All the vulnerabilites related to huawei - s5300ei
cve-2015-3913
Vulnerability from cvelistv5
Published
2017-06-08 21:00
Modified
2024-08-06 05:56
Severity ?
Summary
The IP stack in multiple Huawei Campus series switch models allows remote attackers to cause a denial of service (reboot) via a crafted ICMP request message.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T05:56:16.330Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-427449.htm"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-05-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The IP stack in multiple Huawei Campus series switch models allows remote attackers to cause a denial of service (reboot) via a crafted ICMP request message."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-06-08T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-427449.htm"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2015-3913",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The IP stack in multiple Huawei Campus series switch models allows remote attackers to cause a denial of service (reboot) via a crafted ICMP request message."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-427449.htm",
              "refsource": "CONFIRM",
              "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-427449.htm"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2015-3913",
    "datePublished": "2017-06-08T21:00:00",
    "dateReserved": "2015-05-12T00:00:00",
    "dateUpdated": "2024-08-06T05:56:16.330Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2015-8677
Vulnerability from cvelistv5
Published
2016-04-14 15:00
Modified
2024-08-06 08:29
Severity ?
Summary
Memory leak in Huawei S5300EI, S5300SI, S5310HI, and S6300EI Campus series switches with software V200R003C00 before V200R003SPH011 and V200R005C00 before V200R005SPH008; S2350EI and S5300LI Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH008, and V200R006C00 before V200R006SPH002; S9300, S7700, and S9700 Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH009, and V200R006C00 before V200R006SPH003; S5720HI and S5720EI Campus series switches with software V200R006C00 before V200R006SPH002; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote authenticated users to cause a denial of service (memory consumption and device restart) by logging in and out of the (1) HTTPS or (2) SFTP server, related to SSL session information.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T08:29:20.208Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-03-switch-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-01-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Memory leak in Huawei S5300EI, S5300SI, S5310HI, and S6300EI Campus series switches with software V200R003C00 before V200R003SPH011 and V200R005C00 before V200R005SPH008; S2350EI and S5300LI Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH008, and V200R006C00 before V200R006SPH002; S9300, S7700, and S9700 Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH009, and V200R006C00 before V200R006SPH003; S5720HI and S5720EI Campus series switches with software V200R006C00 before V200R006SPH002; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote authenticated users to cause a denial of service (memory consumption and device restart) by logging in and out of the (1) HTTPS or (2) SFTP server, related to SSL session information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-04-14T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-03-switch-en"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2015-8677",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Memory leak in Huawei S5300EI, S5300SI, S5310HI, and S6300EI Campus series switches with software V200R003C00 before V200R003SPH011 and V200R005C00 before V200R005SPH008; S2350EI and S5300LI Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH008, and V200R006C00 before V200R006SPH002; S9300, S7700, and S9700 Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH009, and V200R006C00 before V200R006SPH003; S5720HI and S5720EI Campus series switches with software V200R006C00 before V200R006SPH002; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote authenticated users to cause a denial of service (memory consumption and device restart) by logging in and out of the (1) HTTPS or (2) SFTP server, related to SSL session information."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-03-switch-en",
              "refsource": "CONFIRM",
              "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-03-switch-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2015-8677",
    "datePublished": "2016-04-14T15:00:00",
    "dateReserved": "2015-12-25T00:00:00",
    "dateUpdated": "2024-08-06T08:29:20.208Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2015-8676
Vulnerability from cvelistv5
Published
2016-04-14 15:00
Modified
2024-08-06 08:29
Severity ?
Summary
Memory leak in Huawei S5300EI, S5300SI, S5310HI, S6300EI/ S2350EI, and S5300LI Campus series switches with software V200R001C00 before V200R001SPH018, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; S9300, S7700, and S9700 Campus series switches with software V200R001C00 before V200R001SPH023, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote attackers to cause a denial of service (memory consumption and reboot) via a large number of ICMPv6 packets.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T08:29:20.209Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-02-switch-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-01-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Memory leak in Huawei S5300EI, S5300SI, S5310HI, S6300EI/ S2350EI, and S5300LI Campus series switches with software V200R001C00 before V200R001SPH018, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; S9300, S7700, and S9700 Campus series switches with software V200R001C00 before V200R001SPH023, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote attackers to cause a denial of service (memory consumption and reboot) via a large number of ICMPv6 packets."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-04-14T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-02-switch-en"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2015-8676",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Memory leak in Huawei S5300EI, S5300SI, S5310HI, S6300EI/ S2350EI, and S5300LI Campus series switches with software V200R001C00 before V200R001SPH018, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; S9300, S7700, and S9700 Campus series switches with software V200R001C00 before V200R001SPH023, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote attackers to cause a denial of service (memory consumption and reboot) via a large number of ICMPv6 packets."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-02-switch-en",
              "refsource": "CONFIRM",
              "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-02-switch-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2015-8676",
    "datePublished": "2016-04-14T15:00:00",
    "dateReserved": "2015-12-25T00:00:00",
    "dateUpdated": "2024-08-06T08:29:20.209Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

var-201604-0328
Vulnerability from variot

Memory leak in Huawei S5300EI, S5300SI, S5310HI, and S6300EI Campus series switches with software V200R003C00 before V200R003SPH011 and V200R005C00 before V200R005SPH008; S2350EI and S5300LI Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH008, and V200R006C00 before V200R006SPH002; S9300, S7700, and S9700 Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH009, and V200R006C00 before V200R006SPH003; S5720HI and S5720EI Campus series switches with software V200R006C00 before V200R006SPH002; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote authenticated users to cause a denial of service (memory consumption and device restart) by logging in and out of the (1) HTTPS or (2) SFTP server, related to SSL session information. HuaweiS5300EI is a Huawei S series switch product. A number of Huawei products have a memory leak vulnerability in the HTTPS or SFTP server, allowing remote attackers to consume memory and log in and out of the HTTPS or SFTP server for denial of service attacks. Multiple Huawei Switches are prone to a remote denial-of-service vulnerability. Attackers can exploit this issue to cause a memory exhaustion, denying service to legitimate users. The Huawei S5300EI and others are all S-series switch products of China's Huawei (Huawei). Memory leak vulnerabilities exist in several Huawei products. The following products and versions are affected: using V200R003C00 version and V200R005C00 version software Huawei S5300EI , S5300SI , S5310HI , S6300EI ,use V200R003C00 Version, V200R005C00 version and V200R006C00 version software Huawei S2350EI , S5300LI , S9300 , S7700 , S9700 ,use V200R006C00 version software Huawei S5720HI, S5720EI, Huawei S2300, S3300 using V100R006C05 software

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201604-0328",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "s7700",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005c00"
      },
      {
        "model": "s5300li",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "s2350ei",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "s5300li",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003sph011"
      },
      {
        "model": "s7700",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005sph009"
      },
      {
        "model": "s5300li",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005c00"
      },
      {
        "model": "s5720ei",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c00"
      },
      {
        "model": "s2350ei",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005c00"
      },
      {
        "model": "s2350ei",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006sph002"
      },
      {
        "model": "s9700",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "s9700",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006sph003"
      },
      {
        "model": "s5310hi",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001sph018"
      },
      {
        "model": "s7700",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "s5300si",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003sph011"
      },
      {
        "model": "s9300",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c00"
      },
      {
        "model": "s5720ei",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006sph002"
      },
      {
        "model": "s3300",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r006c05"
      },
      {
        "model": "s9700",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005c00"
      },
      {
        "model": "s5300li",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005sph008"
      },
      {
        "model": "s9700",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003sph011"
      },
      {
        "model": "s2350ei",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003sph011"
      },
      {
        "model": "s5300ei",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "s6300ei",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003sph011"
      },
      {
        "model": "s6300ei",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r002c00"
      },
      {
        "model": "s9700",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c00"
      },
      {
        "model": "s7700",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c00"
      },
      {
        "model": "s2300",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r006c05"
      },
      {
        "model": "s5720hi",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c00"
      },
      {
        "model": "s5300si",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r002c00"
      },
      {
        "model": "s5310hi",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003sph011"
      },
      {
        "model": "s5310hi",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c00"
      },
      {
        "model": "s9300",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006sph003"
      },
      {
        "model": "s5300ei",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005c00"
      },
      {
        "model": "s5300ei",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003sph011"
      },
      {
        "model": "s9700",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005sph009"
      },
      {
        "model": "s5300si",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001sph018"
      },
      {
        "model": "s5300li",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c00"
      },
      {
        "model": "s7700",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006sph003"
      },
      {
        "model": "s6300ei",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c00"
      },
      {
        "model": "s2350ei",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c00"
      },
      {
        "model": "s3300",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r006sph022"
      },
      {
        "model": "s9300",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "s5310hi",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r002c00"
      },
      {
        "model": "s5300si",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c00"
      },
      {
        "model": "s2350ei",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005sph008"
      },
      {
        "model": "s9300",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003sph011"
      },
      {
        "model": "s6300ei",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001sph018"
      },
      {
        "model": "s5300li",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006sph002"
      },
      {
        "model": "s2300",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r006sph022"
      },
      {
        "model": "s7700",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003sph011"
      },
      {
        "model": "s5720hi",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006sph002"
      },
      {
        "model": "s9300",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005c00"
      },
      {
        "model": "s5300ei",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005sph008"
      },
      {
        "model": "s9300",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005sph009"
      },
      {
        "model": "s9700",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r005c00"
      },
      {
        "model": "s2350ei",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r005c00"
      },
      {
        "model": "s2350ei",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s7700",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r005sph009"
      },
      {
        "model": "s5310hi",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r003sph011"
      },
      {
        "model": "s2300",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s9300",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "s5300si",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r003sph011"
      },
      {
        "model": "s5300si",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "s5300si",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r005sph008"
      },
      {
        "model": "s5310hi",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "s5300li",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5310hi",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r005sph008"
      },
      {
        "model": "s5300li",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r006sph002"
      },
      {
        "model": "s2350ei",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r003sph011"
      },
      {
        "model": "s9300",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r003sph011"
      },
      {
        "model": "s9700",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "s6300ei",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r005c00"
      },
      {
        "model": "s6300ei",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s2350ei",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "s2350ei",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r005sph008"
      },
      {
        "model": "s5300li",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r006c00"
      },
      {
        "model": "s7700",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r006sph003"
      },
      {
        "model": "s9700",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r003sph011"
      },
      {
        "model": "s5300ei",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s9300",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r005sph009"
      },
      {
        "model": "s5720hi",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r006sph002"
      },
      {
        "model": "s7700",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r006c00"
      },
      {
        "model": "s5720ei",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r006sph002"
      },
      {
        "model": "s3300",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v100r006sph022"
      },
      {
        "model": "s5300li",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r005c00"
      },
      {
        "model": "s5300ei",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r005c00"
      },
      {
        "model": "s3300",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v100r006c05"
      },
      {
        "model": "s6300ei",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "s7700",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5720ei",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s2350ei",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r006sph002"
      },
      {
        "model": "s9700",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r005sph009"
      },
      {
        "model": "s6300ei",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r003sph011"
      },
      {
        "model": "s3300",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5720ei",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r006c00"
      },
      {
        "model": "s9300",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r006c00"
      },
      {
        "model": "s5310hi",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s9300",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r006sph003"
      },
      {
        "model": "s5720hi",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r006c00"
      },
      {
        "model": "s6300ei",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r005sph008"
      },
      {
        "model": "s7700",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r005c00"
      },
      {
        "model": "s2300",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v100r006sph022"
      },
      {
        "model": "s9300",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5300ei",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r003sph011"
      },
      {
        "model": "s5300li",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "s5300ei",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "s5300ei",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r005sph008"
      },
      {
        "model": "s2300",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v100r006c05"
      },
      {
        "model": "s9700",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r006c00"
      },
      {
        "model": "s9700",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r006sph003"
      },
      {
        "model": "s2350ei",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r006c00"
      },
      {
        "model": "s7700",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "s5300li",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r003sph011"
      },
      {
        "model": "s7700",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r003sph011"
      },
      {
        "model": "s5300li",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r005sph008"
      },
      {
        "model": "s9300",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r005c00"
      },
      {
        "model": "s9700",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5720hi",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5300si",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r005c00"
      },
      {
        "model": "s5310hi",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r005c00"
      },
      {
        "model": "s5300si",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5300ei v200r003c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5300ei v200r005c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5300si v200r003c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5300si v200r005c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5310hi 200r003c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5310hi 200r005c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s6300ei 200r003c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s6300ei 200r005c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s2350ei 200r003c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s2350ei 200r005c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s2350ei 200r006c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5300li 200r003c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5300li 200r005c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5300li 200r006c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s9300 200r003c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s9300 200r005c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s9300 200r006c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s7700 200r003c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s7700 200r005c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s7700 200r006c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s9700 200r003c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s9700 200r005c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s9700 200r006c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5720hi 200r006c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5720ei 200r006c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s2300 100r006c05",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s3300 100r006c05",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s9700",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s9300",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s2350ei",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5720ei",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s7700",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5300li",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5720hi",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s2300",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s3300",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s6300ei",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-02289"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007108"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-8677"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201604-314"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5300ei_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "v200r003sph011",
                    "versionStartIncluding": "v200r003c00",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5300ei_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "v200r005sph008",
                    "versionStartIncluding": "v200r005c00",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:s5300ei:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5300si_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "v200r003sph011",
                    "versionStartIncluding": "v200r002c00",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5300si_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "v200r001sph018",
                    "versionStartIncluding": "v200r001c00",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:s5300si:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5310hi_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "v200r001sph018",
                    "versionStartIncluding": "v200r001c00",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5310hi_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "v200r003sph011",
                    "versionStartIncluding": "v200r002c00",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:s5310hi:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s6300ei_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "v200r001sph018",
                    "versionStartIncluding": "v200r001c00",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s6300ei_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "v200r003sph011",
                    "versionStartIncluding": "v200r002c00",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:s6300ei:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5300li_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "v200r003sph011",
                    "versionStartIncluding": "v200r003c00",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5300li_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "v200r005sph008",
                    "versionStartIncluding": "v200r005c00",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5300li_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "v200r006sph002",
                    "versionStartIncluding": "v200r006c00",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:s5300li:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s2350ei_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "v200r006sph002",
                    "versionStartIncluding": "v200r006c00",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s2350ei_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "v200r005sph008",
                    "versionStartIncluding": "v200r005c00",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s2350ei_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "v200r003sph011",
                    "versionStartIncluding": "v200r003c00",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:s2350ei:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "v200r005sph009",
                    "versionStartIncluding": "v200r005c00",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "v200r003sph011",
                    "versionStartIncluding": "v200r003c00",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "v200r006sph003",
                    "versionStartIncluding": "v200r006c00",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "v200r005sph009",
                    "versionStartIncluding": "v200r005c00",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "v200r003sph011",
                    "versionStartIncluding": "v200r003c00",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "v200r006sph003",
                    "versionStartIncluding": "v200r006c00",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "v200r003sph011",
                    "versionStartIncluding": "v200r003c00",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "v200r005sph009",
                    "versionStartIncluding": "v200r005c00",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "v200r006sph003",
                    "versionStartIncluding": "v200r006c00",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5720hi_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "v200r006sph002",
                    "versionStartIncluding": "v200r006c00",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:s5720hi:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5720ei_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "v200r006sph002",
                    "versionStartIncluding": "v200r006c00",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:s5720ei:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s2300_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "v100r006sph022",
                    "versionStartIncluding": "v100r006c05",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s3300_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "v100r006sph022",
                    "versionStartIncluding": "v100r006c05",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:s3300:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2015-8677"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The vendor reported the issue.",
    "sources": [
      {
        "db": "BID",
        "id": "90912"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2015-8677",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.0,
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "Single",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 6.8,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2015-8677",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.9,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.0,
            "id": "CNVD-2016-02289",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.0,
            "id": "VHN-86638",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:S/C:N/I:N/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 2.8,
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 6.5,
            "baseSeverity": "Medium",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2015-8677",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2015-8677",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2016-02289",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201604-314",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-86638",
            "trust": 0.1,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2015-8677",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-02289"
      },
      {
        "db": "VULHUB",
        "id": "VHN-86638"
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-8677"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007108"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-8677"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201604-314"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Memory leak in Huawei S5300EI, S5300SI, S5310HI, and S6300EI Campus series switches with software V200R003C00 before V200R003SPH011 and V200R005C00 before V200R005SPH008; S2350EI and S5300LI Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH008, and V200R006C00 before V200R006SPH002; S9300, S7700, and S9700 Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH009, and V200R006C00 before V200R006SPH003; S5720HI and S5720EI Campus series switches with software V200R006C00 before V200R006SPH002; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote authenticated users to cause a denial of service (memory consumption and device restart) by logging in and out of the (1) HTTPS or (2) SFTP server, related to SSL session information. HuaweiS5300EI is a Huawei S series switch product. A number of Huawei products have a memory leak vulnerability in the HTTPS or SFTP server, allowing remote attackers to consume memory and log in and out of the HTTPS or SFTP server for denial of service attacks. Multiple Huawei Switches are prone to a remote denial-of-service vulnerability. \nAttackers can exploit this issue to cause a memory exhaustion, denying service to legitimate users. The Huawei S5300EI and others are all S-series switch products of China\u0027s Huawei (Huawei). Memory leak vulnerabilities exist in several Huawei products. The following products and versions are affected: using V200R003C00 version and V200R005C00 version software Huawei S5300EI , S5300SI , S5310HI , S6300EI ,use V200R003C00 Version, V200R005C00 version and V200R006C00 version software Huawei S2350EI , S5300LI , S9300 , S7700 , S9700 ,use V200R006C00 version software Huawei S5720HI, S5720EI, Huawei S2300, S3300 using V100R006C05 software",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2015-8677"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007108"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-02289"
      },
      {
        "db": "BID",
        "id": "90912"
      },
      {
        "db": "VULHUB",
        "id": "VHN-86638"
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-8677"
      }
    ],
    "trust": 2.61
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2015-8677",
        "trust": 3.5
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007108",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201604-314",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-02289",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "90912",
        "trust": 0.4
      },
      {
        "db": "VULHUB",
        "id": "VHN-86638",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-8677",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-02289"
      },
      {
        "db": "VULHUB",
        "id": "VHN-86638"
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-8677"
      },
      {
        "db": "BID",
        "id": "90912"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007108"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-8677"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201604-314"
      }
    ]
  },
  "id": "VAR-201604-0328",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-02289"
      },
      {
        "db": "VULHUB",
        "id": "VHN-86638"
      }
    ],
    "trust": 1.6153170325
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-02289"
      }
    ]
  },
  "last_update_date": "2023-12-18T12:44:55.504000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Huawei-SA-20160113-03-Switch",
        "trust": 0.8,
        "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-03-switch-en"
      },
      {
        "title": "Patches for various Huawei product switch memory leak vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/74355"
      },
      {
        "title": "Multiple Huawei Product memory leak vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=60969"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-02289"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007108"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201604-314"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-399",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-86638"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007108"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-8677"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.4,
        "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-03-switch-en"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8677"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-8677"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/399.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://www.securityfocus.com/bid/90912"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-02289"
      },
      {
        "db": "VULHUB",
        "id": "VHN-86638"
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-8677"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007108"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-8677"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201604-314"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-02289"
      },
      {
        "db": "VULHUB",
        "id": "VHN-86638"
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-8677"
      },
      {
        "db": "BID",
        "id": "90912"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007108"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-8677"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201604-314"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-04-19T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-02289"
      },
      {
        "date": "2016-04-14T00:00:00",
        "db": "VULHUB",
        "id": "VHN-86638"
      },
      {
        "date": "2016-04-14T00:00:00",
        "db": "VULMON",
        "id": "CVE-2015-8677"
      },
      {
        "date": "2016-01-13T00:00:00",
        "db": "BID",
        "id": "90912"
      },
      {
        "date": "2016-05-02T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-007108"
      },
      {
        "date": "2016-04-14T15:59:03.857000",
        "db": "NVD",
        "id": "CVE-2015-8677"
      },
      {
        "date": "2016-04-15T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201604-314"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-04-19T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-02289"
      },
      {
        "date": "2019-06-20T00:00:00",
        "db": "VULHUB",
        "id": "VHN-86638"
      },
      {
        "date": "2019-06-20T00:00:00",
        "db": "VULMON",
        "id": "CVE-2015-8677"
      },
      {
        "date": "2016-07-06T14:51:00",
        "db": "BID",
        "id": "90912"
      },
      {
        "date": "2016-05-02T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-007108"
      },
      {
        "date": "2019-06-20T14:26:28.073000",
        "db": "NVD",
        "id": "CVE-2015-8677"
      },
      {
        "date": "2016-04-15T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201604-314"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201604-314"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Huawei Service disruption in products  (DoS) Vulnerabilities",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007108"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "resource management error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201604-314"
      }
    ],
    "trust": 0.6
  }
}

var-201604-0327
Vulnerability from variot

Memory leak in Huawei S5300EI, S5300SI, S5310HI, S6300EI/ S2350EI, and S5300LI Campus series switches with software V200R001C00 before V200R001SPH018, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; S9300, S7700, and S9700 Campus series switches with software V200R001C00 before V200R001SPH023, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote attackers to cause a denial of service (memory consumption and reboot) via a large number of ICMPv6 packets. HuaweiS5300EI is a Huawei S series switch product. The HuaweiS5300EI handles memory leaks in ICMPv6 packets, allowing remote attackers to exploit vulnerabilities to submit special requests for denial of service attacks. Multiple Huawei Switches are prone to a remote denial-of-service vulnerability. The Huawei S5300EI and others are all S-series switch products of China's Huawei (Huawei). Memory leak vulnerabilities exist in several Huawei products. The following products and versions are affected: Huawei S5300EI, S5300SI, S5310HI, S6300EI, S2350EI, S5300LI, S9300, S7700, and S9700 using software V200R001C00, V200R002C00, and V200R003C00;

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201604-0327",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "s9300",
        "scope": "lt",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "s9700",
        "scope": "lt",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "s7700",
        "scope": "lt",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "s9300",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001sph023"
      },
      {
        "model": "s5300ei",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001sph018"
      },
      {
        "model": "s5300ei",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c00"
      },
      {
        "model": "s9700",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "s5300li",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003sph011"
      },
      {
        "model": "s9300",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r002c00"
      },
      {
        "model": "s7700",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001sph023"
      },
      {
        "model": "s7700",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r002c00"
      },
      {
        "model": "s9300",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c00"
      },
      {
        "model": "s5300si",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003sph011"
      },
      {
        "model": "s3300",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r006c05"
      },
      {
        "model": "s5300li",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r002c00"
      },
      {
        "model": "s5300li",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001sph018"
      },
      {
        "model": "s2350ei",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003sph011"
      },
      {
        "model": "s2350ei",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r002c00"
      },
      {
        "model": "s7700",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c00"
      },
      {
        "model": "s9300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "s6300ei",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003sph011"
      },
      {
        "model": "s6300ei",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r002c00"
      },
      {
        "model": "s2300",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r006c05"
      },
      {
        "model": "s5300si",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r002c00"
      },
      {
        "model": "s5310hi",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003sph011"
      },
      {
        "model": "s5310hi",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c00"
      },
      {
        "model": "s9700",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r002c00"
      },
      {
        "model": "s5300li",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c00"
      },
      {
        "model": "s5300ei",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003sph011"
      },
      {
        "model": "s2350ei",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c00"
      },
      {
        "model": "s9700",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001sph023"
      },
      {
        "model": "s5300si",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001sph018"
      },
      {
        "model": "s6300ei",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c00"
      },
      {
        "model": "s3300",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r006sph022"
      },
      {
        "model": "s5310hi",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r002c00"
      },
      {
        "model": "s5300si",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c00"
      },
      {
        "model": "s2350ei",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001sph018"
      },
      {
        "model": "s7700",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "s9700",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c00"
      },
      {
        "model": "s5300ei",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r002c00"
      },
      {
        "model": "s6300ei",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001sph018"
      },
      {
        "model": "s2300",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r006sph022"
      },
      {
        "model": "s5310hi",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001sph018"
      },
      {
        "model": "s5300si",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r001c00"
      },
      {
        "model": "s5310hi",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r001c00"
      },
      {
        "model": "s2350ei",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5310hi",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r003sph011"
      },
      {
        "model": "s2300",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s9300",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r002c00"
      },
      {
        "model": "s5300si",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r003sph011"
      },
      {
        "model": "s9700",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r001c00"
      },
      {
        "model": "s2350ei",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r001c00"
      },
      {
        "model": "s5300si",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r002c00"
      },
      {
        "model": "s5300si",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "s5300li",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5310hi",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r002c00"
      },
      {
        "model": "s5310hi",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "s7700",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r001sph023"
      },
      {
        "model": "s2350ei",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r003sph011"
      },
      {
        "model": "s9300",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r003sph011"
      },
      {
        "model": "s6300ei",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s9700",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r002c00"
      },
      {
        "model": "s2350ei",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r002c00"
      },
      {
        "model": "s2350ei",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "s9700",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r003sph011"
      },
      {
        "model": "s5300ei",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s6300ei",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r001sph018"
      },
      {
        "model": "s6300ei",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r001c00"
      },
      {
        "model": "s3300",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v100r006sph022"
      },
      {
        "model": "s5300ei",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r001sph018"
      },
      {
        "model": "s9300",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r001sph023"
      },
      {
        "model": "s3300",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v100r006c05"
      },
      {
        "model": "s6300ei",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r002c00"
      },
      {
        "model": "s6300ei",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "s7700",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s6300ei",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r003sph011"
      },
      {
        "model": "s5300li",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r001sph018"
      },
      {
        "model": "s3300",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5300li",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r001c00"
      },
      {
        "model": "s5310hi",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5300ei",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r001c00"
      },
      {
        "model": "s9700",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r001sph023"
      },
      {
        "model": "s9300",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s2300",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v100r006sph022"
      },
      {
        "model": "s5300ei",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r003sph011"
      },
      {
        "model": "s5300li",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r002c00"
      },
      {
        "model": "s5300li",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "s5300ei",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r002c00"
      },
      {
        "model": "s5300ei",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "s2300",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v100r006c05"
      },
      {
        "model": "s7700",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r001c00"
      },
      {
        "model": "s5300li",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r003sph011"
      },
      {
        "model": "s7700",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r003sph011"
      },
      {
        "model": "s9700",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5300si",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r001sph018"
      },
      {
        "model": "s5310hi",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r001sph018"
      },
      {
        "model": "s7700",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r002c00"
      },
      {
        "model": "s5300si",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s9300",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r001c00"
      },
      {
        "model": "s2350ei",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r001sph018"
      },
      {
        "model": "s5300ei v200r003c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5300ei v200r005c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5300si v200r003c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5300si v200r005c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5310hi 200r003c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5310hi 200r005c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s6300ei 200r003c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s6300ei 200r005c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s2350ei 200r003c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s2350ei 200r005c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s2350ei 200r006c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5300li 200r003c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5300li 200r005c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5300li 200r006c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s9300 200r003c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s9300 200r005c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s9300 200r006c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s7700 200r003c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s7700 200r005c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s7700 200r006c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s9700 200r003c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s9700 200r005c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s9700 200r006c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5720hi 200r006c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5720ei 200r006c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s2300 100r006c05",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s3300 100r006c05",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s9700",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s9300",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s2350ei",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s7700",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5300li",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5300ei",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5310hi",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s3300",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s6300ei",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5300si",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-02290"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007104"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-8676"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201604-313"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s2350ei_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "v200r001sph018",
                    "versionStartIncluding": "v200r001c00",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s2350ei_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "v200r003sph011",
                    "versionStartIncluding": "v200r002c00",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:s2350ei:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5300ei_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "v200r003sph011",
                    "versionStartIncluding": "v200r002c00",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5300ei_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "v200r001sph018",
                    "versionStartIncluding": "v200r001c00",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:s5300ei:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5300si_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "v200r001sph018",
                    "versionStartIncluding": "v200r001c00",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5300si_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "v200r003sph011",
                    "versionStartIncluding": "v200r002c00",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:s5300si:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5310hi_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "v200r001sph018",
                    "versionStartIncluding": "v200r001c00",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5310hi_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "v200r003sph011",
                    "versionStartIncluding": "v200r002c00",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:s5310hi:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s6300ei_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "v200r003sph011",
                    "versionStartIncluding": "v200r002c00",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s6300ei_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "v200r001sph018",
                    "versionStartIncluding": "v200r001c00",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:s6300ei:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5300li_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "v200r001sph018",
                    "versionStartIncluding": "v200r001c00",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5300li_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "v200r003sph011",
                    "versionStartIncluding": "v200r002c00",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:s5300li:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "v200r001sph023",
                    "versionStartIncluding": "v200r001c00",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "v200r003c00",
                    "versionStartIncluding": "v200r002c00",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r003c00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "v200r001sph023",
                    "versionStartIncluding": "v200r001c00",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "v200r003c00",
                    "versionStartIncluding": "v200r002c00",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r003c00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "v200r003c00",
                    "versionStartIncluding": "v200r002c00",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r003c00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "v200r001sph023",
                    "versionStartIncluding": "v200r001c00",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s2300_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "v100r006sph022",
                    "versionStartIncluding": "v100r006c05",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s3300_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "v100r006sph022",
                    "versionStartIncluding": "v100r006c05",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:s3300:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2015-8676"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The vendor reported the issue.",
    "sources": [
      {
        "db": "BID",
        "id": "90893"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2015-8676",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 7.8,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2015-8676",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.0,
            "id": "CNVD-2016-02290",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-86637",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 7.5,
            "baseSeverity": "High",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2015-8676",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2015-8676",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2016-02290",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201604-313",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-86637",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-02290"
      },
      {
        "db": "VULHUB",
        "id": "VHN-86637"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007104"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-8676"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201604-313"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Memory leak in Huawei S5300EI, S5300SI, S5310HI, S6300EI/ S2350EI, and S5300LI Campus series switches with software V200R001C00 before V200R001SPH018, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; S9300, S7700, and S9700 Campus series switches with software V200R001C00 before V200R001SPH023, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote attackers to cause a denial of service (memory consumption and reboot) via a large number of ICMPv6 packets. HuaweiS5300EI is a Huawei S series switch product. The HuaweiS5300EI handles memory leaks in ICMPv6 packets, allowing remote attackers to exploit vulnerabilities to submit special requests for denial of service attacks. Multiple Huawei Switches are prone to a remote denial-of-service vulnerability. The Huawei S5300EI and others are all S-series switch products of China\u0027s Huawei (Huawei). Memory leak vulnerabilities exist in several Huawei products. The following products and versions are affected: Huawei S5300EI, S5300SI, S5310HI, S6300EI, S2350EI, S5300LI, S9300, S7700, and S9700 using software V200R001C00, V200R002C00, and V200R003C00;",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2015-8676"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007104"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-02290"
      },
      {
        "db": "BID",
        "id": "90893"
      },
      {
        "db": "VULHUB",
        "id": "VHN-86637"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2015-8676",
        "trust": 3.4
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007104",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201604-313",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-02290",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "90893",
        "trust": 0.4
      },
      {
        "db": "VULHUB",
        "id": "VHN-86637",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-02290"
      },
      {
        "db": "VULHUB",
        "id": "VHN-86637"
      },
      {
        "db": "BID",
        "id": "90893"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007104"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-8676"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201604-313"
      }
    ]
  },
  "id": "VAR-201604-0327",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-02290"
      },
      {
        "db": "VULHUB",
        "id": "VHN-86637"
      }
    ],
    "trust": 1.6153170325
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-02290"
      }
    ]
  },
  "last_update_date": "2023-12-18T13:44:13.781000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Huawei-SA-20160113-02-Switch",
        "trust": 0.8,
        "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-02-switch-en"
      },
      {
        "title": "Patches for various Huawei product switches ICMPv6 packet memory leak vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/74357"
      },
      {
        "title": "Multiple Huawei Product memory leak vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=60968"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-02290"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007104"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201604-313"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.9
      },
      {
        "problemtype": "CWE-399",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-86637"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007104"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-8676"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-02-switch-en"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8676"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-8676"
      },
      {
        "trust": 0.6,
        "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-03-switch-en"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-02290"
      },
      {
        "db": "VULHUB",
        "id": "VHN-86637"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007104"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-8676"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201604-313"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-02290"
      },
      {
        "db": "VULHUB",
        "id": "VHN-86637"
      },
      {
        "db": "BID",
        "id": "90893"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007104"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-8676"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201604-313"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-04-19T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-02290"
      },
      {
        "date": "2016-04-14T00:00:00",
        "db": "VULHUB",
        "id": "VHN-86637"
      },
      {
        "date": "2016-01-13T00:00:00",
        "db": "BID",
        "id": "90893"
      },
      {
        "date": "2016-04-28T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-007104"
      },
      {
        "date": "2016-04-14T15:59:02.980000",
        "db": "NVD",
        "id": "CVE-2015-8676"
      },
      {
        "date": "2016-04-15T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201604-313"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-04-19T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-02290"
      },
      {
        "date": "2019-06-20T00:00:00",
        "db": "VULHUB",
        "id": "VHN-86637"
      },
      {
        "date": "2016-07-06T14:51:00",
        "db": "BID",
        "id": "90893"
      },
      {
        "date": "2016-04-28T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-007104"
      },
      {
        "date": "2019-06-20T13:54:56.177000",
        "db": "NVD",
        "id": "CVE-2015-8676"
      },
      {
        "date": "2016-04-15T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201604-313"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201604-313"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Huawei Service disruption in products  (DoS) Vulnerabilities",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007104"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "resource management error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201604-313"
      }
    ],
    "trust": 0.6
  }
}

var-201706-0237
Vulnerability from variot

The IP stack in multiple Huawei Campus series switch models allows remote attackers to cause a denial of service (reboot) via a crafted ICMP request message. HuaweiS2300 is a switch device of Huawei (Huawei). IPstack is one of the transport protocols. IPstack in several Huawei products has a security vulnerability. The vulnerability stems from the failure of the packet processing module to correctly determine the length of the IP option. An attacker can use this vulnerability to create a board reset by using a special ICMP packet. The following versions are affected: Huawei S2300/S2700/S3300/S3700 V100R00600 Version, V100R006C03 Version, V100R006C05 Version; S5300EI/S5700EI/S5300SI/S5700SI V100R006C00 Version, V200R001C00SPC300 Version, V200R002C00SPC300 Version, V200R003C00SPC300 Version, V200R005C00SPC300 Version; S5300HI/S5700HI S6300EI/S6700EI /S5710HI V200R001C00SPC300 Version, V200R002C00SPC300 Version, V200R003C00SPC300 Version, V200R005C00SPC300 Version; S5300LI/S5700LI/S2350EI/S2750EI V200R001C00SPC300 Version, V200R002C00SPC300 Version, V200R003C00SPC300 Version, V200R005C00SPC300 Version, V200R006C00SPC500 Version, V200R007C00SPC500 Version; S5720HI V200R006C00SPC500 Version, V200R007C00SPC500 Version; S7700/S9300/ S9700 V200R001C00SPC300, V200R002C00SPC300, V200R003C00SPC500, V200R005C00SPC300, V200R006C00SPC500, V200R007C00SPC500; S12700

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201706-0237",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "s5300ei",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v200r003c00spc300"
      },
      {
        "model": "s2300",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v100r006c00"
      },
      {
        "model": "s2300",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v100r006c05"
      },
      {
        "model": "s2300",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v100r006c03"
      },
      {
        "model": "s6300ei",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v200r001c00spc300"
      },
      {
        "model": "s2700",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v100r006c05"
      },
      {
        "model": "s2700",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v100r006c03"
      },
      {
        "model": "s5300ei",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v100r006c00"
      },
      {
        "model": "s2700",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v100r006c00"
      },
      {
        "model": "s5300ei",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v200r001c00spc300"
      },
      {
        "model": "s5300li",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005c00spc300"
      },
      {
        "model": "s9300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00spc500"
      },
      {
        "model": "s9700",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r002c00spc300"
      },
      {
        "model": "s6300ei",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r002c00spc300"
      },
      {
        "model": "s2750ei",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c00spc500"
      },
      {
        "model": "s5700hi",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c00spc300"
      },
      {
        "model": "s9300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c00spc500"
      },
      {
        "model": "s9300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c00spc300"
      },
      {
        "model": "s5700li",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r002c00spc300"
      },
      {
        "model": "s5710hi",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00spc300"
      },
      {
        "model": "s5700si",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c00spc300"
      },
      {
        "model": "s5720hi",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00spc500"
      },
      {
        "model": "s5700li",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005c00spc300"
      },
      {
        "model": "s5710hi",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r002c00spc300"
      },
      {
        "model": "s7700",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00spc500"
      },
      {
        "model": "s5700hi",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00spc300"
      },
      {
        "model": "s5300ei",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r002c00spc300"
      },
      {
        "model": "s12700",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c00spc500"
      },
      {
        "model": "s5700si",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00spc300"
      },
      {
        "model": "s6700ei",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r002c00spc300"
      },
      {
        "model": "s3300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r006c03"
      },
      {
        "model": "s2750ei",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005c00spc300"
      },
      {
        "model": "s5700hi",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005c00spc300"
      },
      {
        "model": "s5300li",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00spc500"
      },
      {
        "model": "s9300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005c00spc300"
      },
      {
        "model": "s5700ei",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r006c00"
      },
      {
        "model": "s5300li",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c00spc300"
      },
      {
        "model": "s5700si",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005c00spc300"
      },
      {
        "model": "s5700ei",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005c00spc300"
      },
      {
        "model": "s2350ei",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c00spc500"
      },
      {
        "model": "s2350ei",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c00spc300"
      },
      {
        "model": "s9700",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c00spc500"
      },
      {
        "model": "s5300hi",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00spc300"
      },
      {
        "model": "s7700",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r002c00spc300"
      },
      {
        "model": "s12700",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005c00spc300"
      },
      {
        "model": "s5700li",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c00spc300"
      },
      {
        "model": "s2350ei",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00spc300"
      },
      {
        "model": "s5300hi",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005c00spc300"
      },
      {
        "model": "s5300li",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r002c00spc300"
      },
      {
        "model": "s6300ei",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00spc300"
      },
      {
        "model": "s2750ei",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00spc500"
      },
      {
        "model": "s2350ei",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005c00spc300"
      },
      {
        "model": "s5300si",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r002c00spc300"
      },
      {
        "model": "s5700li",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00spc300"
      },
      {
        "model": "s2750ei",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c00spc300"
      },
      {
        "model": "s6700ei",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c00spc300"
      },
      {
        "model": "s9300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00spc500"
      },
      {
        "model": "s9700",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005c00spc300"
      },
      {
        "model": "s5300si",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r006c00"
      },
      {
        "model": "s6300ei",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005c00spc300"
      },
      {
        "model": "s5700ei",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c00spc300"
      },
      {
        "model": "s5300si",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005c00spc300"
      },
      {
        "model": "s3300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r006c00"
      },
      {
        "model": "s3300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r006c05"
      },
      {
        "model": "s2750ei",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00spc300"
      },
      {
        "model": "s5720hi",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c00spc500"
      },
      {
        "model": "s7700",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00spc500"
      },
      {
        "model": "s6700ei",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00spc300"
      },
      {
        "model": "s12700",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00spc500"
      },
      {
        "model": "s3700",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r006c00"
      },
      {
        "model": "s5710hi",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005c00spc300"
      },
      {
        "model": "s3700",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r006c05"
      },
      {
        "model": "s5700ei",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00spc300"
      },
      {
        "model": "s7700",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c00spc500"
      },
      {
        "model": "s5300ei",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005c00spc300"
      },
      {
        "model": "s7700",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c00spc300"
      },
      {
        "model": "s2750ei",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r002c00spc300"
      },
      {
        "model": "s5700hi",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r002c00spc300"
      },
      {
        "model": "s5300hi",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c00spc300"
      },
      {
        "model": "s6700ei",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005c00spc300"
      },
      {
        "model": "s9300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r002c00spc300"
      },
      {
        "model": "s9700",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00spc500"
      },
      {
        "model": "s5700si",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r002c00spc300"
      },
      {
        "model": "s5700ei",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r002c00spc300"
      },
      {
        "model": "s2350ei",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00spc500"
      },
      {
        "model": "s5700si",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r006c00"
      },
      {
        "model": "s9700",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00spc500"
      },
      {
        "model": "s5300li",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c00spc500"
      },
      {
        "model": "s9700",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c00spc300"
      },
      {
        "model": "s5300si",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c00spc300"
      },
      {
        "model": "s3700",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r006c03"
      },
      {
        "model": "s5700li",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00spc500"
      },
      {
        "model": "s7700",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005c00spc300"
      },
      {
        "model": "s5700li",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c00spc500"
      },
      {
        "model": "s5300li",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00spc300"
      },
      {
        "model": "s5300hi",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r002c00spc300"
      },
      {
        "model": "s5710hi",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c00spc300"
      },
      {
        "model": "s5300si",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00spc300"
      },
      {
        "model": "s2350ei",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r002c00spc300"
      },
      {
        "model": "s12700",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s2300",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s2350ei",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s2700",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s2750ei",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s3300",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s3700",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5300ei",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5300hi",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5300si",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5700ei",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5700hi",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5700si",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5710hi",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5720hi",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s6300ei",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s6700ei",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s7700",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s9300",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s9700",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s12700 v200r005c00spc300",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s12700 v200r006c00spc500",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s12700 v200r007c00spc500",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5720hi v200r006c00spc500",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5720hi v200r007c00spc500",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-33208"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007610"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-3913"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-290"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s2300_firmware:v100r006c05:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s2300_firmware:v100r006c03:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s2300_firmware:v100r006c00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s2700_firmware:v100r006c00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s2700_firmware:v100r006c05:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s2700_firmware:v100r006c03:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s3300_firmware:v100r006c05:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s3300_firmware:v100r006c00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s3300_firmware:v100r006c03:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:s3300:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s3700_firmware:v100r006c05:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s3700_firmware:v100r006c00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s3700_firmware:v100r006c03:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:s3700:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5300ei_firmware:v100r006c00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5300ei_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5300ei_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5300ei_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5300ei_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:s5300ei:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5700ei_firmware:v100r006c00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5700ei_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5700ei_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5700ei_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5700ei_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:s5700ei:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5300si_firmware:v100r006c00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5300si_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5300si_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5300si_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5300si_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:s5300si:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5700si_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5700si_firmware:v100r006c00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5700si_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5700si_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5700si_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:s5700si:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5300hi_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5300hi_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5300hi_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5300hi_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:s5300hi:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5700hi_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5700hi_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5700hi_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5700hi_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:s5700hi:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s6300ei_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s6300ei_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s6300ei_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s6300ei_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:s6300ei:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s6700ei_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s6700ei_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s6700ei_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s6700ei_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:s6700ei:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5710hi_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5710hi_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5710hi_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5710hi_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:s5710hi:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5300li_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5300li_firmware:v200r007c00spc500:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5300li_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5300li_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5300li_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5300li_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:s5300li:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5700li_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5700li_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5700li_firmware:v200r007c00spc500:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5700li_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5700li_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5700li_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:s5700li:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s2350ei_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s2350ei_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s2350ei_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s2350ei_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s2350ei_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s2350ei_firmware:v200r007c00spc500:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:s2350ei:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s2750ei_firmware:v200r007c00spc500:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s2750ei_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s2750ei_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s2750ei_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s2750ei_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s2750ei_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:s2750ei:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5720hi_firmware:v200r007c00spc500:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s5720hi_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:s5720hi:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r007c00spc500:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r007c00spc500:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r007c00spc500:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s12700_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s12700_firmware:v200r007c00spc500:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:s12700_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2015-3913"
      }
    ]
  },
  "cve": "CVE-2015-3913",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 7.8,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2015-3913",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2017-33208",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-81874",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 7.5,
            "baseSeverity": "High",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2015-3913",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2015-3913",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2017-33208",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201706-290",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-81874",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-33208"
      },
      {
        "db": "VULHUB",
        "id": "VHN-81874"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007610"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-3913"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-290"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The IP stack in multiple Huawei Campus series switch models allows remote attackers to cause a denial of service (reboot) via a crafted ICMP request message. HuaweiS2300 is a switch device of Huawei (Huawei). IPstack is one of the transport protocols. IPstack in several Huawei products has a security vulnerability. The vulnerability stems from the failure of the packet processing module to correctly determine the length of the IP option. An attacker can use this vulnerability to create a board reset by using a special ICMP packet. The following versions are affected: Huawei S2300/S2700/S3300/S3700 V100R00600 Version, V100R006C03 Version, V100R006C05 Version; S5300EI/S5700EI/S5300SI/S5700SI V100R006C00 Version, V200R001C00SPC300 Version, V200R002C00SPC300 Version, V200R003C00SPC300 Version, V200R005C00SPC300 Version; S5300HI/S5700HI S6300EI/S6700EI /S5710HI V200R001C00SPC300 Version, V200R002C00SPC300 Version, V200R003C00SPC300 Version, V200R005C00SPC300 Version; S5300LI/S5700LI/S2350EI/S2750EI V200R001C00SPC300 Version, V200R002C00SPC300 Version, V200R003C00SPC300 Version, V200R005C00SPC300 Version, V200R006C00SPC500 Version, V200R007C00SPC500 Version; S5720HI V200R006C00SPC500 Version, V200R007C00SPC500 Version; S7700/S9300/ S9700 V200R001C00SPC300, V200R002C00SPC300, V200R003C00SPC500, V200R005C00SPC300, V200R006C00SPC500, V200R007C00SPC500; S12700",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2015-3913"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007610"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-33208"
      },
      {
        "db": "VULHUB",
        "id": "VHN-81874"
      }
    ],
    "trust": 2.25
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2015-3913",
        "trust": 3.1
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007610",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-290",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-33208",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-81874",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-33208"
      },
      {
        "db": "VULHUB",
        "id": "VHN-81874"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007610"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-3913"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-290"
      }
    ]
  },
  "id": "VAR-201706-0237",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-33208"
      },
      {
        "db": "VULHUB",
        "id": "VHN-81874"
      }
    ],
    "trust": 1.48259088
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-33208"
      }
    ]
  },
  "last_update_date": "2023-12-18T12:37:21.925000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Huawei-SA-20150506-01-ICMP",
        "trust": 0.8,
        "url": "http://www.huawei.com/en/psirt/security-advisories/hw-427449"
      },
      {
        "title": "Patches for various Huawei product input verification vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/105678"
      },
      {
        "title": "Multiple Huawei Fixes for product input validation vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=74793"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-33208"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007610"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-290"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-20",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-81874"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007610"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-3913"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-427449.htm"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-3913"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3913"
      },
      {
        "trust": 0.6,
        "url": "http://www.huawei.com/en/psirt/security-advisories/hw-427449"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-33208"
      },
      {
        "db": "VULHUB",
        "id": "VHN-81874"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007610"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-3913"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-290"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-33208"
      },
      {
        "db": "VULHUB",
        "id": "VHN-81874"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007610"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-3913"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-290"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-11-08T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-33208"
      },
      {
        "date": "2017-06-08T00:00:00",
        "db": "VULHUB",
        "id": "VHN-81874"
      },
      {
        "date": "2017-07-10T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-007610"
      },
      {
        "date": "2017-06-08T21:29:00.377000",
        "db": "NVD",
        "id": "CVE-2015-3913"
      },
      {
        "date": "2017-06-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201706-290"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-11-09T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-33208"
      },
      {
        "date": "2017-06-22T00:00:00",
        "db": "VULHUB",
        "id": "VHN-81874"
      },
      {
        "date": "2017-07-10T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-007610"
      },
      {
        "date": "2017-06-22T19:00:17.147000",
        "db": "NVD",
        "id": "CVE-2015-3913"
      },
      {
        "date": "2017-09-29T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201706-290"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-290"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Huawei Campus Series switch model  IP Service operation disruption in the stack  (DoS) Vulnerabilities",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007610"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-290"
      }
    ],
    "trust": 0.6
  }
}

Vulnerability from fkie_nvd
Published
2016-04-14 15:59
Modified
2024-11-21 02:38
Summary
Memory leak in Huawei S5300EI, S5300SI, S5310HI, S6300EI/ S2350EI, and S5300LI Campus series switches with software V200R001C00 before V200R001SPH018, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; S9300, S7700, and S9700 Campus series switches with software V200R001C00 before V200R001SPH023, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote attackers to cause a denial of service (memory consumption and reboot) via a large number of ICMPv6 packets.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s2350ei_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "39008864-1F6B-41B1-A07B-9F5227669ECF",
              "versionEndExcluding": "v200r001sph018",
              "versionStartIncluding": "v200r001c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s2350ei_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B1457C7-F741-4A7B-B4D8-126190A0B870",
              "versionEndExcluding": "v200r003sph011",
              "versionStartIncluding": "v200r002c00",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s2350ei:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A8844AD-71F1-4139-B6CA-5534942DA424",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s5300ei_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "19788976-18BB-4B7A-AE46-558C779A9F2C",
              "versionEndExcluding": "v200r001sph018",
              "versionStartIncluding": "v200r001c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5300ei_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7245FC5C-EF30-48A0-9294-4F61A1F784AE",
              "versionEndExcluding": "v200r003sph011",
              "versionStartIncluding": "v200r002c00",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s5300ei:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "438F46FA-6373-4323-B2C6-F4D6CFABD675",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s5300si_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1818A8DD-58A0-41B2-9E8B-EC1851784654",
              "versionEndExcluding": "v200r001sph018",
              "versionStartIncluding": "v200r001c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5300si_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F77856A0-E46B-4492-8C9F-5B5FEEFEDCED",
              "versionEndExcluding": "v200r003sph011",
              "versionStartIncluding": "v200r002c00",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s5300si:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "498B6006-41C9-4853-8CCD-1A3A122FAB51",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s5310hi_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "57D589CC-550B-4C9E-827C-3F745B9E86C5",
              "versionEndExcluding": "v200r001sph018",
              "versionStartIncluding": "v200r001c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5310hi_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9932CAA1-D2DA-4DB5-9068-36A3F8B99558",
              "versionEndExcluding": "v200r003sph011",
              "versionStartIncluding": "v200r002c00",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s5310hi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D72B3B4B-1B7A-486C-A8BD-662390D585EB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s6300ei_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13FEE8AC-82C1-45A1-AEEA-90DA113B28FC",
              "versionEndExcluding": "v200r001sph018",
              "versionStartIncluding": "v200r001c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s6300ei_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4B767F3-90A5-4B2D-BAA1-8FA0FC0A3FA0",
              "versionEndExcluding": "v200r003sph011",
              "versionStartIncluding": "v200r002c00",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s6300ei:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC63D2FE-F8BB-4A20-8DD6-801A12C06F7C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s5300li_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9E6FE64-24E7-4126-81EB-CEDD5552CA69",
              "versionEndExcluding": "v200r001sph018",
              "versionStartIncluding": "v200r001c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5300li_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "149C309F-27C3-4B91-B83D-1A6D3877BB41",
              "versionEndExcluding": "v200r003sph011",
              "versionStartIncluding": "v200r002c00",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s5300li:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3696874A-E462-482F-8CA4-4FAC37C8641E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s9300_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2218055E-B6F7-4C63-AA46-3563C4F9546A",
              "versionEndExcluding": "v200r001sph023",
              "versionStartIncluding": "v200r001c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s9300_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE336196-B997-4613-A21B-6E543C12BFD6",
              "versionEndExcluding": "v200r003c00",
              "versionStartIncluding": "v200r002c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s9300_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "473B6E52-E60F-4D3C-9028-E362DF2A8327",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s7700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9D64809-AD3A-4057-ABE6-EA53556F894A",
              "versionEndExcluding": "v200r001sph023",
              "versionStartIncluding": "v200r001c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s7700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2A6DC9F-6B9A-4A9B-AA9D-E50C45675C36",
              "versionEndExcluding": "v200r003c00",
              "versionStartIncluding": "v200r002c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1DFF0C0-AA17-4AA1-A418-4759D1A58852",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8769C2C4-E333-432B-8943-CFDFAE013379",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s9700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5961FF81-109C-4CF8-942D-ED9908981B69",
              "versionEndExcluding": "v200r001sph023",
              "versionStartIncluding": "v200r001c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s9700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DA3D055-9991-44A6-A250-C5119BF95857",
              "versionEndExcluding": "v200r003c00",
              "versionStartIncluding": "v200r002c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "06AD9ACA-E0C3-4096-BE50-94E717CDA318",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s2300_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2D6DD87-D00C-4AB9-AC7F-BCF066DF6030",
              "versionEndExcluding": "v100r006sph022",
              "versionStartIncluding": "v100r006c05",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "17566603-275F-4E6B-B5D9-4A716EEC03DC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s3300_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB47AE0C-67AA-4605-B1F2-C51065C8786F",
              "versionEndExcluding": "v100r006sph022",
              "versionStartIncluding": "v100r006c05",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s3300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A1410A1-ADCC-474F-ABEE-F0FE48E4CD7A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Memory leak in Huawei S5300EI, S5300SI, S5310HI, S6300EI/ S2350EI, and S5300LI Campus series switches with software V200R001C00 before V200R001SPH018, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; S9300, S7700, and S9700 Campus series switches with software V200R001C00 before V200R001SPH023, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote attackers to cause a denial of service (memory consumption and reboot) via a large number of ICMPv6 packets."
    },
    {
      "lang": "es",
      "value": "Fuga de memoria en switches Huawei de la serie Campus S5300EI, S5300SI, S5310HI, S6300EI/ S2350EI y S5300LI con software V200R001C00 en versiones anteriores a V200R001SPH018, V200R002C00 en versiones anteriores a V200R003SPH011 y V200R003C00 en versiones anteriores a V200R003SPH011; switches de la serie Campus S9300, S7700 y S9700 con software V200R001C00 en versiones anteriores a V200R001SPH023, V200R002C00 en versiones anteriores a V200R003SPH011 y V200R003C00 en versiones anteriores a V200R003SPH011; y switches de la serie Campus S2300 y S3300 con software V100R006C05 en versiones anteriores a V100R006SPH022 permite a atacantes remotos causar una denegaci\u00f3n de servicio (consumo de memoria y reinicio) a trav\u00e9s de un gran n\u00famero de paquetes ICMPv6."
    }
  ],
  "id": "CVE-2015-8676",
  "lastModified": "2024-11-21T02:38:56.983",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-04-14T15:59:02.980",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-02-switch-en"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-02-switch-en"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        },
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2016-04-14 15:59
Modified
2024-11-21 02:38
Summary
Memory leak in Huawei S5300EI, S5300SI, S5310HI, and S6300EI Campus series switches with software V200R003C00 before V200R003SPH011 and V200R005C00 before V200R005SPH008; S2350EI and S5300LI Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH008, and V200R006C00 before V200R006SPH002; S9300, S7700, and S9700 Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH009, and V200R006C00 before V200R006SPH003; S5720HI and S5720EI Campus series switches with software V200R006C00 before V200R006SPH002; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote authenticated users to cause a denial of service (memory consumption and device restart) by logging in and out of the (1) HTTPS or (2) SFTP server, related to SSL session information.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s5300ei_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD722A3F-A17A-4C2F-BF97-B4EC3E1313AB",
              "versionEndExcluding": "v200r003sph011",
              "versionStartIncluding": "v200r003c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5300ei_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A16F8DA-E9B5-4501-BD07-DCCBC998B5B8",
              "versionEndExcluding": "v200r005sph008",
              "versionStartIncluding": "v200r005c00",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s5300ei:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "438F46FA-6373-4323-B2C6-F4D6CFABD675",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s5300si_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1818A8DD-58A0-41B2-9E8B-EC1851784654",
              "versionEndExcluding": "v200r001sph018",
              "versionStartIncluding": "v200r001c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5300si_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F77856A0-E46B-4492-8C9F-5B5FEEFEDCED",
              "versionEndExcluding": "v200r003sph011",
              "versionStartIncluding": "v200r002c00",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s5300si:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "498B6006-41C9-4853-8CCD-1A3A122FAB51",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s5310hi_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "57D589CC-550B-4C9E-827C-3F745B9E86C5",
              "versionEndExcluding": "v200r001sph018",
              "versionStartIncluding": "v200r001c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5310hi_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9932CAA1-D2DA-4DB5-9068-36A3F8B99558",
              "versionEndExcluding": "v200r003sph011",
              "versionStartIncluding": "v200r002c00",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s5310hi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D72B3B4B-1B7A-486C-A8BD-662390D585EB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s6300ei_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13FEE8AC-82C1-45A1-AEEA-90DA113B28FC",
              "versionEndExcluding": "v200r001sph018",
              "versionStartIncluding": "v200r001c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s6300ei_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4B767F3-90A5-4B2D-BAA1-8FA0FC0A3FA0",
              "versionEndExcluding": "v200r003sph011",
              "versionStartIncluding": "v200r002c00",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s6300ei:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC63D2FE-F8BB-4A20-8DD6-801A12C06F7C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s5300li_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B7C59A1-526B-43D1-BFF6-A78DB487B228",
              "versionEndExcluding": "v200r003sph011",
              "versionStartIncluding": "v200r003c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5300li_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "478CEF58-3701-46B7-9CB6-3AB47E502FC3",
              "versionEndExcluding": "v200r005sph008",
              "versionStartIncluding": "v200r005c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5300li_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFCF982C-559F-4074-9C74-C0C473A93262",
              "versionEndExcluding": "v200r006sph002",
              "versionStartIncluding": "v200r006c00",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s5300li:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3696874A-E462-482F-8CA4-4FAC37C8641E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s2350ei_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA26DEFB-04A3-41F9-A8B3-F3AC06B5EC8A",
              "versionEndExcluding": "v200r003sph011",
              "versionStartIncluding": "v200r003c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s2350ei_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E5D2580-1C41-4367-8A4D-298030C051F1",
              "versionEndExcluding": "v200r005sph008",
              "versionStartIncluding": "v200r005c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s2350ei_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "909F4FF5-B874-4E0B-A6F1-A2E9FE110381",
              "versionEndExcluding": "v200r006sph002",
              "versionStartIncluding": "v200r006c00",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s2350ei:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A8844AD-71F1-4139-B6CA-5534942DA424",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s9300_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B0F9954-F0E2-4D1A-8641-E32E424B80FD",
              "versionEndExcluding": "v200r003sph011",
              "versionStartIncluding": "v200r003c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s9300_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "14879FE3-07A4-4F07-9325-F153170E2017",
              "versionEndExcluding": "v200r005sph009",
              "versionStartIncluding": "v200r005c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s9300_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "614CAF39-2122-4206-905C-C6743656C73A",
              "versionEndExcluding": "v200r006sph003",
              "versionStartIncluding": "v200r006c00",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s9700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0E2E640-EC67-40CC-8EF2-3E61195E8B68",
              "versionEndExcluding": "v200r003sph011",
              "versionStartIncluding": "v200r003c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s9700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "398CABF6-F1D2-4A66-B4EE-45CB2A0F1B6E",
              "versionEndExcluding": "v200r005sph009",
              "versionStartIncluding": "v200r005c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s9700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5F28803-5FC5-4904-9D79-0A3B15F8D1C8",
              "versionEndExcluding": "v200r006sph003",
              "versionStartIncluding": "v200r006c00",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s7700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BCAD4F5-CA86-441B-A542-6AA797F621B5",
              "versionEndExcluding": "v200r003sph011",
              "versionStartIncluding": "v200r003c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s7700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CA11961-ED08-4931-88F4-AC1E9D191E5D",
              "versionEndExcluding": "v200r005sph009",
              "versionStartIncluding": "v200r005c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s7700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "75C05E42-CCCD-446F-BDAB-0CD8FDBEE519",
              "versionEndExcluding": "v200r006sph003",
              "versionStartIncluding": "v200r006c00",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8769C2C4-E333-432B-8943-CFDFAE013379",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s5720hi_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEF5A073-7D11-4875-A7C4-F1298AF6A86D",
              "versionEndExcluding": "v200r006sph002",
              "versionStartIncluding": "v200r006c00",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s5720hi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB64BC36-693E-4101-9C13-4A4C572A4EDE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s5720ei_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "991916AB-5080-42CA-80CE-AFD1E69005E7",
              "versionEndExcluding": "v200r006sph002",
              "versionStartIncluding": "v200r006c00",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s5720ei:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7B06975-BD37-452D-9782-B768610D3777",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s2300_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2D6DD87-D00C-4AB9-AC7F-BCF066DF6030",
              "versionEndExcluding": "v100r006sph022",
              "versionStartIncluding": "v100r006c05",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "17566603-275F-4E6B-B5D9-4A716EEC03DC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s3300_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB47AE0C-67AA-4605-B1F2-C51065C8786F",
              "versionEndExcluding": "v100r006sph022",
              "versionStartIncluding": "v100r006c05",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s3300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A1410A1-ADCC-474F-ABEE-F0FE48E4CD7A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Memory leak in Huawei S5300EI, S5300SI, S5310HI, and S6300EI Campus series switches with software V200R003C00 before V200R003SPH011 and V200R005C00 before V200R005SPH008; S2350EI and S5300LI Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH008, and V200R006C00 before V200R006SPH002; S9300, S7700, and S9700 Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH009, and V200R006C00 before V200R006SPH003; S5720HI and S5720EI Campus series switches with software V200R006C00 before V200R006SPH002; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote authenticated users to cause a denial of service (memory consumption and device restart) by logging in and out of the (1) HTTPS or (2) SFTP server, related to SSL session information."
    },
    {
      "lang": "es",
      "value": "Fuga de memoria en switches Huawei de la serie Campus S5300EI, S5300SI, S5310HI y S6300EI con software V200R003C00 en versiones anteriores a V200R003SPH011 y V200R005C00 en versiones anteriores a V200R005SPH008; switches de la serie Campus S2350EI y S5300LI con software V200R003C00 en versiones anteriores a V200R003SPH011, V200R005C00 en versiones anteriores a V200R005SPH008 y V200R006C00 en versiones anteriores a V200R006SPH002; switches de la serie Campus S9300, S7700 y S9700 con software V200R003C00 en versiones anteriores a V200R003SPH011, V200R005C00 en versiones anteriores a V200R005SPH009 y V200R006C00 en versiones anteriores a V200R006SPH003; switches de la serie Campus S5720HI y S5720EI con software V200R006C00 en versiones anteriores a V200R006SPH002; y switches de la serie Campus S2300 y S3300 con software V100R006C05 en versiones anteriores a V100R006SPH022 permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (consumo de memoria y reinicio de dispositivo) iniciando sesi\u00f3n y cerr\u00e1ndola en el servidor (1) HTTPS o (2) SFTP, relacionada con la informaci\u00f3n de sesi\u00f3n SSL."
    }
  ],
  "id": "CVE-2015-8677",
  "lastModified": "2024-11-21T02:38:57.140",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 6.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-04-14T15:59:03.857",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-03-switch-en"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-03-switch-en"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-06-08 21:29
Modified
2024-11-21 02:30
Summary
The IP stack in multiple Huawei Campus series switch models allows remote attackers to cause a denial of service (reboot) via a crafted ICMP request message.
Impacted products
Vendor Product Version
huawei s2300_firmware v100r006c00
huawei s2300_firmware v100r006c03
huawei s2300_firmware v100r006c05
huawei s2300 -
huawei s2700_firmware v100r006c00
huawei s2700_firmware v100r006c03
huawei s2700_firmware v100r006c05
huawei s2700 -
huawei s3300_firmware v100r006c00
huawei s3300_firmware v100r006c03
huawei s3300_firmware v100r006c05
huawei s3300 -
huawei s3700_firmware v100r006c00
huawei s3700_firmware v100r006c03
huawei s3700_firmware v100r006c05
huawei s3700 -
huawei s5300ei_firmware v100r006c00
huawei s5300ei_firmware v200r001c00spc300
huawei s5300ei_firmware v200r002c00spc300
huawei s5300ei_firmware v200r003c00spc300
huawei s5300ei_firmware v200r005c00spc300
huawei s5300ei -
huawei s5700ei_firmware v100r006c00
huawei s5700ei_firmware v200r001c00spc300
huawei s5700ei_firmware v200r002c00spc300
huawei s5700ei_firmware v200r003c00spc300
huawei s5700ei_firmware v200r005c00spc300
huawei s5700ei -
huawei s5300si_firmware v100r006c00
huawei s5300si_firmware v200r001c00spc300
huawei s5300si_firmware v200r002c00spc300
huawei s5300si_firmware v200r003c00spc300
huawei s5300si_firmware v200r005c00spc300
huawei s5300si -
huawei s5700si_firmware v100r006c00
huawei s5700si_firmware v200r001c00spc300
huawei s5700si_firmware v200r002c00spc300
huawei s5700si_firmware v200r003c00spc300
huawei s5700si_firmware v200r005c00spc300
huawei s5700si -
huawei s5300hi_firmware v200r001c00spc300
huawei s5300hi_firmware v200r002c00spc300
huawei s5300hi_firmware v200r003c00spc300
huawei s5300hi_firmware v200r005c00spc300
huawei s5300hi -
huawei s5700hi_firmware v200r001c00spc300
huawei s5700hi_firmware v200r002c00spc300
huawei s5700hi_firmware v200r003c00spc300
huawei s5700hi_firmware v200r005c00spc300
huawei s5700hi -
huawei s6300ei_firmware v200r001c00spc300
huawei s6300ei_firmware v200r002c00spc300
huawei s6300ei_firmware v200r003c00spc300
huawei s6300ei_firmware v200r005c00spc300
huawei s6300ei -
huawei s6700ei_firmware v200r001c00spc300
huawei s6700ei_firmware v200r002c00spc300
huawei s6700ei_firmware v200r003c00spc300
huawei s6700ei_firmware v200r005c00spc300
huawei s6700ei -
huawei s5710hi_firmware v200r001c00spc300
huawei s5710hi_firmware v200r002c00spc300
huawei s5710hi_firmware v200r003c00spc300
huawei s5710hi_firmware v200r005c00spc300
huawei s5710hi -
huawei s5300li_firmware v200r001c00spc300
huawei s5300li_firmware v200r002c00spc300
huawei s5300li_firmware v200r003c00spc300
huawei s5300li_firmware v200r005c00spc300
huawei s5300li_firmware v200r006c00spc500
huawei s5300li_firmware v200r007c00spc500
huawei s5300li -
huawei s5700li_firmware v200r001c00spc300
huawei s5700li_firmware v200r002c00spc300
huawei s5700li_firmware v200r003c00spc300
huawei s5700li_firmware v200r005c00spc300
huawei s5700li_firmware v200r006c00spc500
huawei s5700li_firmware v200r007c00spc500
huawei s5700li -
huawei s2350ei_firmware v200r001c00spc300
huawei s2350ei_firmware v200r002c00spc300
huawei s2350ei_firmware v200r003c00spc300
huawei s2350ei_firmware v200r005c00spc300
huawei s2350ei_firmware v200r006c00spc500
huawei s2350ei_firmware v200r007c00spc500
huawei s2350ei -
huawei s2750ei_firmware v200r001c00spc300
huawei s2750ei_firmware v200r002c00spc300
huawei s2750ei_firmware v200r003c00spc300
huawei s2750ei_firmware v200r005c00spc300
huawei s2750ei_firmware v200r006c00spc500
huawei s2750ei_firmware v200r007c00spc500
huawei s2750ei -
huawei s5720hi_firmware v200r006c00spc500
huawei s5720hi_firmware v200r007c00spc500
huawei s5720hi -
huawei s7700_firmware v200r001c00spc300
huawei s7700_firmware v200r002c00spc300
huawei s7700_firmware v200r003c00spc500
huawei s7700_firmware v200r005c00spc300
huawei s7700_firmware v200r006c00spc500
huawei s7700_firmware v200r007c00spc500
huawei s7700 -
huawei s9300_firmware v200r001c00spc300
huawei s9300_firmware v200r002c00spc300
huawei s9300_firmware v200r003c00spc500
huawei s9300_firmware v200r005c00spc300
huawei s9300_firmware v200r006c00spc500
huawei s9300_firmware v200r007c00spc500
huawei s9300 -
huawei s9700_firmware v200r001c00spc300
huawei s9700_firmware v200r002c00spc300
huawei s9700_firmware v200r003c00spc500
huawei s9700_firmware v200r005c00spc300
huawei s9700_firmware v200r006c00spc500
huawei s9700_firmware v200r007c00spc500
huawei s9700 -
huawei s12700_firmware v200r005c00spc300
huawei s12700_firmware v200r006c00spc500
huawei s12700_firmware v200r007c00spc500
huawei s12700 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s2300_firmware:v100r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9D7CB90-6F2C-4012-8E57-F3B85F9D09C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s2300_firmware:v100r006c03:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEFF6D05-BC82-4943-9D79-95CBEDD5CD2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s2300_firmware:v100r006c05:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B863F3A-38C5-4E36-8E71-713B12EE6889",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "17566603-275F-4E6B-B5D9-4A716EEC03DC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s2700_firmware:v100r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "02401EA6-28B6-4424-B182-C20CD081FFD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s2700_firmware:v100r006c03:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EA85312-3C8F-4F1F-8138-1A091C453193",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s2700_firmware:v100r006c05:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA7D9357-D179-4B24-A073-17BA09AEC7E9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD2CD071-58E4-4061-8217-990453213470",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s3300_firmware:v100r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "22A2763B-2A83-4C0A-BA11-2B22CE834EDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s3300_firmware:v100r006c03:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C328054-3E5C-4122-AD5B-49A71791D7F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s3300_firmware:v100r006c05:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DBB1A49-B169-40F4-B611-C739896A2A71",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s3300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A1410A1-ADCC-474F-ABEE-F0FE48E4CD7A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s3700_firmware:v100r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "7002CF50-20B6-4CB5-8EDE-8B35C7435D6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s3700_firmware:v100r006c03:*:*:*:*:*:*:*",
              "matchCriteriaId": "85611E3B-826E-4B8F-884B-C121DE4EECEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s3700_firmware:v100r006c05:*:*:*:*:*:*:*",
              "matchCriteriaId": "021F224A-F28F-4192-883C-8A75898BEA84",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s3700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7F84390-E120-406B-967D-B473EB110EA9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s5300ei_firmware:v100r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB980280-1737-47E2-8524-06C2EB3E3A44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5300ei_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "8239CCD8-B83E-4BC0-9F80-F192CE486A4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5300ei_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A43BCB4-6D92-408E-A73E-CF87CD346E0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5300ei_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "030E1304-CCFB-4433-A367-0D2A1B574914",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5300ei_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B196776-C623-4161-8BFB-3F408DB63253",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s5300ei:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "438F46FA-6373-4323-B2C6-F4D6CFABD675",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s5700ei_firmware:v100r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "E881F881-A952-4E28-93A5-8EDFF2FC08BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5700ei_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "860D9897-72D7-48BC-AAA8-89EDC787DA36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5700ei_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC32DB6F-2C8F-45C7-BF80-9750EDAFE1C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5700ei_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3B1BE75-73A8-424A-9B4B-1BBF64C34E23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5700ei_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "B43D90EA-9BB1-49AE-9076-939D20217917",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s5700ei:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B0BE6C3-1FB2-4718-AA9D-1A8D8663C195",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s5300si_firmware:v100r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDBAD45D-6AFB-4A5B-82E8-ED4D15DBF925",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5300si_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A61C07A-A249-4EA4-8B33-604A70707757",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5300si_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BC533FD-445D-4198-9230-46051233EBC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5300si_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "B76A602C-EC5B-48A9-BDF6-07A43BFF925C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5300si_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "1599C015-4E36-4C8E-BE07-351DA50F960B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s5300si:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "498B6006-41C9-4853-8CCD-1A3A122FAB51",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s5700si_firmware:v100r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "210E88DD-C61B-4E70-B412-ABF4B73F3BC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5700si_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "E89C6C1C-AE55-44DC-A9A0-C6B2A8646AAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5700si_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE9C1F25-98EC-43B0-B0C6-6DBFA2CD3A96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5700si_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B019E52-17FB-48D9-A301-B4E1855B0C59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5700si_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "265C8691-8272-4C48-BE25-8B2B51C15888",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s5700si:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24C4DC87-DE8C-461F-A555-F6E9A71C1C48",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s5300hi_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "73686E67-21C2-45B0-A105-A2AB5B3E7218",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5300hi_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "350FCDA4-19BF-4E63-B7C9-A1159A267EBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5300hi_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "6563866F-D1E3-4B8B-9D08-AA952F610556",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5300hi_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "77512809-D6F1-4F19-8B79-70CC973FC6C4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s5300hi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "20B4C8E2-7928-41FF-ACF7-E2CF28501997",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s5700hi_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F365BF7-A73E-4628-98E7-06A6C819B38F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5700hi_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6CFB46C-A6E3-49C4-84A9-B682BD2AF13D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5700hi_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CBAA8F6-0AE2-4287-A3F1-64198AAF7151",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5700hi_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C341CDB-A532-4B87-9DF5-D0576412DC8B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s5700hi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED775342-B93C-4DF9-BC62-B6BE549F1B29",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s6300ei_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FD5B574-03D0-4111-B4AF-3732012C2E52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s6300ei_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "22644C5E-1ABF-433B-AD38-13533395F456",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s6300ei_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "806F90CD-1EDA-4148-8938-DDC78B3DE82D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s6300ei_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "36314640-E462-42EB-9BE6-B4683B9DA7B6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s6300ei:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC63D2FE-F8BB-4A20-8DD6-801A12C06F7C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s6700ei_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "10DD372D-3ED3-4E80-85DB-5E03BF4F38BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s6700ei_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CEEFD6-7FFD-498A-841F-A4664157033B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s6700ei_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC040EE3-4CC8-42CC-A03B-89F4061A3B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s6700ei_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "D68F9EF2-A93E-4CE1-9A7C-7097BDAF18C5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s6700ei:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F09DBA68-6F2E-42B1-B62C-50ED5317D363",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s5710hi_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC1062F4-6272-4C69-9F52-B2D04BF8B04A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5710hi_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA4B9066-4940-4BCF-A11A-65E4D3F9819E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5710hi_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FBC1C70-C1C0-4CAD-9616-039E80837983",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5710hi_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "59EBEED2-52C2-4F9E-919C-C4C6B3617D68",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s5710hi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DFF0F26-CDF2-49B0-AED7-EEA4B9E99E8C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s5300li_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E037F4C-EA5B-4526-9182-F028E580C361",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5300li_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DE63BF3-2EE8-4AB7-91D1-E83D2DFF0F9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5300li_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C17461-23DF-4E9C-9806-102F06D66045",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5300li_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFD9B623-1853-4F2B-B89B-1E31B3AC743A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5300li_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "E849DDBF-80AC-4736-88A2-E6EECCC8CE4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5300li_firmware:v200r007c00spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "983B3479-E7EE-49C2-82D5-02B6620B5479",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s5300li:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3696874A-E462-482F-8CA4-4FAC37C8641E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s5700li_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E9BB0F-6A34-490E-82EC-ADE12AC3E649",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5700li_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B171E0D-91E5-4EC6-9C0F-FAB2BC0A3915",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5700li_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "B338780D-71EB-44A1-A95B-26C240586FAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5700li_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC27F896-EF43-40D4-A436-212E865BF699",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5700li_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2570A5D-2AC0-495C-BF99-2E19A9B8217F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5700li_firmware:v200r007c00spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "D60AF421-5F71-43CC-B852-B16063B26F66",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s5700li:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "21B89917-2B3D-4BA5-8836-ADEECF46E976",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s2350ei_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C15E318-E188-46CD-B7B5-AFDDB12137E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s2350ei_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "01A6ECDF-0606-45BD-8574-76508DB88669",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s2350ei_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1C446CC-A622-4E08-9FDE-399EBDB3C3B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s2350ei_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "B73AADFE-502E-43B0-BAE2-9E99ACFC5799",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s2350ei_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5E2F24F-D185-4529-BFA3-E3B6CED7ABED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s2350ei_firmware:v200r007c00spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AB4D0E0-636B-47CC-8A9C-86D2937F59A1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s2350ei:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A8844AD-71F1-4139-B6CA-5534942DA424",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s2750ei_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "98BD1EFD-29F1-495E-8701-EFF2CC710F4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s2750ei_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E01D70-2DEC-4A5B-B33E-5665B9200B96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s2750ei_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "D376B21B-5B1C-44F3-A4A3-0650EBC1A0C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s2750ei_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B2FAA30-8F9C-4993-8F24-72D7CFA8EBDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s2750ei_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC43FCD5-E820-44E9-8C2F-63F252BA4042",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s2750ei_firmware:v200r007c00spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5C14E76-DE28-44C1-84FC-6A61B1CE77BD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s2750ei:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7770B303-C595-4D00-961B-23BCCCEBC725",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s5720hi_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "7635D7EE-D274-42C5-A627-E2C77F4753DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5720hi_firmware:v200r007c00spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "7520E268-DFAC-4CC1-AEC5-08844E95CECE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s5720hi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB64BC36-693E-4101-9C13-4A4C572A4EDE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "07A44DEA-AB17-48F4-87C1-B3B6088BCD82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD36DBAD-B0A9-4A16-AE6A-D3949A1764D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D0B5718-9465-476F-B2FA-FFC6FB08E354",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "13FB139B-C0C2-4BB5-BA60-E1B32030F9E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC191A39-26C6-4503-9152-A29A2EAAC6BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r007c00spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "F368821C-C253-4584-B53C-F6BBA0186433",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8769C2C4-E333-432B-8943-CFDFAE013379",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s9300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D1EF10E-F18B-4F3A-AA2B-25003183E19D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s9300_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "54D5B323-BFB3-4A0A-B1E1-37E4DC4FF984",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s9300_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "78DA2DC7-63B3-40D7-BEC7-AF81066A2733",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s9300_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "A066F4B8-2258-4ED2-A166-02FCA7C9F3A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s9300_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDA38762-CACE-403B-8DE5-42E0306FEB28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s9300_firmware:v200r007c00spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "989CE0D9-95CE-4571-A89F-EE083C63CFB8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4EE71EF-90D8-40C6-9E80-A543ED32E976",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C2BF2B6-915B-4F57-8C75-CD09612985F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBDBE325-B6F4-475F-B7F8-F3142F730039",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAB593E5-D919-436C-A10A-6FA72B69EA55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "464C5DF2-E6D7-4679-A375-521FD730CA14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r007c00spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D4F46F5-1BD2-444E-84B9-09DC4440B355",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s12700_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5234B43-EA0C-45C9-B188-4D6085F031F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s12700_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8A79318-19CF-4097-9B49-A9BF7CD9E716",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s12700_firmware:v200r007c00spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAEE3E52-4646-4D35-931B-4739E059732F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "138C1E57-176C-46B1-9704-D9C8391CC802",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The IP stack in multiple Huawei Campus series switch models allows remote attackers to cause a denial of service (reboot) via a crafted ICMP request message."
    },
    {
      "lang": "es",
      "value": "En varios modelos de switch de la serie Huawei Campus, la pila IP permite a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio) a trav\u00e9s de un mensaje de solicitud ICMP manipulado."
    }
  ],
  "id": "CVE-2015-3913",
  "lastModified": "2024-11-21T02:30:04.850",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-06-08T21:29:00.377",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-427449.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-427449.htm"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}