700 V200R005C00 Version, V200R006C00 Version, V200R007C00 Version, V200R008C00 Version, V200R009C00 Version; S5300 V200R003C00 Version, V200R003C00SPC300T Version, V200R003C00SPC600 Version, V200R003C02 Version, V200R005C00 Version, V200R005C01 Version, V200R005C02 Version, V200R005C03 Version, V200R005C05 Version, V200R006C00 Version, V200R007C00 Version, V200R008C00 Version, V200R009C00 Version ; S5700 etc
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201802-0445",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "s6700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r009c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r005c01"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r009c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r005c02"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r005c03"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r005c05"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc600"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc600"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c02"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r009c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc316t"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "quidway s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c02"
},
{
"model": "quidway s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c02"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c01"
},
{
"model": "s600-e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r009c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s600-e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300t"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c02"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r009c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c01"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c03"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r009c00"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300t"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "quidway s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r009c00"
},
{
"model": "quidway s2700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "quidway s5300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "quidway s5700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s2300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s2700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s600-e",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s6300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s6700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r003c02",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r005c01",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r005c02",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r009c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r005c03",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r009c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r009c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r009c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "quidway s5700 v200r003c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "quidway s5300 v200r003c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v100r006c05",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r003c02",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v200r009c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "quidway s2700 v200r003c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v200r003c00spc300t",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v200r009c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r003c00spc300t",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r003c00spc600",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r005c03",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r005c05",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r005c01",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r005c02",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r003c00spc600",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r003c00spc316t",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s600-e v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s600-e v200r009c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r005c01",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r005c02",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-37845"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-012598"
},
{
"db": "NVD",
"id": "CVE-2017-17165"
},
{
"db": "CNNVD",
"id": "CNNVD-201712-682"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:quidway_s2700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:quidway_s2700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:quidway_s5300_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:quidway_s5300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:quidway_s5700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:quidway_s5700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s2300_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2300_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2300_firmware:v200r009c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2300_firmware:v200r003c00spc300t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2300_firmware:v200r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2300_firmware:v200r003c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2300_firmware:v200r005c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s2700_firmware:v200r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2700_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2700_firmware:v200r009c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2700_firmware:v200r005c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r003c00spc300t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r003c00spc600:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r003c02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r005c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r005c02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r005c05:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r009c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r003c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r005c01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r005c03:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r003c00spc316t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r003c00spc600:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r003c02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r005c01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r005c03:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r009c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r005c02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s600-e_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s600-e_firmware:v200r009c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s600-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r005c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r009c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r003c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r005c02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r009c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r005c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r003c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r005c01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2017-17165"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei internal tester",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201712-682"
}
],
"trust": 0.6
},
"cve": "CVE-2017-17165",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 7.8,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2017-17165",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2017-37845",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-108160",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2017-17165",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2017-17165",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2017-37845",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201712-682",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-108160",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-37845"
},
{
"db": "VULHUB",
"id": "VHN-108160"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-012598"
},
{
"db": "NVD",
"id": "CVE-2017-17165"
},
{
"db": "CNNVD",
"id": "CNNVD-201712-682"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "IPv6 function in Huawei Quidway S2700 V200R003C00SPC300, Quidway S5300 V200R003C00SPC300, Quidway S5700 V200R003C00SPC300, S2300 V200R003C00, V200R003C00SPC300T, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S2700 V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S5300 V200R003C00, V200R003C00SPC300T, V200R003C00SPC600, V200R003C02, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R005C05, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S5700 V200R003C00, V200R003C00SPC316T, V200R003C00SPC600, V200R003C02, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S600-E V200R008C00, V200R009C00, S6300 V200R003C00, V200R005C00, V200R007C00, V200R008C00, V200R009C00, S6700 V200R003C00, V200R005C00, V200R005C01, V200R005C02, V200R007C00, V200R008C00, V200R009C00 has an out-of-bounds read vulnerability. An unauthenticated attacker may send crafted malformed IPv6 packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause device to reset. plural Huawei The product contains an out-of-bounds vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Huawei Quidway S2700 and other Huawei S series switches are Huawei products. The following products and versions are affected: Huawei Quidway S2700 V200R003C00SPC300 Version; Quidway S5300 V200R003C00SPC300 Version; Quidway S5700 V200R003C00SPC300 Version; S2300 V200R003C00 Version, V200R003C00SPC300T Version, V200R005C00 Version, V200R006C00 Version, V200R007C00 Version, V200R008C00 Version, V200R009C00 Version; S2700 V200R005C00 Version, V200R006C00 Version, V200R007C00 Version, V200R008C00 Version, V200R009C00 Version; S5300 V200R003C00 Version, V200R003C00SPC300T Version, V200R003C00SPC600 Version, V200R003C02 Version, V200R005C00 Version, V200R005C01 Version, V200R005C02 Version, V200R005C03 Version, V200R005C05 Version, V200R006C00 Version, V200R007C00 Version, V200R008C00 Version, V200R009C00 Version ; S5700 etc",
"sources": [
{
"db": "NVD",
"id": "CVE-2017-17165"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-012598"
},
{
"db": "CNVD",
"id": "CNVD-2017-37845"
},
{
"db": "VULHUB",
"id": "VHN-108160"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2017-17165",
"trust": 3.1
},
{
"db": "JVNDB",
"id": "JVNDB-2017-012598",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201712-682",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2017-37845",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-108160",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-37845"
},
{
"db": "VULHUB",
"id": "VHN-108160"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-012598"
},
{
"db": "NVD",
"id": "CVE-2017-17165"
},
{
"db": "CNNVD",
"id": "CNNVD-201712-682"
}
]
},
"id": "VAR-201802-0445",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-37845"
},
{
"db": "VULHUB",
"id": "VHN-108160"
}
],
"trust": 1.5635795166666666
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-37845"
}
]
},
"last_update_date": "2023-12-18T13:13:58.752000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "huawei-sa-20171213-01-ipv6",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171213-01-ipv6-en"
},
{
"title": "A variety of Huawei products IPv6 protocol cross-boundary read vulnerability patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/111423"
},
{
"title": "Multiple Huawei Product Buffer Error Vulnerability Fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=77220"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-37845"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-012598"
},
{
"db": "CNNVD",
"id": "CNNVD-201712-682"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-125",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-108160"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-012598"
},
{
"db": "NVD",
"id": "CVE-2017-17165"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171213-02-ipv6-en"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-17165"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-17165"
},
{
"trust": 0.6,
"url": "http://www.huawei.com/cn/psirt/security-advisories/2017/huawei-sa-20171213-02-ipv6-cn"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-37845"
},
{
"db": "VULHUB",
"id": "VHN-108160"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-012598"
},
{
"db": "NVD",
"id": "CVE-2017-17165"
},
{
"db": "CNNVD",
"id": "CNNVD-201712-682"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2017-37845"
},
{
"db": "VULHUB",
"id": "VHN-108160"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-012598"
},
{
"db": "NVD",
"id": "CVE-2017-17165"
},
{
"db": "CNNVD",
"id": "CNNVD-201712-682"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-12-22T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-37845"
},
{
"date": "2018-02-15T00:00:00",
"db": "VULHUB",
"id": "VHN-108160"
},
{
"date": "2018-03-23T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-012598"
},
{
"date": "2018-02-15T16:29:02.250000",
"db": "NVD",
"id": "CVE-2017-17165"
},
{
"date": "2017-12-21T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201712-682"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-12-22T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-37845"
},
{
"date": "2018-03-07T00:00:00",
"db": "VULHUB",
"id": "VHN-108160"
},
{
"date": "2018-03-23T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-012598"
},
{
"date": "2018-03-07T15:09:10.087000",
"db": "NVD",
"id": "CVE-2017-17165"
},
{
"date": "2017-12-21T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201712-682"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201712-682"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei Product out-of-bounds vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-012598"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201712-682"
}
],
"trust": 0.6
}
}
VAR-201704-0463
Vulnerability from variot - Updated: 2023-12-18 13:08Huawei AC6605 with software V200R001C00; AC6605 with software V200R002C00; ACU with software V200R001C00; ACU with software V200R002C00; S2300, S3300, S2700, S3700 with software V100R006C05 and earlier versions; S5300, S5700, S6300, S6700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions; S7700, S9300, S9300E, S9700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions could allow remote attackers to send a special SSH packet to the VRP device to cause a denial of service. plural Huawei Product software includes VRP Special to device SSH Packets are sent and service operation is interrupted (DoS) There are vulnerabilities that are put into a state.By a remote attacker, VRP Special to device SSH Packets are sent and service operation is interrupted (DoS) There is a possibility of being put into a state. HuaweiAC6605 is a wireless access controller product from China's Huawei company. A security vulnerability exists in the SSH module of several Huawei products. The vulnerability is caused by the lack of valid verification of a domain in the message content when the program processes the message. This vulnerability could be exploited by an attacker to cause a device service interruption using the VRP platform. The following products and versions are affected: Huawei AC6605 V200R001C00 Version, AC6605 V200R002C00 Version, ACU V200R001C00 Version, V200R002C00 Version, S2300/ S3300/S2700/ S3700 V100R006C05 and previous versions, S5300/ S5700/S6300/ S6700 V100R006 Version, V200R001 Version, V200R002 Version, V200R003, V200R005C00SPC300 and earlier versions, S7700/S9300/S9300E/S9700 V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201704-0463",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "s9700",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s5700",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s9300e",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s9300e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "s9300e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "s7700",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s5300",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "ac6605",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "ac6605_v200r001c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "s9300",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "s6300",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003"
},
{
"model": "s6700",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "acu",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "acu_v200r002c00"
},
{
"model": "s9300e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003"
},
{
"model": "acu",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "acu_v200r001c00"
},
{
"model": "s series",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c05"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "ac6605",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "ac6605_v200r002c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "s9300e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "ac6605",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "acu",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s6300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s6700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s7700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9300e",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "ac6605 v200r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ac6605 v200r002c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "acu v200r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "acu v200r002c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 \u003c=v100r006c05",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s3300 \u003c=v100r006c05",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 \u003c=v100r006c05",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s3700 \u003c=v100r006c05",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v100r006",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r001",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r002",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r003",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 \u003c=v200r005c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v100r006",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r001",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r002",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r003",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 \u003c=v200r005c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v100r006",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r001",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r002",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r003",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 \u003c=v200r005c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v100r006",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r001",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r002",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r003",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 \u003c=v200r005c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v100r006",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r001",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r002",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r003",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 \u003c=v200r005c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v100r006",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r001",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r002",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r003",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 \u003c=v200r005c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300e v100r006",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300e v200r001",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300e v200r002",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300e v200r003",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300e \u003c=v200r005c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v100r006",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r001",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r002",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r003",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 \u003c=v200r005c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s7700",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "v200r005c00spc300"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-03649"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008290"
},
{
"db": "NVD",
"id": "CVE-2014-8572"
},
{
"db": "CNNVD",
"id": "CNNVD-201605-577"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:ac6605_firmware:ac6605_v200r001c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ac6605_firmware:ac6605_v200r002c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:ac6605:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:acu_firmware:acu_v200r001c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:acu_firmware:acu_v200r002c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:acu:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s_series_firmware:v100r006c05:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s3300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s3700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r002:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r003:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v200r005c00spc300",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v100r006:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r001:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r002:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r003:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v200r005c00spc300",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v100r006:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r001:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r001:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r002:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r003:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v200r005c00spc300",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v100r006:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v100r006:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r001:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r002:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r003:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v200r005c00spc300",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v100r006:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r001:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r002:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r003:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v200r005c00spc300",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v100r006:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r001:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r002:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r003:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v200r005c00spc300",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v100r006:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r001:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r002:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r003:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v200r005c00spc300",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300e_firmware:v100r006:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300e_firmware:v200r001:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300e_firmware:v200r003:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300e_firmware:v200r002:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300e_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v200r005c00spc300",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s9300e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2014-8572"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201605-577"
}
],
"trust": 0.6
},
"cve": "CVE-2014-8572",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 7.8,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2014-8572",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2016-03649",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-76517",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2014-8572",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2014-8572",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2016-03649",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201605-577",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-76517",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-03649"
},
{
"db": "VULHUB",
"id": "VHN-76517"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008290"
},
{
"db": "NVD",
"id": "CVE-2014-8572"
},
{
"db": "CNNVD",
"id": "CNNVD-201605-577"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei AC6605 with software V200R001C00; AC6605 with software V200R002C00; ACU with software V200R001C00; ACU with software V200R002C00; S2300, S3300, S2700, S3700 with software V100R006C05 and earlier versions; S5300, S5700, S6300, S6700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions; S7700, S9300, S9300E, S9700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions could allow remote attackers to send a special SSH packet to the VRP device to cause a denial of service. plural Huawei Product software includes VRP Special to device SSH Packets are sent and service operation is interrupted (DoS) There are vulnerabilities that are put into a state.By a remote attacker, VRP Special to device SSH Packets are sent and service operation is interrupted (DoS) There is a possibility of being put into a state. HuaweiAC6605 is a wireless access controller product from China\u0027s Huawei company. A security vulnerability exists in the SSH module of several Huawei products. The vulnerability is caused by the lack of valid verification of a domain in the message content when the program processes the message. This vulnerability could be exploited by an attacker to cause a device service interruption using the VRP platform. The following products and versions are affected: Huawei AC6605 V200R001C00 Version, AC6605 V200R002C00 Version, ACU V200R001C00 Version, V200R002C00 Version, S2300/ S3300/S2700/ S3700 V100R006C05 and previous versions, S5300/ S5700/S6300/ S6700 V100R006 Version, V200R001 Version, V200R002 Version, V200R003, V200R005C00SPC300 and earlier versions, S7700/S9300/S9300E/S9700 V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions",
"sources": [
{
"db": "NVD",
"id": "CVE-2014-8572"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008290"
},
{
"db": "CNVD",
"id": "CNVD-2016-03649"
},
{
"db": "VULHUB",
"id": "VHN-76517"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2014-8572",
"trust": 3.1
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008290",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201605-577",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2016-03649",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-76517",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-03649"
},
{
"db": "VULHUB",
"id": "VHN-76517"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008290"
},
{
"db": "NVD",
"id": "CVE-2014-8572"
},
{
"db": "CNNVD",
"id": "CNNVD-201605-577"
}
]
},
"id": "VAR-201704-0463",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-03649"
},
{
"db": "VULHUB",
"id": "VHN-76517"
}
],
"trust": 1.2565105382926829
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-03649"
}
]
},
"last_update_date": "2023-12-18T13:08:53.241000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Huawei-SA-20141010-01-VRP",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/hw-373182"
},
{
"title": "Patches for various Huawei Product Denial of Service Vulnerabilities (CNVD-2016-03649)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/76517"
},
{
"title": "Multiple Huawei Product security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=61890"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-03649"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008290"
},
{
"db": "CNNVD",
"id": "CNNVD-201605-577"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-76517"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008290"
},
{
"db": "NVD",
"id": "CVE-2014-8572"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "http://www.huawei.com/en/psirt/security-advisories/hw-373182"
},
{
"trust": 1.2,
"url": "http://www.huawei.com/cn/psirt/security-advisories/hw-373183"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-8572"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2014-8572"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-03649"
},
{
"db": "VULHUB",
"id": "VHN-76517"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008290"
},
{
"db": "NVD",
"id": "CVE-2014-8572"
},
{
"db": "CNNVD",
"id": "CNNVD-201605-577"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2016-03649"
},
{
"db": "VULHUB",
"id": "VHN-76517"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008290"
},
{
"db": "NVD",
"id": "CVE-2014-8572"
},
{
"db": "CNNVD",
"id": "CNNVD-201605-577"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-05-27T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-03649"
},
{
"date": "2017-04-02T00:00:00",
"db": "VULHUB",
"id": "VHN-76517"
},
{
"date": "2017-05-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-008290"
},
{
"date": "2017-04-02T20:59:00.423000",
"db": "NVD",
"id": "CVE-2014-8572"
},
{
"date": "2016-05-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201605-577"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-05-27T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-03649"
},
{
"date": "2017-04-11T00:00:00",
"db": "VULHUB",
"id": "VHN-76517"
},
{
"date": "2017-05-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-008290"
},
{
"date": "2017-04-11T01:11:55.313000",
"db": "NVD",
"id": "CVE-2014-8572"
},
{
"date": "2016-05-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201605-577"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201605-577"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei Service disruption in product software (DoS) Vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-008290"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "input validation",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201605-577"
}
],
"trust": 0.6
}
}
VAR-201906-0055
Vulnerability from variot - Updated: 2023-12-18 13:02Some Huawei S series switches have a DoS vulnerability. An unauthenticated remote attacker can send crafted packets to the affected device to exploit this vulnerability. Due to insufficient verification of the packets, successful exploitation may cause the device reboot and denial of service (DoS) condition. (Vulnerability ID: HWPSIRT-2019-03109). Vendors have confirmed this vulnerability HWPSIRT-2019-03109 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state. HuaweiS12700 is an enterprise-class switch product from China's Huawei company. The vulnerability stems from the program's insufficient verification of specific parameters of Http messages. The following products and versions are affected: Huawei S12700 V200R005C00 Version, V200R006C00 Version, V200R007C00 Version, V200R008C00 Version, V200R010C00 Version, V200R012C00 Version, V200R013C00 Version, V200R011C10 Version; S1700 V200R008C00 Version, V200R009C00 Version, V200R010C00 Version, V200R011C10 Version, V200R012C00 Version, V200R013C00 version; S2300 V200R003C00 version, etc
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201906-0055",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r012c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r012c00"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s1700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r011c10"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r011c10"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r013c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r011c10"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r012c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r011c10"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r012c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s9300x",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r012c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r012c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r011c10"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r010c00"
},
{
"model": "s7900",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r013c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s600-e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r013c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r011c10"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r010c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r013c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s1700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r013c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s600-e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r012c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r012c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r010c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r013c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s600-e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r011c10"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r013c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s600-e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r010c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r012c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r013c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s9300x",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r013c00"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r013c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r013c00"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s1700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r010c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r011c10"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r010c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r010c00"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r010c00"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r011c10"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r012c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r010c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r012c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r011c10"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r010c00"
},
{
"model": "s1700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r009c00"
},
{
"model": "s600-e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s1700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r013c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r010c00"
},
{
"model": "s9300x",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r011c10"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r011c10"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r013c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r011c10"
},
{
"model": "s7900",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r012c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c10"
},
{
"model": "s9300x",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r010c00"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r010c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s1700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r012c00"
},
{
"model": "s7900",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r011c10"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r013c00"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r012c00"
},
{
"model": "s12700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s1700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s2300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s2700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s600-e",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s6300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s6700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s7700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r010c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s1700 v200r009c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s1700 v200r010c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r012c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r013c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r011c10",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s1700 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s1700 v200r011c10",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s1700 v200r012c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-25515"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005143"
},
{
"db": "NVD",
"id": "CVE-2019-5285"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s12700_firmware:v200r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s12700_firmware:v200r005c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s12700_firmware:v200r010c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s12700_firmware:v200r012c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s12700_firmware:v200r013c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s12700_firmware:v200r011c10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s1700_firmware:v200r011c10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s1700_firmware:v200r013c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s1700_firmware:v200r009c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s1700_firmware:v200r010c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s1700_firmware:v200r012c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s1700_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s2300_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2300_firmware:v200r011c10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2300_firmware:v200r005c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2300_firmware:v200r013c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2300_firmware:v200r003c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2300_firmware:v200r010c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2300_firmware:v200r012c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s2700_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2700_firmware:v200r010c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2700_firmware:v200r011c10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2700_firmware:v200r012c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2700_firmware:v200r013c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2700_firmware:v200r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s2700_firmware:v200r005c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r005c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r010c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r011c10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r012c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r013c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r003c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r011c10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r013c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r010c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r012c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s600-e_firmware:v200r011c10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s600-e_firmware:v200r013c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s600-e_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s600-e_firmware:v200r010c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s600-e_firmware:v200r012c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s600-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r013c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r010c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r011c10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r012c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r005c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r003c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r010c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r012c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r003c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r005c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r011c10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r013c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s6700:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r005c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r013c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r010c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r011c10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r012c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r003c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s7900_firmware:v200r012c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s7900_firmware:v200r013c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s7900_firmware:v200r011c10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s7900:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r013c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r008c10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r010c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r011c10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r012c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r003c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300x_firmware:v200r010c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300x_firmware:v200r011c10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300x_firmware:v200r012c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300x_firmware:v200r013c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s9300x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r010c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r005c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r012c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r013c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r003c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r011c10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2019-5285"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "This vulnerability is by Chi Anxin Codesafe Team of Legendsec of eack Report to Huawei PSIRT .",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201905-947"
}
],
"trust": 0.6
},
"cve": "CVE-2019-5285",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 7.8,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2019-5285",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2019-25515",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-156720",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2019-5285",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2019-5285",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2019-25515",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201905-947",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-156720",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-25515"
},
{
"db": "VULHUB",
"id": "VHN-156720"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005143"
},
{
"db": "NVD",
"id": "CVE-2019-5285"
},
{
"db": "CNNVD",
"id": "CNNVD-201905-947"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Some Huawei S series switches have a DoS vulnerability. An unauthenticated remote attacker can send crafted packets to the affected device to exploit this vulnerability. Due to insufficient verification of the packets, successful exploitation may cause the device reboot and denial of service (DoS) condition. (Vulnerability ID: HWPSIRT-2019-03109). Vendors have confirmed this vulnerability HWPSIRT-2019-03109 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state. HuaweiS12700 is an enterprise-class switch product from China\u0027s Huawei company. The vulnerability stems from the program\u0027s insufficient verification of specific parameters of Http messages. The following products and versions are affected: Huawei S12700 V200R005C00 Version, V200R006C00 Version, V200R007C00 Version, V200R008C00 Version, V200R010C00 Version, V200R012C00 Version, V200R013C00 Version, V200R011C10 Version; S1700 V200R008C00 Version, V200R009C00 Version, V200R010C00 Version, V200R011C10 Version, V200R012C00 Version, V200R013C00 version; S2300 V200R003C00 version, etc",
"sources": [
{
"db": "NVD",
"id": "CVE-2019-5285"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005143"
},
{
"db": "CNVD",
"id": "CNVD-2019-25515"
},
{
"db": "VULHUB",
"id": "VHN-156720"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2019-5285",
"trust": 3.1
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005143",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201905-947",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2019-25515",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-156720",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-25515"
},
{
"db": "VULHUB",
"id": "VHN-156720"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005143"
},
{
"db": "NVD",
"id": "CVE-2019-5285"
},
{
"db": "CNNVD",
"id": "CNNVD-201905-947"
}
]
},
"id": "VAR-201906-0055",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-25515"
},
{
"db": "VULHUB",
"id": "VHN-156720"
}
],
"trust": 1.49839577625
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-25515"
}
]
},
"last_update_date": "2023-12-18T13:02:13.082000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "huawei-sa-20190522-01-switch",
"trust": 0.8,
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190522-01-switch-en"
},
{
"title": "Multiple HuaweiS series switches enter patches for verification error vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/172831"
},
{
"title": "Multiple Huawei S Repair measures for series switch security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=92902"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-25515"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005143"
},
{
"db": "CNNVD",
"id": "CNNVD-201905-947"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-156720"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005143"
},
{
"db": "NVD",
"id": "CVE-2019-5285"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.4,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190522-01-switch-en"
},
{
"trust": 1.8,
"url": "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20190522-01-switch-cn"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-5285"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-5285"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-25515"
},
{
"db": "VULHUB",
"id": "VHN-156720"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005143"
},
{
"db": "NVD",
"id": "CVE-2019-5285"
},
{
"db": "CNNVD",
"id": "CNNVD-201905-947"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2019-25515"
},
{
"db": "VULHUB",
"id": "VHN-156720"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005143"
},
{
"db": "NVD",
"id": "CVE-2019-5285"
},
{
"db": "CNNVD",
"id": "CNNVD-201905-947"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-08-02T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-25515"
},
{
"date": "2019-06-04T00:00:00",
"db": "VULHUB",
"id": "VHN-156720"
},
{
"date": "2019-06-17T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-005143"
},
{
"date": "2019-06-04T19:29:00.477000",
"db": "NVD",
"id": "CVE-2019-5285"
},
{
"date": "2019-05-22T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201905-947"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-08-02T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-25515"
},
{
"date": "2019-07-26T00:00:00",
"db": "VULHUB",
"id": "VHN-156720"
},
{
"date": "2019-06-17T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-005143"
},
{
"date": "2019-07-26T11:15:11.877000",
"db": "NVD",
"id": "CVE-2019-5285"
},
{
"date": "2019-07-29T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201905-947"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201905-947"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei S Series switch vulnerability in input confirmation",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-005143"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "input validation error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201905-947"
}
],
"trust": 0.6
}
}
VAR-201610-0306
Vulnerability from variot - Updated: 2023-12-18 12:51Huawei AR routers with software before V200R007C00SPC100; Quidway S9300 routers with software before V200R009C00; S12700 routers with software before V200R008C00SPC500; S9300, Quidway S5300, and S5300 routers with software before V200R007C00; and S5700 routers with software before V200R007C00SPC500 make it easier for remote authenticated administrators to obtain and decrypt passwords by leveraging selection of a reversible encryption algorithm. plural Huawei There is a vulnerability in the product software that can obtain and decrypt passwords. Supplementary information : CWE Vulnerability type by CWE-326: Inadequate Encryption Strength ( Incorrect cipher strength ) Has been identified. http://cwe.mitre.org/data/definitions/326.htmlA remotely authenticated administrator can use a choice of reversible encryption algorithms to obtain and decrypt passwords. Huawei AR Routers is an AR series router product from China Huawei. An information disclosure vulnerability exists in Huawei AR Routers. An attacker could exploit this vulnerability to obtain sensitive information. Huawei AR, etc. are routing switches of China Huawei (Huawei). The following products and versions are affected: Huawei AR V200R001 , V200R002 , V200R003 , V200R005C10 , V200R005C20 , V200R005C30 ; Quidway S9300 V200R003C00SPC500 , V200R002C00SPC100 , V200R001C00SPC300 ; S12700 V200R006C00 , V200R005C00 ; S9300 V200R006C00SPC500 , V200R005C00SPC300 ; Quidway S5300 V200R001C00SPC300
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201610-0306",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "s5700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r006c00spc500"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r006c00spc500"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r005c00spc500"
},
{
"model": "ar",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c20"
},
{
"model": "ar",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c10"
},
{
"model": "ar",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "quidway s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc100"
},
{
"model": "quidway s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "quidway s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "ar",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003"
},
{
"model": "ar",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c30"
},
{
"model": "ar",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "quidway s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "ar",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "ar router",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r007c00spc100"
},
{
"model": "quidway s5300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "quidway s5300",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "quidway s9300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "quidway s9300",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r009c00"
},
{
"model": "s12700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s12700",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r008c00spc500"
},
{
"model": "s5300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5300",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s5700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5700",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r007c00spc500"
},
{
"model": "s9300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9300",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "ar routers",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r006c00spc500",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r005c00spc300",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r006c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r005c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r003c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r002c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r001c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5300li v200r006c00spc500",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r005c00spc500",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r002c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r006c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r005c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "quidway s9300 v200r003c00spc500",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "quidway s9300 v200r003c00spc300",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "quidway s9300 v200r002c00spc100",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "quidway s5300 v200r001c00spc300",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "ar v200r005c30",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "ar v200r005c20",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "ar v200r005c10",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "ar v200r003",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "ar v200r002",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "ar v200r001",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r007c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r007c00",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r008c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "quidway s9300 v200r009c00",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "quidway s5300 v200r007c00",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "ar v200r007c00spc100",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-07446"
},
{
"db": "BID",
"id": "76897"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007261"
},
{
"db": "NVD",
"id": "CVE-2015-8085"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-757"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s12700_firmware:v200r005c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s12700_firmware:v200r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:quidway_s9300_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:quidway_s9300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:quidway_s9300_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:quidway_s9300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:ar_firmware:v200r002:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar_firmware:v200r001:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar_firmware:v200r003:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar_firmware:v200r005c10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar_firmware:v200r005c20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar_firmware:v200r005c30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:ar:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:quidway_s5300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:quidway_s5300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r002c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r001c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r005c00spc500:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r002c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2015-8085"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor reported this issue.",
"sources": [
{
"db": "BID",
"id": "76897"
}
],
"trust": 0.3
},
"cve": "CVE-2015-8085",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "Single",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 4.0,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2015-8085",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2015-07446",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"id": "VHN-86046",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:S/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.2,
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 4.9,
"baseSeverity": "Medium",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2015-8085",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "High",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2015-8085",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CNVD",
"id": "CNVD-2015-07446",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201510-757",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-86046",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-07446"
},
{
"db": "VULHUB",
"id": "VHN-86046"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007261"
},
{
"db": "NVD",
"id": "CVE-2015-8085"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-757"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei AR routers with software before V200R007C00SPC100; Quidway S9300 routers with software before V200R009C00; S12700 routers with software before V200R008C00SPC500; S9300, Quidway S5300, and S5300 routers with software before V200R007C00; and S5700 routers with software before V200R007C00SPC500 make it easier for remote authenticated administrators to obtain and decrypt passwords by leveraging selection of a reversible encryption algorithm. plural Huawei There is a vulnerability in the product software that can obtain and decrypt passwords. Supplementary information : CWE Vulnerability type by CWE-326: Inadequate Encryption Strength ( Incorrect cipher strength ) Has been identified. http://cwe.mitre.org/data/definitions/326.htmlA remotely authenticated administrator can use a choice of reversible encryption algorithms to obtain and decrypt passwords. Huawei AR Routers is an AR series router product from China Huawei. An information disclosure vulnerability exists in Huawei AR Routers. An attacker could exploit this vulnerability to obtain sensitive information. Huawei AR, etc. are routing switches of China Huawei (Huawei). The following products and versions are affected: Huawei AR V200R001 , V200R002 , V200R003 , V200R005C10 , V200R005C20 , V200R005C30 ; Quidway S9300 V200R003C00SPC500 , V200R002C00SPC100 , V200R001C00SPC300 ; S12700 V200R006C00 , V200R005C00 ; S9300 V200R006C00SPC500 , V200R005C00SPC300 ; Quidway S5300 V200R001C00SPC300 ",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-8085"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007261"
},
{
"db": "CNVD",
"id": "CNVD-2015-07446"
},
{
"db": "BID",
"id": "76897"
},
{
"db": "VULHUB",
"id": "VHN-86046"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-8085",
"trust": 3.4
},
{
"db": "BID",
"id": "76897",
"trust": 2.6
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007261",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201510-757",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2015-07446",
"trust": 0.6
},
{
"db": "SEEBUG",
"id": "SSVID-89742",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-86046",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-07446"
},
{
"db": "VULHUB",
"id": "VHN-86046"
},
{
"db": "BID",
"id": "76897"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007261"
},
{
"db": "NVD",
"id": "CVE-2015-8085"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-757"
}
]
},
"id": "VAR-201610-0306",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-07446"
},
{
"db": "VULHUB",
"id": "VHN-86046"
}
],
"trust": 1.4761443282352942
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-07446"
}
]
},
"last_update_date": "2023-12-18T12:51:29.938000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Huawei-SA-20150930-01-Routers",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/hw-455876"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-007261"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-326",
"trust": 1.1
},
{
"problemtype": "CWE-Other",
"trust": 0.8
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-86046"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007261"
},
{
"db": "NVD",
"id": "CVE-2015-8085"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.3,
"url": "http://www.securityfocus.com/bid/76897"
},
{
"trust": 1.7,
"url": "http://www.huawei.com/en/psirt/security-advisories/hw-455876"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8085"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-8085"
},
{
"trust": 0.3,
"url": "http://www.huawei.com"
},
{
"trust": 0.3,
"url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/archive/hw-455876.htm"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-07446"
},
{
"db": "VULHUB",
"id": "VHN-86046"
},
{
"db": "BID",
"id": "76897"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007261"
},
{
"db": "NVD",
"id": "CVE-2015-8085"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-757"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2015-07446"
},
{
"db": "VULHUB",
"id": "VHN-86046"
},
{
"db": "BID",
"id": "76897"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007261"
},
{
"db": "NVD",
"id": "CVE-2015-8085"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-757"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-11-12T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-07446"
},
{
"date": "2016-10-03T00:00:00",
"db": "VULHUB",
"id": "VHN-86046"
},
{
"date": "2015-09-30T00:00:00",
"db": "BID",
"id": "76897"
},
{
"date": "2016-10-06T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-007261"
},
{
"date": "2016-10-03T21:59:03.800000",
"db": "NVD",
"id": "CVE-2015-8085"
},
{
"date": "2015-09-30T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201510-757"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-11-24T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-07446"
},
{
"date": "2016-11-28T00:00:00",
"db": "VULHUB",
"id": "VHN-86046"
},
{
"date": "2016-09-19T17:00:00",
"db": "BID",
"id": "76897"
},
{
"date": "2016-10-06T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-007261"
},
{
"date": "2016-11-28T19:46:01.013000",
"db": "NVD",
"id": "CVE-2015-8085"
},
{
"date": "2016-10-09T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201510-757"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201510-757"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei Vulnerability in obtaining password in product software",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-007261"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "information disclosure",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201510-757"
}
],
"trust": 0.6
}
}
VAR-201610-0307
Vulnerability from variot - Updated: 2023-12-18 12:51Huawei AR routers with software before V200R007C00SPC100; Quidway S9300 routers with software before V200R009C00; S12700 routers with software before V200R008C00SPC500; S9300, Quidway S5300, and S5300 routers with software before V200R007C00; and S5700 routers with software before V200R007C00SPC500 makes it easier for remote authenticated administrators to obtain encryption keys and ciphertext passwords via vectors related to key storage. plural Huawei There is a vulnerability in the product software that allows the encryption key and ciphertext password to be obtained. Supplementary information : CWE Vulnerability type by CWE-326: Inadequate Encryption Strength ( Incorrect cipher strength ) Has been identified. Huawei AR Routers is an AR series router product from China Huawei. An information disclosure vulnerability exists in Huawei AR Routers. An attacker could exploit this vulnerability to obtain sensitive information. Huawei AR, etc. are routing switches of China Huawei (Huawei). Remote attackers can use the keystore to exploit this vulnerability to gain administrator privileges and crack hard-coded keys and ciphertext passwords. The following products and versions are affected: Huawei AR V200R001 , V200R002 , V200R003 , V200R005C10 , V200R005C20 , V200R005C30 ; Quidway S9300 V200R003C00SPC500 , V200R002C00SPC100 , V200R001C00SPC300 ; S12700 V200R006C00 , V200R005C00 ; S9300 V200R006C00SPC500 , V200R005C00SPC300 ; Quidway S5300 V200R001C00SPC300
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201610-0307",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "s9300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "ar",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r005c20"
},
{
"model": "ar",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r005c10"
},
{
"model": "ar",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r006c00spc500"
},
{
"model": "ar",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r006c00spc500"
},
{
"model": "ar",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r005c30"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r005c00spc500"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "quidway s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc100"
},
{
"model": "quidway s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "quidway s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "ar",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "quidway s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "ar",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "ar router",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r007c00spc100"
},
{
"model": "quidway s5300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "quidway s5300",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "quidway s9300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "quidway s9300",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r009c00"
},
{
"model": "s12700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s12700",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r008c00spc500"
},
{
"model": "s5300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5300",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s5700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5700",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r007c00spc500"
},
{
"model": "s9300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9300",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "ar routers",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r006c00spc500",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r005c00spc300",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r006c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r005c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r003c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r002c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r001c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5300li v200r006c00spc500",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r005c00spc500",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r002c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r006c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r005c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "quidway s9300 v200r003c00spc500",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "quidway s9300 v200r003c00spc300",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "quidway s9300 v200r002c00spc100",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "quidway s5300 v200r001c00spc300",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "ar v200r005c30",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "ar v200r005c20",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "ar v200r005c10",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "ar v200r003",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "ar v200r002",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "ar v200r001",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r007c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r007c00",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r008c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "quidway s9300 v200r009c00",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "quidway s5300 v200r007c00",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "ar v200r007c00spc100",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-07446"
},
{
"db": "BID",
"id": "76897"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007262"
},
{
"db": "NVD",
"id": "CVE-2015-8086"
},
{
"db": "CNNVD",
"id": "CNNVD-201511-337"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:quidway_s5300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:quidway_s5300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:quidway_s9300_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:quidway_s9300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:quidway_s9300_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:quidway_s9300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r002c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r001c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s12700_firmware:v200r005c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s12700_firmware:v200r006c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:ar_firmware:v200r005c20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar_firmware:v200r005c30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar_firmware:v200r003:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar_firmware:v200r005c10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar_firmware:v200r001:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:ar_firmware:v200r002:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:ar:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r002c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r005c00spc500:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2015-8086"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor reported this issue.",
"sources": [
{
"db": "BID",
"id": "76897"
}
],
"trust": 0.3
},
"cve": "CVE-2015-8086",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "Single",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 4.0,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2015-8086",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2015-07446",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"id": "VHN-86047",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:S/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.2,
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 4.9,
"baseSeverity": "Medium",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2015-8086",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "High",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2015-8086",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CNVD",
"id": "CNVD-2015-07446",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201511-337",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-86047",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-07446"
},
{
"db": "VULHUB",
"id": "VHN-86047"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007262"
},
{
"db": "NVD",
"id": "CVE-2015-8086"
},
{
"db": "CNNVD",
"id": "CNNVD-201511-337"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei AR routers with software before V200R007C00SPC100; Quidway S9300 routers with software before V200R009C00; S12700 routers with software before V200R008C00SPC500; S9300, Quidway S5300, and S5300 routers with software before V200R007C00; and S5700 routers with software before V200R007C00SPC500 makes it easier for remote authenticated administrators to obtain encryption keys and ciphertext passwords via vectors related to key storage. plural Huawei There is a vulnerability in the product software that allows the encryption key and ciphertext password to be obtained. Supplementary information : CWE Vulnerability type by CWE-326: Inadequate Encryption Strength ( Incorrect cipher strength ) Has been identified. Huawei AR Routers is an AR series router product from China Huawei. An information disclosure vulnerability exists in Huawei AR Routers. An attacker could exploit this vulnerability to obtain sensitive information. Huawei AR, etc. are routing switches of China Huawei (Huawei). Remote attackers can use the keystore to exploit this vulnerability to gain administrator privileges and crack hard-coded keys and ciphertext passwords. The following products and versions are affected: Huawei AR V200R001 , V200R002 , V200R003 , V200R005C10 , V200R005C20 , V200R005C30 ; Quidway S9300 V200R003C00SPC500 , V200R002C00SPC100 , V200R001C00SPC300 ; S12700 V200R006C00 , V200R005C00 ; S9300 V200R006C00SPC500 , V200R005C00SPC300 ; Quidway S5300 V200R001C00SPC300 ",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-8086"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007262"
},
{
"db": "CNVD",
"id": "CNVD-2015-07446"
},
{
"db": "BID",
"id": "76897"
},
{
"db": "VULHUB",
"id": "VHN-86047"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-8086",
"trust": 3.4
},
{
"db": "BID",
"id": "76897",
"trust": 2.6
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007262",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201511-337",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2015-07446",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-86047",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-07446"
},
{
"db": "VULHUB",
"id": "VHN-86047"
},
{
"db": "BID",
"id": "76897"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007262"
},
{
"db": "NVD",
"id": "CVE-2015-8086"
},
{
"db": "CNNVD",
"id": "CNNVD-201511-337"
}
]
},
"id": "VAR-201610-0307",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-07446"
},
{
"db": "VULHUB",
"id": "VHN-86047"
}
],
"trust": 1.4761443282352942
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-07446"
}
]
},
"last_update_date": "2023-12-18T12:51:29.977000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Huawei-SA-20150930-01-Routers",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/hw-455876"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-007262"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-326",
"trust": 1.1
},
{
"problemtype": "CWE-Other",
"trust": 0.8
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-86047"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007262"
},
{
"db": "NVD",
"id": "CVE-2015-8086"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.3,
"url": "http://www.securityfocus.com/bid/76897"
},
{
"trust": 1.7,
"url": "http://www.huawei.com/en/psirt/security-advisories/hw-455876"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8086"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-8086"
},
{
"trust": 0.3,
"url": "http://www.huawei.com"
},
{
"trust": 0.3,
"url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/archive/hw-455876.htm"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-07446"
},
{
"db": "VULHUB",
"id": "VHN-86047"
},
{
"db": "BID",
"id": "76897"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007262"
},
{
"db": "NVD",
"id": "CVE-2015-8086"
},
{
"db": "CNNVD",
"id": "CNNVD-201511-337"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2015-07446"
},
{
"db": "VULHUB",
"id": "VHN-86047"
},
{
"db": "BID",
"id": "76897"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007262"
},
{
"db": "NVD",
"id": "CVE-2015-8086"
},
{
"db": "CNNVD",
"id": "CNNVD-201511-337"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-11-12T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-07446"
},
{
"date": "2016-10-03T00:00:00",
"db": "VULHUB",
"id": "VHN-86047"
},
{
"date": "2015-09-30T00:00:00",
"db": "BID",
"id": "76897"
},
{
"date": "2016-10-06T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-007262"
},
{
"date": "2016-10-03T21:59:04.893000",
"db": "NVD",
"id": "CVE-2015-8086"
},
{
"date": "2015-09-30T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201511-337"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-11-24T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-07446"
},
{
"date": "2016-11-28T00:00:00",
"db": "VULHUB",
"id": "VHN-86047"
},
{
"date": "2016-09-19T17:00:00",
"db": "BID",
"id": "76897"
},
{
"date": "2016-10-06T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-007262"
},
{
"date": "2016-11-28T19:46:02.077000",
"db": "NVD",
"id": "CVE-2015-8086"
},
{
"date": "2016-10-09T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201511-337"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201511-337"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei Vulnerability in obtaining encryption key and ciphertext password in product software",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-007262"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "information disclosure",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201511-337"
}
],
"trust": 0.6
}
}
VAR-201704-0385
Vulnerability from variot - Updated: 2023-12-18 12:44Huawei Campus S3700HI with software V200R001C00SPC300; Campus S5700 with software V200R002C00SPC100; Campus S7700 with software V200R003C00SPC300,V200R003C00SPC500; LSW S9700 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500; S2350 with software V200R003C00SPC300; S2750 with software V200R003C00SPC300; S5300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S5700 with software V200R001C00SPC300,V200R003C00SPC300; S6300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S6700 S3300HI with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S7700 with software V200R001C00SPC300; S9300 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500; S9300E with software V200R003C00SPC300,V200R003C00SPC500 allow attackers to keep sending malformed packets to cause a denial of service (DoS) attack, aka a heap overflow. plural Huawei Campus The product software contains a buffer error vulnerability.Service operation interruption (DoS) An attack may be carried out. Huawei's Campus switch is a series of switches introduced by Huawei. An attacker can exploit this vulnerability by using malformed packets to cause the device to restart abnormally. The following products and versions are affected: Huawei Campus S3700HI V200R001C00SPC300 Version; Campus S5700 V200R002C00SPC100 Version; Campus S7700 V200R003C00SPC300 Version, V200R003C00SPC500 Version; LSW S9700 V200R001C00SPC300 Version, V200R003C00SPC300 Version, V200R003C00SPC500 Version; S2350 V200R003C00SPC300 Version; S2750 V200R003C00SPC300 Version; S5300 V200R001C00SPC300 Version, V200R002C00SPC100 Version, V200R003C00SPC300 Version; S5700 V200R001C00SPC300 Version, V200R003C00SPC300 Version; S6300 V200R001C00SPC300 Version, V200R002C00SPC100 Version, V200R003C00SPC300 Version; S6700 S3300HI V200R001C00SPC300 Version, V200R002C00SPC100 Version, V200R003C00SPC300 Version; S7700 V200R001C00SPC300 Version; S9300 V200R001C00SPC300 Version, V200R003C00SPC300 Version, V200R003C00SPC500 Version; S9300E V200R003C00SPC300 Version , V200R003C00SPC500 version
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201704-0385",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "s6700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "lsw s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "s2350",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s2750",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s9300e",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "campus s7700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "lsw s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s7700 v200r001c00spc300",
"scope": null,
"trust": 1.2,
"vendor": "huawei",
"version": null
},
{
"model": "campus s3700hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc100"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s3300hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s9300e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc100"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "campus s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "lsw s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "campus s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc100"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc100"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "campus lsw s9700",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "firmware"
},
{
"model": "campus s2350",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "firmware"
},
{
"model": "campus s2750",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "firmware"
},
{
"model": "campus s3300hi",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "firmware"
},
{
"model": "campus s3700hi",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "campus s5300",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "firmware"
},
{
"model": "campus s5700",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "firmware"
},
{
"model": "campus s5700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "campus s6300",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "firmware"
},
{
"model": "campus s6700",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "firmware"
},
{
"model": "campus s7700",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "firmware"
},
{
"model": "campus s7700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "campus s9300",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "firmware"
},
{
"model": "campus s9300e",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "firmware"
},
{
"model": "s9300 v200r001c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r002c00spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r003c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s3700hi v200r001c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r001c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r003c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 s3300hi v200r001c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r001c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r003c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r002c00spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r001c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r003c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r002c00spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "lsw s9700 v200r001c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "lsw s9700 v200r003c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "lsw s9700 v200r003c00spc500",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s5700 v200r002c00spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300e v200r002c00spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300e v200r003c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r002c00spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r003c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s7700 v200r002c00spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s7700 v200r003c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2750 v200r003c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2350ei v200r003c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-05106"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008276"
},
{
"db": "NVD",
"id": "CVE-2014-4706"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-211"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:campus_s3700hi_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:campus_s3700hi:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s3300hi_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s3300hi:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:lsw_s9700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:lsw_s9700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:campus_s5700_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:campus_s5700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:campus_s7700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:campus_s7700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300e_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s9300e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s2350_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s2350:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s2750_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s2750:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:lsw_s9700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:lsw_s9700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:campus_s7700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:campus_s7700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:s9300e_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:s9300e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:lsw_s9700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:lsw_s9700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2014-4706"
}
]
},
"cve": "CVE-2014-4706",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 7.8,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2014-4706",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2017-05106",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-72647",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2014-4706",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2014-4706",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2017-05106",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201704-211",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-72647",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-05106"
},
{
"db": "VULHUB",
"id": "VHN-72647"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008276"
},
{
"db": "NVD",
"id": "CVE-2014-4706"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-211"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei Campus S3700HI with software V200R001C00SPC300; Campus S5700 with software V200R002C00SPC100; Campus S7700 with software V200R003C00SPC300,V200R003C00SPC500; LSW S9700 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500; S2350 with software V200R003C00SPC300; S2750 with software V200R003C00SPC300; S5300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S5700 with software V200R001C00SPC300,V200R003C00SPC300; S6300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S6700 S3300HI with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S7700 with software V200R001C00SPC300; S9300 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500; S9300E with software V200R003C00SPC300,V200R003C00SPC500 allow attackers to keep sending malformed packets to cause a denial of service (DoS) attack, aka a heap overflow. plural Huawei Campus The product software contains a buffer error vulnerability.Service operation interruption (DoS) An attack may be carried out. Huawei\u0027s Campus switch is a series of switches introduced by Huawei. An attacker can exploit this vulnerability by using malformed packets to cause the device to restart abnormally. The following products and versions are affected: Huawei Campus S3700HI V200R001C00SPC300 Version; Campus S5700 V200R002C00SPC100 Version; Campus S7700 V200R003C00SPC300 Version, V200R003C00SPC500 Version; LSW S9700 V200R001C00SPC300 Version, V200R003C00SPC300 Version, V200R003C00SPC500 Version; S2350 V200R003C00SPC300 Version; S2750 V200R003C00SPC300 Version; S5300 V200R001C00SPC300 Version, V200R002C00SPC100 Version, V200R003C00SPC300 Version; S5700 V200R001C00SPC300 Version, V200R003C00SPC300 Version; S6300 V200R001C00SPC300 Version, V200R002C00SPC100 Version, V200R003C00SPC300 Version; S6700 S3300HI V200R001C00SPC300 Version, V200R002C00SPC100 Version, V200R003C00SPC300 Version; S7700 V200R001C00SPC300 Version; S9300 V200R001C00SPC300 Version, V200R003C00SPC300 Version, V200R003C00SPC500 Version; S9300E V200R003C00SPC300 Version , V200R003C00SPC500 version",
"sources": [
{
"db": "NVD",
"id": "CVE-2014-4706"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008276"
},
{
"db": "CNVD",
"id": "CNVD-2017-05106"
},
{
"db": "VULHUB",
"id": "VHN-72647"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2014-4706",
"trust": 3.1
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008276",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201704-211",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2017-05106",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-72647",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-05106"
},
{
"db": "VULHUB",
"id": "VHN-72647"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008276"
},
{
"db": "NVD",
"id": "CVE-2014-4706"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-211"
}
]
},
"id": "VAR-201704-0385",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-05106"
},
{
"db": "VULHUB",
"id": "VHN-72647"
}
],
"trust": 1.4777415505882354
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-05106"
}
]
},
"last_update_date": "2023-12-18T12:44:40.100000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Huawei-SA-20140604-01-Campus",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/hw-343218"
},
{
"title": "Huawei Campus series switch heap buffer overflow vulnerability patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/92441"
},
{
"title": "Huawei Campus Repair of Series Switch Buffer Error Vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=69057"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-05106"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008276"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-211"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-72647"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008276"
},
{
"db": "NVD",
"id": "CVE-2014-4706"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.3,
"url": "http://www.huawei.com/en/psirt/security-advisories/hw-343218"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-4706"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2014-4706"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-05106"
},
{
"db": "VULHUB",
"id": "VHN-72647"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008276"
},
{
"db": "NVD",
"id": "CVE-2014-4706"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-211"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2017-05106"
},
{
"db": "VULHUB",
"id": "VHN-72647"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008276"
},
{
"db": "NVD",
"id": "CVE-2014-4706"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-211"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-04-23T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-05106"
},
{
"date": "2017-04-02T00:00:00",
"db": "VULHUB",
"id": "VHN-72647"
},
{
"date": "2017-05-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-008276"
},
{
"date": "2017-04-02T20:59:00.280000",
"db": "NVD",
"id": "CVE-2014-4706"
},
{
"date": "2017-04-06T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201704-211"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-04-23T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-05106"
},
{
"date": "2017-04-05T00:00:00",
"db": "VULHUB",
"id": "VHN-72647"
},
{
"date": "2017-05-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-008276"
},
{
"date": "2017-04-05T15:36:59.220000",
"db": "NVD",
"id": "CVE-2014-4706"
},
{
"date": "2017-04-06T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201704-211"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201704-211"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei Campus Buffer error vulnerability in product software",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-008276"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer overflow",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201704-211"
}
],
"trust": 0.6
}
}
FKIE_CVE-2012-4960
Vulnerability from fkie_nvd - Published: 2013-06-20 15:55 - Updated: 2025-04-11 00:51{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:acu:v100r003c01spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "CE81EA02-600F-42CE-92C8-7E1D127E9B7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:acu:v200r001c00:*:*:*:*:*:*:*",
"matchCriteriaId": "3A906E7E-7A10-474B-91C4-A30F7FAF55D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:acu:v200r001c00spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "B5D1A17D-1CDD-4539-897E-A6067EAD1EE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:ar_19\\/29\\/49:*:*:*:*:*:*:*:*",
"matchCriteriaId": "82396118-3290-4683-902D-4955E81B84F9",
"versionEndIncluding": "r2207",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:ar_g3:v200r001c00:*:*:*:*:*:*:*",
"matchCriteriaId": "B19CE2AB-251D-478A-913C-65B5E0BBA0B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:ar_g3:v200r001c01:*:*:*:*:*:*:*",
"matchCriteriaId": "18BA268A-EF28-477C-AC24-38E322FFE553",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:ar_g3:v200r002c00spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "554B2AC0-F4C6-4805-BB39-642D6D292A97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:atn:v200r001c00:*:*:*:*:*:*:*",
"matchCriteriaId": "2BB1A47C-FB4F-4EF8-A614-95F3B2E6065D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:atn:v200r001c01:*:*:*:*:*:*:*",
"matchCriteriaId": "C26B81D9-0A62-4F6E-A9A4-5B22F08E0882",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:cx200:v100r005:*:*:*:*:*:*:*",
"matchCriteriaId": "A24ECC75-1032-4DFD-A0C3-315ABB68C50F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:cx300:v100r005:*:*:*:*:*:*:*",
"matchCriteriaId": "0F9BA9C4-65A8-4D9D-A21C-CEB53DB2E513",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:cx600:v200r002:*:*:*:*:*:*:*",
"matchCriteriaId": "D71F25CF-F4DE-4FC5-82E9-179CFFA4CA61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:cx600:v600r001:*:*:*:*:*:*:*",
"matchCriteriaId": "5D94D86A-C025-4A96-A700-D676B90CBBF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:cx600:v600r002:*:*:*:*:*:*:*",
"matchCriteriaId": "3F61F187-74C5-4C50-9F91-6303C87582B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:cx600:v600r003:*:*:*:*:*:*:*",
"matchCriteriaId": "BB2B2269-0784-4DE2-B48A-9A36F9B30F96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:e200_usg2200:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9151ED5E-04DD-4221-9669-C8112168A507",
"versionEndIncluding": "v200r003c00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:e200_usg5100:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F63E41F8-8408-4E7A-A423-ACC2C44B3141",
"versionEndIncluding": "v200r003c00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:e200e-b:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8235FC6D-220F-4F75-BDD2-77FA661F33A2",
"versionEndIncluding": "v100r005c01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:e200e-c:*:*:*:*:*:*:*:*",
"matchCriteriaId": "04FF6514-05AF-4D86-9B10-B50BC8D0622D",
"versionEndIncluding": "v200r003c00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:e200e-usg2100:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D14FD9A2-90D5-493C-9BC7-095EBD644114",
"versionEndIncluding": "v100r005c01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:e200e-x1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "25B60ADA-D40C-48C5-A237-DEE5DD372933",
"versionEndIncluding": "v100r005c01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:e200e-x2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C3502D88-6168-41E3-8641-4045C9EA9B90",
"versionEndIncluding": "v100r005c01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:e200x3:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0F6DBFF5-0B0B-4F0D-96A1-D2D487AE57C7",
"versionEndIncluding": "v200r003c00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:e200x5:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5AF99475-D5A4-407E-8A7F-D6642186E5B6",
"versionEndIncluding": "v200r003c00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:e200x7:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0D68DD7D-29F9-460E-9D9C-A70F0DD489B1",
"versionEndIncluding": "v200r003c00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:eudemon_8080e:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E5A801B9-7BB4-4E06-8ED2-D9EF565F313E",
"versionEndIncluding": "v100r003c00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:eudemon_8160e:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1E9D04EF-A73F-4BF6-AB34-3C489156BBD3",
"versionEndIncluding": "v100r003c00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:eudemon_usg5300:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3510EF8C-F3EB-4531-A0A8-8E0734652E26",
"versionEndIncluding": "v200r001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:eudemon_usg5500:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F08A74A7-65FC-424C-ACAD-B6A6ED27FF60",
"versionEndIncluding": "v200r002",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:eudemon_usg9300:*:*:*:*:*:*:*:*",
"matchCriteriaId": "788B8EBF-16FA-4FDD-B07A-5A4F6E6B310A",
"versionEndIncluding": "v100r003c00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:eudemon_usg9500:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8C625CA3-BD79-42E8-91B4-539E90FBF0C5",
"versionEndIncluding": "v200r001c00spc600",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:eudemon1000:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AFF18B94-150C-413F-B6D4-47B5E05DF4BA",
"versionEndIncluding": "v200r006c02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:eudemon1000e-u:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DBB0AFBD-5F0E-494A-A752-9EE2F81DF2C5",
"versionEndIncluding": "v200r001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:eudemon1000e-x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "11D8297A-362B-4056-A94F-9D49FF0B56B7",
"versionEndIncluding": "v200r002",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:eudemon100e:v200r007:*:*:*:*:*:*:*",
"matchCriteriaId": "956ED431-6CE1-4873-BDC3-7832F5867C28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:eudemon200:v200r001:*:*:*:*:*:*:*",
"matchCriteriaId": "5679FA9F-B4E5-42A9-9B9A-3601BE785CC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:eudemon300:*:*:*:*:*:*:*:*",
"matchCriteriaId": "014E4B7B-E107-40B6-9B18-F5610959EA8B",
"versionEndIncluding": "v200r006c02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:eudemon500:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E0CA4ACA-0104-4A93-9FBC-DC0496A1EB70",
"versionEndIncluding": "v200r006c02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:eudemon8000e-x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7B686C4E-FD19-42B0-87A5-162D72C47BE0",
"versionEndIncluding": "v200r001c00spc600",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:h3c_ar\\(oem_in\\):*:*:*:*:*:*:*:*",
"matchCriteriaId": "FBDEE398-3BC9-4855-952F-44B37BF9F478",
"versionEndIncluding": "r2209",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:ma5200g:v200r003:*:*:*:*:*:*:*",
"matchCriteriaId": "8D17E429-865D-4677-872E-1E191BB0A6DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:ma5200g:v300r003:*:*:*:*:*:*:*",
"matchCriteriaId": "CD2ADD48-FBB4-4E65-8486-757D2ADA4DA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:me60:v100r005:*:*:*:*:*:*:*",
"matchCriteriaId": "1AF75F78-2B91-47C3-B5AE-F4C9769B5AD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:me60:v100r006:*:*:*:*:*:*:*",
"matchCriteriaId": "18496123-2B0E-46D1-88F6-85897B2B65B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:me60:v600r002:*:*:*:*:*:*:*",
"matchCriteriaId": "E0045741-3B14-435E-8B12-B536751DD24F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:me60:v600r003:*:*:*:*:*:*:*",
"matchCriteriaId": "AE8094F7-FAB2-4624-B2ED-467B40ADA260",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:me60:v600r005c00spc600:*:*:*:*:*:*:*",
"matchCriteriaId": "4BC19826-AC6E-4DE1-95CA-49D4BB6F6644",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:ne20:v200r005:*:*:*:*:*:*:*",
"matchCriteriaId": "49D7692F-6EA0-4A5E-B841-2B49332FCC5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:ne20e-x6:v300r005:*:*:*:*:*:*:*",
"matchCriteriaId": "C555EAC5-1E45-4BE5-8C69-DB1916A2EBF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:ne40:v300r005:*:*:*:*:*:*:*",
"matchCriteriaId": "AFF2311E-D7DE-4C7C-BD88-4B947BD4F8E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:ne40e:v300r005:*:*:*:*:*:*:*",
"matchCriteriaId": "B23A5D99-8458-4285-ABF8-FA0D2F49B811",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:ne40e:v600r001:*:*:*:*:*:*:*",
"matchCriteriaId": "5348DF82-072D-4B3B-9919-B5478420A98F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:ne40e\\/80e:v600r002:*:*:*:*:*:*:*",
"matchCriteriaId": "54C3C26D-0FD0-48B9-A168-E9C6605DCB0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:ne40e\\/80e:v600r003:*:*:*:*:*:*:*",
"matchCriteriaId": "3D4D3971-B2DA-44EC-97A1-CFF436BF44F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:ne5000e:v300r007:*:*:*:*:*:*:*",
"matchCriteriaId": "CDA4A9B6-378D-4F4B-B88D-C13859E6236B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:ne5000e:v800r002:*:*:*:*:*:*:*",
"matchCriteriaId": "FF6322F0-0749-4C3D-9144-D92A64B9D5FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:ne80:v300r005:*:*:*:*:*:*:*",
"matchCriteriaId": "74801C9A-31D1-4E74-9211-9AB67B5FEAB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:ne80e:v600r001:*:*:*:*:*:*:*",
"matchCriteriaId": "AA2D277B-08F0-4F6A-BC99-FBBCA4F5207D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:ne80e:v600r002:*:*:*:*:*:*:*",
"matchCriteriaId": "A81A4563-15DC-4125-9E3D-5B9FB0360EA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:ne80e:v600r003:*:*:*:*:*:*:*",
"matchCriteriaId": "449449A2-28B2-4A9A-A2C9-84A18596AEDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:nip100:v100r001:*:*:*:*:*:*:*",
"matchCriteriaId": "2BE4E8E1-AF7C-49E9-9758-887EFD8CB8F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:nip1000:v100r001:*:*:*:*:*:*:*",
"matchCriteriaId": "90FF10E6-4080-4186-83DE-37703A468F3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:nip200:v100r001:*:*:*:*:*:*:*",
"matchCriteriaId": "6B0009DF-D44E-4D96-909F-B911D7BA127B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:nip2100:v100r001c00:*:*:*:*:*:*:*",
"matchCriteriaId": "B8CE9794-9A67-4F65-A81A-EE00AE714A88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:nip2200:v100r001c00:*:*:*:*:*:*:*",
"matchCriteriaId": "B3DC0192-8E8B-4E0C-A91C-92094A167878",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:nip5100:v100r001c00:*:*:*:*:*:*:*",
"matchCriteriaId": "9317FE4B-95F0-4615-9FA1-683D644BC3E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s2300:v100r002:*:*:*:*:*:*:*",
"matchCriteriaId": "871BB53D-F86F-4E3D-8DF7-875C8C1C7FDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s2300:v100r003:*:*:*:*:*:*:*",
"matchCriteriaId": "7E655344-8341-4FFA-BBED-F5D5A15759D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s2300:v100r005:*:*:*:*:*:*:*",
"matchCriteriaId": "662EDAE9-2B0F-4774-8790-2C62997764FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s2300:v100r006:*:*:*:*:*:*:*",
"matchCriteriaId": "22621191-B2CD-4BA9-B6F1-8D59850604A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s2700:v100r006:*:*:*:*:*:*:*",
"matchCriteriaId": "142335E6-A4F5-4CC4-8D86-835C3E0E5211",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s3300:v100r002:*:*:*:*:*:*:*",
"matchCriteriaId": "AF7B5B70-1540-490F-8486-31639DB54F12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s3300:v100r003:*:*:*:*:*:*:*",
"matchCriteriaId": "33864641-EB9A-4CCC-9057-26D22AD839BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s3300:v100r005:*:*:*:*:*:*:*",
"matchCriteriaId": "59AD4C23-6315-4B97-85BB-1074F36F7291",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s3300:v100r006:*:*:*:*:*:*:*",
"matchCriteriaId": "972BB8A0-27D8-4A0A-865E-57E37F70A484",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s3300hi:v100r006:*:*:*:*:*:*:*",
"matchCriteriaId": "41435CB4-537C-45DC-B8DB-0C1F38F1D222",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s3300hi:v200r001:*:*:*:*:*:*:*",
"matchCriteriaId": "6D5FE313-7374-4D7A-9A01-F389311710C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s3700:v100r005:*:*:*:*:*:*:*",
"matchCriteriaId": "7EF096DC-B6F4-4763-AC6B-72CB46AB1976",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s3700:v100r006:*:*:*:*:*:*:*",
"matchCriteriaId": "D1171FC3-5A2E-40C6-85FF-AF7E78F96C87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s3700:v200r001:*:*:*:*:*:*:*",
"matchCriteriaId": "A706C2B0-5E15-4C90-910F-0ABB65573C93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s5300:v100r002:*:*:*:*:*:*:*",
"matchCriteriaId": "2295584A-2664-45AE-BA0C-1B0411F29A13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s5300:v100r003:*:*:*:*:*:*:*",
"matchCriteriaId": "DDA542A3-7BB3-42B6-ACBB-D00AD4AD707A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s5300:v100r005:*:*:*:*:*:*:*",
"matchCriteriaId": "5361C4C5-BBC5-42FE-A575-985B57EF575E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s5300:v100r006:*:*:*:*:*:*:*",
"matchCriteriaId": "75A90C9F-8DAE-45B4-BB78-6080A434E5FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s5300hi:v100r006:*:*:*:*:*:*:*",
"matchCriteriaId": "175A8714-CD80-472B-9507-829EBC59B805",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s5300hi:v200r001:*:*:*:*:*:*:*",
"matchCriteriaId": "81195EA9-D62B-492D-AA37-EF7AD17AED7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s5306:v100r006:*:*:*:*:*:*:*",
"matchCriteriaId": "47052A6F-E532-42B6-9B4B-46424A1F6377",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s5306:v200r001:*:*:*:*:*:*:*",
"matchCriteriaId": "8B22E5AB-DAF6-4020-A62E-BE6FBE57D3DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s5700:v100r005:*:*:*:*:*:*:*",
"matchCriteriaId": "3C178B6F-8608-4BBE-A8D8-8798FB1D75E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s5700:v100r006:*:*:*:*:*:*:*",
"matchCriteriaId": "29CAD535-0216-4048-BFDA-863AA5425BA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s5700:v200r001:*:*:*:*:*:*:*",
"matchCriteriaId": "9424F3B6-A280-4043-A670-3768D9515631",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s6300:v100r006:*:*:*:*:*:*:*",
"matchCriteriaId": "4FB869CD-37F8-4E77-8065-B9C8FADED40C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s6300:v200r001:*:*:*:*:*:*:*",
"matchCriteriaId": "C22B5DE3-03ED-4ED4-BD86-278197FA3FC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s6700:v100r006:*:*:*:*:*:*:*",
"matchCriteriaId": "652F2CCF-41FE-4DEC-8179-FF285AB99E52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s6700:v200r001:*:*:*:*:*:*:*",
"matchCriteriaId": "66149AA8-E897-4563-97EC-C5EDCDBE072B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s7700:v100r003:*:*:*:*:*:*:*",
"matchCriteriaId": "0B3F7637-0B4C-40D0-B814-B19F10118795",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s7700:v100r006:*:*:*:*:*:*:*",
"matchCriteriaId": "04686A95-05CF-4ACC-89E5-2140DFC423F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s9300:v100r001:*:*:*:*:*:*:*",
"matchCriteriaId": "63BB797D-2C82-4A55-A26A-61A6C1C86888",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s9300:v100r002:*:*:*:*:*:*:*",
"matchCriteriaId": "465F6E51-0676-4443-9122-CB2AD59C7516",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s9300:v100r003:*:*:*:*:*:*:*",
"matchCriteriaId": "94970073-415B-4358-833F-CC220653376D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s9300:v100r006:*:*:*:*:*:*:*",
"matchCriteriaId": "F26E31D2-31F8-4D4F-AD3A-44C59B22B121",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:svn2000:v200r001c00:*:*:*:*:*:*:*",
"matchCriteriaId": "59513736-11B7-47E6-B5C4-D33F9E032BEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:svn3000:v100r002c02spc802b041:*:*:*:*:*:*:*",
"matchCriteriaId": "931A86E3-43C1-4C72-8425-862C33A2DBA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:svn5000:v200r001c00:*:*:*:*:*:*:*",
"matchCriteriaId": "15EBA968-C3E0-430E-944D-B4DA30B932C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:svn5300:v100r001c01b019:*:*:*:*:*:*:*",
"matchCriteriaId": "17A15567-DC96-4513-8681-93CE26B4FA07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:wlan_ac_6605:v200r001c00:*:*:*:*:*:*:*",
"matchCriteriaId": "1968B0D3-1653-459A-865D-79DBB9AADEE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:wlan_ac_6605:v200r001c00spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "7490231F-7FAB-4875-812F-657B7BF4F136",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack."
},
{
"lang": "es",
"value": "Los Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, y NIP5100 utiliza el algoritmo DES para las contrase\u00f1as almacenados, lo que hace que sea m\u00e1s f\u00e1cil para los atacantes dependientes de contexto obtener contrase\u00f1as de texto simple a trav\u00e9s de un ataque de fuerza bruta."
}
],
"id": "CVE-2012-4960",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-06-20T15:55:00.897",
"references": [
{
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
},
{
"source": "cret@cert.org",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/948096"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/948096"
}
],
"sourceIdentifier": "cret@cert.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-310"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2012-4960 (GCVE-0-2012-4960)
Vulnerability from cvelistv5 – Published: 2013-06-20 15:00 – Updated: 2024-08-06 20:50- n/a
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T20:50:18.270Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "VU#948096",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/948096"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-12-17T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-08-22T09:00:00",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"name": "VU#948096",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/948096"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2012-4960",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "VU#948096",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/948096"
},
{
"name": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm",
"refsource": "CONFIRM",
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2012-4960",
"datePublished": "2013-06-20T15:00:00",
"dateReserved": "2012-09-17T00:00:00",
"dateUpdated": "2024-08-06T20:50:18.270Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-4960 (GCVE-0-2012-4960)
Vulnerability from nvd – Published: 2013-06-20 15:00 – Updated: 2024-08-06 20:50- n/a
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T20:50:18.270Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "VU#948096",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/948096"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-12-17T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-08-22T09:00:00",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"name": "VU#948096",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/948096"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2012-4960",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "VU#948096",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/948096"
},
{
"name": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm",
"refsource": "CONFIRM",
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2012-4960",
"datePublished": "2013-06-20T15:00:00",
"dateReserved": "2012-09-17T00:00:00",
"dateUpdated": "2024-08-06T20:50:18.270Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}