Vulnerabilites related to huawei - s9700
var-201706-0237
Vulnerability from variot

The IP stack in multiple Huawei Campus series switch models allows remote attackers to cause a denial of service (reboot) via a crafted ICMP request message. HuaweiS2300 is a switch device of Huawei (Huawei). IPstack is one of the transport protocols. IPstack in several Huawei products has a security vulnerability. The vulnerability stems from the failure of the packet processing module to correctly determine the length of the IP option. An attacker can use this vulnerability to create a board reset by using a special ICMP packet. The following versions are affected: Huawei S2300/S2700/S3300/S3700 V100R00600 Version, V100R006C03 Version, V100R006C05 Version; S5300EI/S5700EI/S5300SI/S5700SI V100R006C00 Version, V200R001C00SPC300 Version, V200R002C00SPC300 Version, V200R003C00SPC300 Version, V200R005C00SPC300 Version; S5300HI/S5700HI S6300EI/S6700EI /S5710HI V200R001C00SPC300 Version, V200R002C00SPC300 Version, V200R003C00SPC300 Version, V200R005C00SPC300 Version; S5300LI/S5700LI/S2350EI/S2750EI V200R001C00SPC300 Version, V200R002C00SPC300 Version, V200R003C00SPC300 Version, V200R005C00SPC300 Version, V200R006C00SPC500 Version, V200R007C00SPC500 Version; S5720HI V200R006C00SPC500 Version, V200R007C00SPC500 Version; S7700/S9300/ S9700 V200R001C00SPC300, V200R002C00SPC300, V200R003C00SPC500, V200R005C00SPC300, V200R006C00SPC500, V200R007C00SPC500; S12700

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201706-0237",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "s5300ei",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r006c00",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r006c05",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r006c03",
         },
         {
            model: "s6300ei",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r006c05",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r006c03",
         },
         {
            model: "s5300ei",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r006c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r006c00",
         },
         {
            model: "s5300ei",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s5300li",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc300",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc500",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc300",
         },
         {
            model: "s6300ei",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc300",
         },
         {
            model: "s2750ei",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00spc500",
         },
         {
            model: "s5700hi",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00spc500",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s5700li",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc300",
         },
         {
            model: "s5710hi",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "s5700si",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s5720hi",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00spc500",
         },
         {
            model: "s5700li",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc300",
         },
         {
            model: "s5710hi",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc300",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00spc500",
         },
         {
            model: "s5700hi",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "s5300ei",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc300",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00spc500",
         },
         {
            model: "s5700si",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "s6700ei",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc300",
         },
         {
            model: "s3300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c03",
         },
         {
            model: "s2750ei",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc300",
         },
         {
            model: "s5700hi",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc300",
         },
         {
            model: "s5300li",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00spc500",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc300",
         },
         {
            model: "s5700ei",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c00",
         },
         {
            model: "s5300li",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s5700si",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc300",
         },
         {
            model: "s5700ei",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc300",
         },
         {
            model: "s2350ei",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00spc500",
         },
         {
            model: "s2350ei",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00spc500",
         },
         {
            model: "s5300hi",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc300",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc300",
         },
         {
            model: "s5700li",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s2350ei",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "s5300hi",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc300",
         },
         {
            model: "s5300li",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc300",
         },
         {
            model: "s6300ei",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "s2750ei",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00spc500",
         },
         {
            model: "s2350ei",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc300",
         },
         {
            model: "s5300si",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc300",
         },
         {
            model: "s5700li",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "s2750ei",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s6700ei",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00spc500",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc300",
         },
         {
            model: "s5300si",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c00",
         },
         {
            model: "s6300ei",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc300",
         },
         {
            model: "s5700ei",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s5300si",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc300",
         },
         {
            model: "s3300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c00",
         },
         {
            model: "s3300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c05",
         },
         {
            model: "s2750ei",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "s5720hi",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00spc500",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc500",
         },
         {
            model: "s6700ei",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00spc500",
         },
         {
            model: "s3700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c00",
         },
         {
            model: "s5710hi",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc300",
         },
         {
            model: "s3700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c05",
         },
         {
            model: "s5700ei",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00spc500",
         },
         {
            model: "s5300ei",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc300",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s2750ei",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc300",
         },
         {
            model: "s5700hi",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc300",
         },
         {
            model: "s5300hi",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s6700ei",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc300",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc300",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc500",
         },
         {
            model: "s5700si",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc300",
         },
         {
            model: "s5700ei",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc300",
         },
         {
            model: "s2350ei",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00spc500",
         },
         {
            model: "s5700si",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00spc500",
         },
         {
            model: "s5300li",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00spc500",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s5300si",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s3700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c03",
         },
         {
            model: "s5700li",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00spc500",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc300",
         },
         {
            model: "s5700li",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00spc500",
         },
         {
            model: "s5300li",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "s5300hi",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc300",
         },
         {
            model: "s5710hi",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s5300si",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "s2350ei",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc300",
         },
         {
            model: "s12700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2350ei",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2750ei",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s3300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s3700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300ei",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300hi",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300si",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700ei",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700hi",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700si",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5710hi",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5720hi",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300ei",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700ei",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r005c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r006c00spc500",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r007c00spc500",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5720hi v200r006c00spc500",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5720hi v200r007c00spc500",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-33208",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007610",
         },
         {
            db: "NVD",
            id: "CVE-2015-3913",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201706-290",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v100r006c05:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v100r006c03:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v100r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v100r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v100r006c05:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v100r006c03:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s3300_firmware:v100r006c05:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s3300_firmware:v100r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s3300_firmware:v100r006c03:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s3300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s3700_firmware:v100r006c05:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s3700_firmware:v100r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s3700_firmware:v100r006c03:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s3700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300ei_firmware:v100r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300ei_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300ei_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300ei_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300ei_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5300ei:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700ei_firmware:v100r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700ei_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700ei_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700ei_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700ei_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5700ei:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300si_firmware:v100r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300si_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300si_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300si_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300si_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5300si:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700si_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700si_firmware:v100r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700si_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700si_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700si_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5700si:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300hi_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300hi_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300hi_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300hi_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5300hi:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700hi_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700hi_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700hi_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700hi_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5700hi:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300ei_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300ei_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300ei_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300ei_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6300ei:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700ei_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700ei_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700ei_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700ei_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6700ei:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5710hi_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5710hi_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5710hi_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5710hi_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5710hi:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300li_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300li_firmware:v200r007c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300li_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300li_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300li_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300li_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5300li:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700li_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700li_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700li_firmware:v200r007c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700li_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700li_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700li_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5700li:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2350ei_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2350ei_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2350ei_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2350ei_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2350ei_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2350ei_firmware:v200r007c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s2350ei:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2750ei_firmware:v200r007c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2750ei_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2750ei_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2750ei_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2750ei_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2750ei_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s2750ei:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5720hi_firmware:v200r007c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5720hi_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5720hi:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r007c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r007c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2015-3913",
         },
      ],
   },
   cve: "CVE-2015-3913",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 7.8,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2015-3913",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "High",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "CNVD-2017-33208",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "HIGH",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "VHN-81874",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "HIGH",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.9,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.5,
                  baseSeverity: "High",
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2015-3913",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2015-3913",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2017-33208",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201706-290",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULHUB",
                  id: "VHN-81874",
                  trust: 0.1,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-33208",
         },
         {
            db: "VULHUB",
            id: "VHN-81874",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007610",
         },
         {
            db: "NVD",
            id: "CVE-2015-3913",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201706-290",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The IP stack in multiple Huawei Campus series switch models allows remote attackers to cause a denial of service (reboot) via a crafted ICMP request message. HuaweiS2300 is a switch device of Huawei (Huawei). IPstack is one of the transport protocols. IPstack in several Huawei products has a security vulnerability. The vulnerability stems from the failure of the packet processing module to correctly determine the length of the IP option. An attacker can use this vulnerability to create a board reset by using a special ICMP packet. The following versions are affected: Huawei S2300/S2700/S3300/S3700 V100R00600 Version, V100R006C03 Version, V100R006C05 Version; S5300EI/S5700EI/S5300SI/S5700SI V100R006C00 Version, V200R001C00SPC300 Version, V200R002C00SPC300 Version, V200R003C00SPC300 Version, V200R005C00SPC300 Version; S5300HI/S5700HI S6300EI/S6700EI /S5710HI V200R001C00SPC300 Version, V200R002C00SPC300 Version, V200R003C00SPC300 Version, V200R005C00SPC300 Version; S5300LI/S5700LI/S2350EI/S2750EI V200R001C00SPC300 Version, V200R002C00SPC300 Version, V200R003C00SPC300 Version, V200R005C00SPC300 Version, V200R006C00SPC500 Version, V200R007C00SPC500 Version; S5720HI V200R006C00SPC500 Version, V200R007C00SPC500 Version; S7700/S9300/ S9700 V200R001C00SPC300, V200R002C00SPC300, V200R003C00SPC500, V200R005C00SPC300, V200R006C00SPC500, V200R007C00SPC500; S12700",
      sources: [
         {
            db: "NVD",
            id: "CVE-2015-3913",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007610",
         },
         {
            db: "CNVD",
            id: "CNVD-2017-33208",
         },
         {
            db: "VULHUB",
            id: "VHN-81874",
         },
      ],
      trust: 2.25,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2015-3913",
            trust: 3.1,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007610",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201706-290",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2017-33208",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-81874",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-33208",
         },
         {
            db: "VULHUB",
            id: "VHN-81874",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007610",
         },
         {
            db: "NVD",
            id: "CVE-2015-3913",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201706-290",
         },
      ],
   },
   id: "VAR-201706-0237",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-33208",
         },
         {
            db: "VULHUB",
            id: "VHN-81874",
         },
      ],
      trust: 1.48259088,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-33208",
         },
      ],
   },
   last_update_date: "2023-12-18T12:37:21.925000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Huawei-SA-20150506-01-ICMP",
            trust: 0.8,
            url: "http://www.huawei.com/en/psirt/security-advisories/hw-427449",
         },
         {
            title: "Patches for various Huawei product input verification vulnerabilities",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/105678",
         },
         {
            title: "Multiple Huawei Fixes for product input validation vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=74793",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-33208",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007610",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201706-290",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-20",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-81874",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007610",
         },
         {
            db: "NVD",
            id: "CVE-2015-3913",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-427449.htm",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-3913",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-3913",
         },
         {
            trust: 0.6,
            url: "http://www.huawei.com/en/psirt/security-advisories/hw-427449",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-33208",
         },
         {
            db: "VULHUB",
            id: "VHN-81874",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007610",
         },
         {
            db: "NVD",
            id: "CVE-2015-3913",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201706-290",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2017-33208",
         },
         {
            db: "VULHUB",
            id: "VHN-81874",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007610",
         },
         {
            db: "NVD",
            id: "CVE-2015-3913",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201706-290",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-11-08T00:00:00",
            db: "CNVD",
            id: "CNVD-2017-33208",
         },
         {
            date: "2017-06-08T00:00:00",
            db: "VULHUB",
            id: "VHN-81874",
         },
         {
            date: "2017-07-10T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2015-007610",
         },
         {
            date: "2017-06-08T21:29:00.377000",
            db: "NVD",
            id: "CVE-2015-3913",
         },
         {
            date: "2017-06-08T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201706-290",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-11-09T00:00:00",
            db: "CNVD",
            id: "CNVD-2017-33208",
         },
         {
            date: "2017-06-22T00:00:00",
            db: "VULHUB",
            id: "VHN-81874",
         },
         {
            date: "2017-07-10T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2015-007610",
         },
         {
            date: "2017-06-22T19:00:17.147000",
            db: "NVD",
            id: "CVE-2015-3913",
         },
         {
            date: "2017-09-29T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201706-290",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201706-290",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei Campus Series switch model  IP Service operation disruption in the stack  (DoS) Vulnerabilities",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2015-007610",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "input validation",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201706-290",
         },
      ],
      trust: 0.6,
   },
}

var-202101-0288
Vulnerability from variot

There is an out-of-bounds read vulnerability in several products. The software reads data past the end of the intended buffer when parsing certain crafted DHCP messages. Successful exploit could cause certain service abnormal. Affected product versions include:NIP6800 versions V500R001C30,V500R001C60SPC500,V500R005C00;S12700 versions V200R008C00;S2700 versions V200R008C00;S5700 versions V200R008C00;S6700 versions V200R008C00;S7700 versions V200R008C00;S9700 versions V200R008C00;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00;USG9500 versions V500R001C30SPC300,V500R001C30SPC600,V500R001C60SPC500,V500R005C00. plural Huawei The product contains an out-of-bounds read vulnerability.Denial of service (DoS) It may be put into a state

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202101-0288",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "usg9500",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r005c00",
         },
         {
            model: "usg9500",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c30spc300",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "nip6800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c30",
         },
         {
            model: "secospace usg6600",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c30spc600",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "nip6800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c60spc500",
         },
         {
            model: "secospace usg6600",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c30spc200",
         },
         {
            model: "secospace usg6600",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r005c00",
         },
         {
            model: "secospace usg6600",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c60spc500",
         },
         {
            model: "usg9500",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c30spc600",
         },
         {
            model: "nip6800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r005c00",
         },
         {
            model: "usg9500",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c60spc500",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s2700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "nip6800",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "secospace usg6600",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "usg9500",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2020-015376",
         },
         {
            db: "NVD",
            id: "CVE-2020-1866",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-1866",
         },
      ],
   },
   cve: "CVE-2020-1866",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "ADJACENT_NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 3.3,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 6.5,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "LOW",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:A/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Adjacent Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 3.3,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2020-1866",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Low",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:A/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "ADJACENT_NETWORK",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 6.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 2.8,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Adjacent Network",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 6.5,
                  baseSeverity: "Medium",
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2020-1866",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2020-1866",
                  trust: 1.8,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2020-015376",
         },
         {
            db: "NVD",
            id: "CVE-2020-1866",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "There is an out-of-bounds read vulnerability in several products. The software reads data past the end of the intended buffer when parsing certain crafted DHCP messages. Successful exploit could cause certain service abnormal. Affected product versions include:NIP6800 versions V500R001C30,V500R001C60SPC500,V500R005C00;S12700 versions V200R008C00;S2700 versions V200R008C00;S5700 versions V200R008C00;S6700 versions V200R008C00;S7700 versions V200R008C00;S9700 versions V200R008C00;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00;USG9500 versions V500R001C30SPC300,V500R001C30SPC600,V500R001C60SPC500,V500R005C00. plural Huawei The product contains an out-of-bounds read vulnerability.Denial of service (DoS) It may be put into a state",
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-1866",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015376",
         },
      ],
      trust: 1.62,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2020-1866",
            trust: 1.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015376",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2020-015376",
         },
         {
            db: "NVD",
            id: "CVE-2020-1866",
         },
      ],
   },
   id: "VAR-202101-0288",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.4905852885714285,
   },
   last_update_date: "2023-12-18T13:23:01.096000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "huawei-sa-20200122-09-eudemon",
            trust: 0.8,
            url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-09-eudemon-en",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2020-015376",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-125",
            trust: 1,
         },
         {
            problemtype: "Out-of-bounds read (CWE-125) [NVD Evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2020-015376",
         },
         {
            db: "NVD",
            id: "CVE-2020-1866",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1,
            url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-09-eudemon-en",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-1866",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2020-015376",
         },
         {
            db: "NVD",
            id: "CVE-2020-1866",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "JVNDB",
            id: "JVNDB-2020-015376",
         },
         {
            db: "NVD",
            id: "CVE-2020-1866",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-09-17T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2020-015376",
         },
         {
            date: "2021-01-13T23:15:13.367000",
            db: "NVD",
            id: "CVE-2020-1866",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-09-17T07:58:00",
            db: "JVNDB",
            id: "JVNDB-2020-015376",
         },
         {
            date: "2021-01-19T17:12:35.327000",
            db: "NVD",
            id: "CVE-2020-1866",
         },
      ],
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei  Out-of-bounds read vulnerabilities in the product",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2020-015376",
         },
      ],
      trust: 0.8,
   },
}

var-201604-0328
Vulnerability from variot

Memory leak in Huawei S5300EI, S5300SI, S5310HI, and S6300EI Campus series switches with software V200R003C00 before V200R003SPH011 and V200R005C00 before V200R005SPH008; S2350EI and S5300LI Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH008, and V200R006C00 before V200R006SPH002; S9300, S7700, and S9700 Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH009, and V200R006C00 before V200R006SPH003; S5720HI and S5720EI Campus series switches with software V200R006C00 before V200R006SPH002; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote authenticated users to cause a denial of service (memory consumption and device restart) by logging in and out of the (1) HTTPS or (2) SFTP server, related to SSL session information. HuaweiS5300EI is a Huawei S series switch product. A number of Huawei products have a memory leak vulnerability in the HTTPS or SFTP server, allowing remote attackers to consume memory and log in and out of the HTTPS or SFTP server for denial of service attacks. Multiple Huawei Switches are prone to a remote denial-of-service vulnerability. Attackers can exploit this issue to cause a memory exhaustion, denying service to legitimate users. The Huawei S5300EI and others are all S-series switch products of China's Huawei (Huawei). Memory leak vulnerabilities exist in several Huawei products. The following products and versions are affected: using V200R003C00 version and V200R005C00 version software Huawei S5300EI , S5300SI , S5310HI , S6300EI ,use V200R003C00 Version, V200R005C00 version and V200R006C00 version software Huawei S2350EI , S5300LI , S9300 , S7700 , S9700 ,use V200R006C00 version software Huawei S5720HI, S5720EI, Huawei S2300, S3300 using V100R006C05 software

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201604-0328",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "s7700",
            scope: "gte",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s5300li",
            scope: "gte",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s2350ei",
            scope: "gte",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s5300li",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "v200r003sph011",
         },
         {
            model: "s7700",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "v200r005sph009",
         },
         {
            model: "s5300li",
            scope: "gte",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s5720ei",
            scope: "gte",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s2350ei",
            scope: "gte",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s2350ei",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "v200r006sph002",
         },
         {
            model: "s9700",
            scope: "gte",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s9700",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "v200r006sph003",
         },
         {
            model: "s5310hi",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "v200r001sph018",
         },
         {
            model: "s7700",
            scope: "gte",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s5300si",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "v200r003sph011",
         },
         {
            model: "s9300",
            scope: "gte",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s5720ei",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "v200r006sph002",
         },
         {
            model: "s3300",
            scope: "gte",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c05",
         },
         {
            model: "s9700",
            scope: "gte",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s5300li",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "v200r005sph008",
         },
         {
            model: "s9700",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "v200r003sph011",
         },
         {
            model: "s2350ei",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "v200r003sph011",
         },
         {
            model: "s5300ei",
            scope: "gte",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s6300ei",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "v200r003sph011",
         },
         {
            model: "s6300ei",
            scope: "gte",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s9700",
            scope: "gte",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s7700",
            scope: "gte",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s2300",
            scope: "gte",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c05",
         },
         {
            model: "s5720hi",
            scope: "gte",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s5300si",
            scope: "gte",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s5310hi",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "v200r003sph011",
         },
         {
            model: "s5310hi",
            scope: "gte",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s9300",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "v200r006sph003",
         },
         {
            model: "s5300ei",
            scope: "gte",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s5300ei",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "v200r003sph011",
         },
         {
            model: "s9700",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "v200r005sph009",
         },
         {
            model: "s5300si",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "v200r001sph018",
         },
         {
            model: "s5300li",
            scope: "gte",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s7700",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "v200r006sph003",
         },
         {
            model: "s6300ei",
            scope: "gte",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s2350ei",
            scope: "gte",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s3300",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "v100r006sph022",
         },
         {
            model: "s9300",
            scope: "gte",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s5310hi",
            scope: "gte",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s5300si",
            scope: "gte",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s2350ei",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "v200r005sph008",
         },
         {
            model: "s9300",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "v200r003sph011",
         },
         {
            model: "s6300ei",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "v200r001sph018",
         },
         {
            model: "s5300li",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "v200r006sph002",
         },
         {
            model: "s2300",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "v100r006sph022",
         },
         {
            model: "s7700",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "v200r003sph011",
         },
         {
            model: "s5720hi",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "v200r006sph002",
         },
         {
            model: "s9300",
            scope: "gte",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s5300ei",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "v200r005sph008",
         },
         {
            model: "s9300",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "v200r005sph009",
         },
         {
            model: "s9700",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s2350ei",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s2350ei",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r005sph009",
         },
         {
            model: "s5310hi",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r003sph011",
         },
         {
            model: "s2300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s5300si",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r003sph011",
         },
         {
            model: "s5300si",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s5300si",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r005sph008",
         },
         {
            model: "s5310hi",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s5300li",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5310hi",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r005sph008",
         },
         {
            model: "s5300li",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r006sph002",
         },
         {
            model: "s2350ei",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r003sph011",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r003sph011",
         },
         {
            model: "s9700",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s6300ei",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s6300ei",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2350ei",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s2350ei",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r005sph008",
         },
         {
            model: "s5300li",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r006sph003",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r003sph011",
         },
         {
            model: "s5300ei",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r005sph009",
         },
         {
            model: "s5720hi",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r006sph002",
         },
         {
            model: "s7700",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s5720ei",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r006sph002",
         },
         {
            model: "s3300",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v100r006sph022",
         },
         {
            model: "s5300li",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s5300ei",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s3300",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v100r006c05",
         },
         {
            model: "s6300ei",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s7700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5720ei",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2350ei",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r006sph002",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r005sph009",
         },
         {
            model: "s6300ei",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r003sph011",
         },
         {
            model: "s3300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5720ei",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s9300",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s5310hi",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r006sph003",
         },
         {
            model: "s5720hi",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s6300ei",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r005sph008",
         },
         {
            model: "s7700",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v100r006sph022",
         },
         {
            model: "s9300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300ei",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r003sph011",
         },
         {
            model: "s5300li",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s5300ei",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s5300ei",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r005sph008",
         },
         {
            model: "s2300",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v100r006c05",
         },
         {
            model: "s9700",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r006sph003",
         },
         {
            model: "s2350ei",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s7700",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s5300li",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r003sph011",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r003sph011",
         },
         {
            model: "s5300li",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r005sph008",
         },
         {
            model: "s9300",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s9700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5720hi",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300si",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s5310hi",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s5300si",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300ei v200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300ei v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300si v200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300si v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5310hi 200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5310hi 200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300ei 200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300ei 200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2350ei 200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2350ei 200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2350ei 200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300li 200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300li 200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300li 200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5720hi 200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5720ei 200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 100r006c05",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s3300 100r006c05",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2350ei",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5720ei",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300li",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5720hi",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s3300",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300ei",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-02289",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007108",
         },
         {
            db: "NVD",
            id: "CVE-2015-8677",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201604-314",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300ei_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "v200r003sph011",
                              versionStartIncluding: "v200r003c00",
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300ei_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "v200r005sph008",
                              versionStartIncluding: "v200r005c00",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5300ei:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300si_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "v200r003sph011",
                              versionStartIncluding: "v200r002c00",
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300si_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "v200r001sph018",
                              versionStartIncluding: "v200r001c00",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5300si:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5310hi_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "v200r001sph018",
                              versionStartIncluding: "v200r001c00",
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5310hi_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "v200r003sph011",
                              versionStartIncluding: "v200r002c00",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5310hi:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300ei_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "v200r001sph018",
                              versionStartIncluding: "v200r001c00",
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300ei_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "v200r003sph011",
                              versionStartIncluding: "v200r002c00",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6300ei:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300li_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "v200r003sph011",
                              versionStartIncluding: "v200r003c00",
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300li_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "v200r005sph008",
                              versionStartIncluding: "v200r005c00",
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300li_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "v200r006sph002",
                              versionStartIncluding: "v200r006c00",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5300li:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2350ei_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "v200r006sph002",
                              versionStartIncluding: "v200r006c00",
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2350ei_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "v200r005sph008",
                              versionStartIncluding: "v200r005c00",
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2350ei_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "v200r003sph011",
                              versionStartIncluding: "v200r003c00",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s2350ei:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "v200r005sph009",
                              versionStartIncluding: "v200r005c00",
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "v200r003sph011",
                              versionStartIncluding: "v200r003c00",
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "v200r006sph003",
                              versionStartIncluding: "v200r006c00",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "v200r005sph009",
                              versionStartIncluding: "v200r005c00",
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "v200r003sph011",
                              versionStartIncluding: "v200r003c00",
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "v200r006sph003",
                              versionStartIncluding: "v200r006c00",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "v200r003sph011",
                              versionStartIncluding: "v200r003c00",
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "v200r005sph009",
                              versionStartIncluding: "v200r005c00",
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "v200r006sph003",
                              versionStartIncluding: "v200r006c00",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5720hi_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "v200r006sph002",
                              versionStartIncluding: "v200r006c00",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5720hi:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5720ei_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "v200r006sph002",
                              versionStartIncluding: "v200r006c00",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5720ei:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "v100r006sph022",
                              versionStartIncluding: "v100r006c05",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s3300_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "v100r006sph022",
                              versionStartIncluding: "v100r006c05",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s3300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2015-8677",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The vendor reported the issue.",
      sources: [
         {
            db: "BID",
            id: "90912",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2015-8677",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 6.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 8,
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  vectorString: "AV:N/AC:L/Au:S/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "Single",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 6.8,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2015-8677",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.9,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:S/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "CNVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 4,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 8,
                  id: "CNVD-2016-02289",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:S/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "VULHUB",
                  availabilityImpact: "COMPLETE",
                  baseScore: 6.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 8,
                  id: "VHN-86638",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:S/C:N/I:N/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 6.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 2.8,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 6.5,
                  baseSeverity: "Medium",
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2015-8677",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "Low",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2015-8677",
                  trust: 1.8,
                  value: "MEDIUM",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2016-02289",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201604-314",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-86638",
                  trust: 0.1,
                  value: "MEDIUM",
               },
               {
                  author: "VULMON",
                  id: "CVE-2015-8677",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-02289",
         },
         {
            db: "VULHUB",
            id: "VHN-86638",
         },
         {
            db: "VULMON",
            id: "CVE-2015-8677",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007108",
         },
         {
            db: "NVD",
            id: "CVE-2015-8677",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201604-314",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Memory leak in Huawei S5300EI, S5300SI, S5310HI, and S6300EI Campus series switches with software V200R003C00 before V200R003SPH011 and V200R005C00 before V200R005SPH008; S2350EI and S5300LI Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH008, and V200R006C00 before V200R006SPH002; S9300, S7700, and S9700 Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH009, and V200R006C00 before V200R006SPH003; S5720HI and S5720EI Campus series switches with software V200R006C00 before V200R006SPH002; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote authenticated users to cause a denial of service (memory consumption and device restart) by logging in and out of the (1) HTTPS or (2) SFTP server, related to SSL session information. HuaweiS5300EI is a Huawei S series switch product. A number of Huawei products have a memory leak vulnerability in the HTTPS or SFTP server, allowing remote attackers to consume memory and log in and out of the HTTPS or SFTP server for denial of service attacks. Multiple Huawei Switches are prone to a remote denial-of-service vulnerability. \nAttackers can exploit this issue to cause a memory exhaustion, denying service to legitimate users. The Huawei S5300EI and others are all S-series switch products of China's Huawei (Huawei). Memory leak vulnerabilities exist in several Huawei products. The following products and versions are affected: using V200R003C00 version and V200R005C00 version software Huawei S5300EI , S5300SI , S5310HI , S6300EI ,use V200R003C00 Version, V200R005C00 version and V200R006C00 version software Huawei S2350EI , S5300LI , S9300 , S7700 , S9700 ,use V200R006C00 version software Huawei S5720HI, S5720EI, Huawei S2300, S3300 using V100R006C05 software",
      sources: [
         {
            db: "NVD",
            id: "CVE-2015-8677",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007108",
         },
         {
            db: "CNVD",
            id: "CNVD-2016-02289",
         },
         {
            db: "BID",
            id: "90912",
         },
         {
            db: "VULHUB",
            id: "VHN-86638",
         },
         {
            db: "VULMON",
            id: "CVE-2015-8677",
         },
      ],
      trust: 2.61,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2015-8677",
            trust: 3.5,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007108",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201604-314",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2016-02289",
            trust: 0.6,
         },
         {
            db: "BID",
            id: "90912",
            trust: 0.4,
         },
         {
            db: "VULHUB",
            id: "VHN-86638",
            trust: 0.1,
         },
         {
            db: "VULMON",
            id: "CVE-2015-8677",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-02289",
         },
         {
            db: "VULHUB",
            id: "VHN-86638",
         },
         {
            db: "VULMON",
            id: "CVE-2015-8677",
         },
         {
            db: "BID",
            id: "90912",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007108",
         },
         {
            db: "NVD",
            id: "CVE-2015-8677",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201604-314",
         },
      ],
   },
   id: "VAR-201604-0328",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-02289",
         },
         {
            db: "VULHUB",
            id: "VHN-86638",
         },
      ],
      trust: 1.6153170325,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-02289",
         },
      ],
   },
   last_update_date: "2023-12-18T12:44:55.504000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Huawei-SA-20160113-03-Switch",
            trust: 0.8,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-03-switch-en",
         },
         {
            title: "Patches for various Huawei product switch memory leak vulnerabilities",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/74355",
         },
         {
            title: "Multiple Huawei Product memory leak vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=60969",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-02289",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007108",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201604-314",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-399",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-86638",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007108",
         },
         {
            db: "NVD",
            id: "CVE-2015-8677",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.4,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-03-switch-en",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8677",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-8677",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/399.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://www.securityfocus.com/bid/90912",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-02289",
         },
         {
            db: "VULHUB",
            id: "VHN-86638",
         },
         {
            db: "VULMON",
            id: "CVE-2015-8677",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007108",
         },
         {
            db: "NVD",
            id: "CVE-2015-8677",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201604-314",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2016-02289",
         },
         {
            db: "VULHUB",
            id: "VHN-86638",
         },
         {
            db: "VULMON",
            id: "CVE-2015-8677",
         },
         {
            db: "BID",
            id: "90912",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007108",
         },
         {
            db: "NVD",
            id: "CVE-2015-8677",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201604-314",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2016-04-19T00:00:00",
            db: "CNVD",
            id: "CNVD-2016-02289",
         },
         {
            date: "2016-04-14T00:00:00",
            db: "VULHUB",
            id: "VHN-86638",
         },
         {
            date: "2016-04-14T00:00:00",
            db: "VULMON",
            id: "CVE-2015-8677",
         },
         {
            date: "2016-01-13T00:00:00",
            db: "BID",
            id: "90912",
         },
         {
            date: "2016-05-02T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2015-007108",
         },
         {
            date: "2016-04-14T15:59:03.857000",
            db: "NVD",
            id: "CVE-2015-8677",
         },
         {
            date: "2016-04-15T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201604-314",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2016-04-19T00:00:00",
            db: "CNVD",
            id: "CNVD-2016-02289",
         },
         {
            date: "2019-06-20T00:00:00",
            db: "VULHUB",
            id: "VHN-86638",
         },
         {
            date: "2019-06-20T00:00:00",
            db: "VULMON",
            id: "CVE-2015-8677",
         },
         {
            date: "2016-07-06T14:51:00",
            db: "BID",
            id: "90912",
         },
         {
            date: "2016-05-02T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2015-007108",
         },
         {
            date: "2019-06-20T14:26:28.073000",
            db: "NVD",
            id: "CVE-2015-8677",
         },
         {
            date: "2016-04-15T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201604-314",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201604-314",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei Service disruption in products  (DoS) Vulnerabilities",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2015-007108",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "resource management error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201604-314",
         },
      ],
      trust: 0.6,
   },
}

var-201803-1081
Vulnerability from variot

Huawei S12700 V200R005C00, V200R006C00, V200R007C00, V200R008C00, S5700 V200R006C00, V200R007C00, V200R008C00, S6700 V200R008C00, S7700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, S9700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00 have a denial of service (DoS) vulnerability. Due to the lack of input validation, a remote attacker may craft a malformed Resource Reservation Protocol (RSVP) packet and send it to the device, causing a few buffer overflows and occasional device restart. plural Huawei The product contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Huawei S12700 is an intelligent routing switch of China Huawei. A number of Huawei products have a denial of service vulnerability, which stems from the lack of input detection in the program. Multiple Huawei products are prone to a remote denial-of-service vulnerability. Attackers can exploit this issue to restart the affected device, denying service to legitimate users. Huawei S12700, S5700, S6700, S7700, and S9700 are vulnerable. The following products and versions are affected: Huawei S12700 V200R005C00 Version, V200R006C00 Version, V200R007C00 Version, V200R008C00 Version; S5700 V200R006C00 Version, V200R007C00 Version, V200R008C00 Version; S6700 V200R008C00 Version; S7700 V200R001C00 Version, V200R002C00 Version, V200R003C00 Version, V200R005C00 Version, V200R006C00 Version , V200R007C00, V200R008C00; S9700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201803-1081",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "s7700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s7700 v200r003c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r005c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r003c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r005c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r005c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r001c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r002c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r006c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r008c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r001c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r002c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r006c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r008c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r006c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r008c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r008c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r006c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r008c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r007c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r007c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r007c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r007c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r009c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r009c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r008c00spc500+v2",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r009c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r008c00spc500+v2",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r009c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-00050",
         },
         {
            db: "BID",
            id: "95139",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008970",
         },
         {
            db: "NVD",
            id: "CVE-2016-8786",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201612-758",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2016-8786",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Huawei internal tester",
      sources: [
         {
            db: "BID",
            id: "95139",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2016-8786",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 7.8,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2016-8786",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "High",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "CNVD-2017-00050",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "VHN-97606",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "HIGH",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.9,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.5,
                  baseSeverity: "High",
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2016-8786",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2016-8786",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2017-00050",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201612-758",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULHUB",
                  id: "VHN-97606",
                  trust: 0.1,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-00050",
         },
         {
            db: "VULHUB",
            id: "VHN-97606",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008970",
         },
         {
            db: "NVD",
            id: "CVE-2016-8786",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201612-758",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Huawei S12700 V200R005C00, V200R006C00, V200R007C00, V200R008C00, S5700 V200R006C00, V200R007C00, V200R008C00, S6700 V200R008C00, S7700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, S9700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00 have a denial of service (DoS) vulnerability. Due to the lack of input validation, a remote attacker may craft a malformed Resource Reservation Protocol (RSVP) packet and send it to the device, causing a few buffer overflows and occasional device restart. plural Huawei The product contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Huawei S12700 is an intelligent routing switch of China Huawei. A number of Huawei products have a denial of service vulnerability, which stems from the lack of input detection in the program. Multiple Huawei products are prone to a remote denial-of-service vulnerability. \nAttackers can exploit this issue to restart the affected device, denying service to legitimate users. \nHuawei S12700, S5700, S6700, S7700, and S9700 are vulnerable. The following products and versions are affected: Huawei S12700 V200R005C00 Version, V200R006C00 Version, V200R007C00 Version, V200R008C00 Version; S5700 V200R006C00 Version, V200R007C00 Version, V200R008C00 Version; S6700 V200R008C00 Version; S7700 V200R001C00 Version, V200R002C00 Version, V200R003C00 Version, V200R005C00 Version, V200R006C00 Version , V200R007C00, V200R008C00; S9700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00",
      sources: [
         {
            db: "NVD",
            id: "CVE-2016-8786",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008970",
         },
         {
            db: "CNVD",
            id: "CNVD-2017-00050",
         },
         {
            db: "BID",
            id: "95139",
         },
         {
            db: "VULHUB",
            id: "VHN-97606",
         },
      ],
      trust: 2.52,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2016-8786",
            trust: 3.4,
         },
         {
            db: "BID",
            id: "95139",
            trust: 2.6,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008970",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201612-758",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2017-00050",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-97606",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-00050",
         },
         {
            db: "VULHUB",
            id: "VHN-97606",
         },
         {
            db: "BID",
            id: "95139",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008970",
         },
         {
            db: "NVD",
            id: "CVE-2016-8786",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201612-758",
         },
      ],
   },
   id: "VAR-201803-1081",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-00050",
         },
         {
            db: "VULHUB",
            id: "VHN-97606",
         },
      ],
      trust: 1.4414819277777777,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-00050",
         },
      ],
   },
   last_update_date: "2023-12-18T13:33:57.822000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "huawei-sa-20161228-01-rsvp",
            trust: 0.8,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161228-01-rsvp-en",
         },
         {
            title: "Patches for various Huawei product denial of service vulnerabilities",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/87258",
         },
         {
            title: "Various Huawei product security vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=66715",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-00050",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008970",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201612-758",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-20",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-97606",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008970",
         },
         {
            db: "NVD",
            id: "CVE-2016-8786",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.3,
            url: "http://www.securityfocus.com/bid/95139",
         },
         {
            trust: 1.7,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161228-01-rsvp-en",
         },
         {
            trust: 0.8,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-8786",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-8786",
         },
         {
            trust: 0.3,
            url: "http://www.huawei.com/en/",
         },
         {
            trust: 0.3,
            url: "http://www.huawei.com/en/psirt/security-advisories/2016/huawei-sa-20161228-01-rsvp-en",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-00050",
         },
         {
            db: "VULHUB",
            id: "VHN-97606",
         },
         {
            db: "BID",
            id: "95139",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008970",
         },
         {
            db: "NVD",
            id: "CVE-2016-8786",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201612-758",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2017-00050",
         },
         {
            db: "VULHUB",
            id: "VHN-97606",
         },
         {
            db: "BID",
            id: "95139",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008970",
         },
         {
            db: "NVD",
            id: "CVE-2016-8786",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201612-758",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-01-03T00:00:00",
            db: "CNVD",
            id: "CNVD-2017-00050",
         },
         {
            date: "2018-03-09T00:00:00",
            db: "VULHUB",
            id: "VHN-97606",
         },
         {
            date: "2016-12-28T00:00:00",
            db: "BID",
            id: "95139",
         },
         {
            date: "2018-04-18T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2016-008970",
         },
         {
            date: "2018-03-09T21:29:00.440000",
            db: "NVD",
            id: "CVE-2016-8786",
         },
         {
            date: "2016-12-29T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201612-758",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-01-03T00:00:00",
            db: "CNVD",
            id: "CNVD-2017-00050",
         },
         {
            date: "2018-03-26T00:00:00",
            db: "VULHUB",
            id: "VHN-97606",
         },
         {
            date: "2017-01-12T06:07:00",
            db: "BID",
            id: "95139",
         },
         {
            date: "2018-04-18T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2016-008970",
         },
         {
            date: "2018-03-26T15:23:08.983000",
            db: "NVD",
            id: "CVE-2016-8786",
         },
         {
            date: "2018-03-12T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201612-758",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201612-758",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei Vulnerability related to input validation in products",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2016-008970",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "input validation",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201612-758",
         },
      ],
      trust: 0.6,
   },
}

var-201609-0096
Vulnerability from variot

Memory leak in Huawei S9300, S5300, S5700, S6700, S7700, S9700, and S12700 devices allows remote attackers to cause a denial of service (memory consumption and restart) via a large number of malformed packets. The Huawei S7700, S9300, S9700, and S12700 are Huawei's intelligent routing switches. A remote denial of service vulnerability exists in several HuaweiSwitches. The following products and versions are affected: Huawei S9300 V200R001C00 , V200R003C00 , V200R005C00 , V200R006C00 , V200R008C00 , S5300 V200R001C00 , V200R002C00 , V200R003C00 , V200R005C00 , V200R005C01 , V200R005C02 , V200R006C00 , V200R007C00 , V200R008C00 , S5700 V200R001C00 , V200R001C01 , V200R002C00 , V200R003C00 , V200R003C02 , V200R005C00 , V200R006C00 , V200R008C00 , S6300 V200R001C00 , V200R002C00 , V200R003C00 , V200R005C00 , V200R005C01 , V200R005C02 , V200R008C00 , S6700 V200R001C00 , V200R001C01 , V200R002C00 , V200R003C00 , V200R008C00 , S7700 V200R001C00 , V200R002C00 , V200R003C00 , V200R005C00 , V200R006C00 , V200R008C00 , S9700 V200R001C00 , V200R001C01 , V200R002C00 , V200R003C00, V200R005C00, V200R006C00, V200R008C00, S12700 V200R005C00, V200R006C00, V200R008C00

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201609-0096",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "s9300",
            scope: "eq",
            trust: 2.4,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 2.4,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 2.4,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 2.4,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 2.4,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 2.4,
            vendor: "huawei",
            version: "v200r001c01",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 2.4,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 2.4,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 2.4,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 2.4,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r005c01",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r005c02",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001c01",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r003c02",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r005c01",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r005c02",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001c01",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s5700 v200r001c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r003c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r005c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r003c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r005c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r003c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r005c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r005c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r001c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r002c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r006c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r001c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r001c01",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r002c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r006c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r008c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r006c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r008c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r001c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r001c01",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r002c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r003c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r008c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r001c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r002c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r003c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r005c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r005c01",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r005c02",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r008c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r001c01",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r002c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r003c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r003c02",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r005c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r006c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r008c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r003c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r005c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r005c01",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r005c02",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r006c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r008c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r001c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r006c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r008c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r008sph005",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r008c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r003sph019",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r008sph005",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r008c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r003sph019",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r008sph005",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r008c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r003sph019",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r008sph005",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r005sph012",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r005c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r008sph005",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r005sph012",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r005c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r008sph005",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r008c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300li v200r003sph011",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r008sph005",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r008c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r003sph019",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r008sph005",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r008c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "v200r008sph005",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: "7700",
         },
         {
            model: "v200r003sph019",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: "7700",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-08070",
         },
         {
            db: "BID",
            id: "92968",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-005041",
         },
         {
            db: "NVD",
            id: "CVE-2016-6518",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201609-365",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r005c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r005c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r005c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r005c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r003c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r001c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r001c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r001c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2016-6518",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The vendor reported the issue.",
      sources: [
         {
            db: "BID",
            id: "92968",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2016-6518",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 5,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2016-6518",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "HIGH",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 2.6,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 4.9,
                  id: "CNVD-2016-08070",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "LOW",
                  trust: 0.6,
                  vectorString: "AV:N/AC:H/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "VHN-95338",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.9,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.5,
                  baseSeverity: "High",
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2016-6518",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2016-6518",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2016-08070",
                  trust: 0.6,
                  value: "LOW",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201609-365",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-95338",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-08070",
         },
         {
            db: "VULHUB",
            id: "VHN-95338",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-005041",
         },
         {
            db: "NVD",
            id: "CVE-2016-6518",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201609-365",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Memory leak in Huawei S9300, S5300, S5700, S6700, S7700, S9700, and S12700 devices allows remote attackers to cause a denial of service (memory consumption and restart) via a large number of malformed packets. The Huawei S7700, S9300, S9700, and S12700 are Huawei's intelligent routing switches. A remote denial of service vulnerability exists in several HuaweiSwitches. The following products and versions are affected: Huawei S9300 V200R001C00 , V200R003C00 , V200R005C00 , V200R006C00 , V200R008C00 , S5300 V200R001C00 , V200R002C00 , V200R003C00 , V200R005C00 , V200R005C01 , V200R005C02 , V200R006C00 , V200R007C00 , V200R008C00 , S5700 V200R001C00 , V200R001C01 , V200R002C00 , V200R003C00 , V200R003C02 , V200R005C00 , V200R006C00 , V200R008C00 , S6300 V200R001C00 , V200R002C00 , V200R003C00 , V200R005C00 , V200R005C01 , V200R005C02 , V200R008C00 , S6700 V200R001C00 , V200R001C01 , V200R002C00 , V200R003C00 , V200R008C00 , S7700 V200R001C00 , V200R002C00 , V200R003C00 , V200R005C00 , V200R006C00 , V200R008C00 , S9700 V200R001C00 , V200R001C01 , V200R002C00 , V200R003C00, V200R005C00, V200R006C00, V200R008C00, S12700 V200R005C00, V200R006C00, V200R008C00",
      sources: [
         {
            db: "NVD",
            id: "CVE-2016-6518",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-005041",
         },
         {
            db: "CNVD",
            id: "CNVD-2016-08070",
         },
         {
            db: "BID",
            id: "92968",
         },
         {
            db: "VULHUB",
            id: "VHN-95338",
         },
      ],
      trust: 2.52,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2016-6518",
            trust: 3.4,
         },
         {
            db: "BID",
            id: "92968",
            trust: 2.6,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-005041",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201609-365",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2016-08070",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-95338",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-08070",
         },
         {
            db: "VULHUB",
            id: "VHN-95338",
         },
         {
            db: "BID",
            id: "92968",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-005041",
         },
         {
            db: "NVD",
            id: "CVE-2016-6518",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201609-365",
         },
      ],
   },
   id: "VAR-201609-0096",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-08070",
         },
         {
            db: "VULHUB",
            id: "VHN-95338",
         },
      ],
      trust: 1.5096517435897436,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-08070",
         },
      ],
   },
   last_update_date: "2023-12-18T13:39:10.113000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "huawei-sa-20160914-01-sep",
            trust: 0.8,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160914-01-sep-en",
         },
         {
            title: "Patches for several HuaweiSwitches Remote Denial of Service Vulnerabilities",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/81677",
         },
         {
            title: "Multiple Huawei Repair measures for product remote denial of service vulnerability",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=64163",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-08070",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-005041",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201609-365",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-399",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-95338",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-005041",
         },
         {
            db: "NVD",
            id: "CVE-2016-6518",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.6,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160914-01-sep-en",
         },
         {
            trust: 2.3,
            url: "http://www.securityfocus.com/bid/92968",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-6518",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-6518",
         },
         {
            trust: 0.3,
            url: "http://www.huawei.com",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-08070",
         },
         {
            db: "VULHUB",
            id: "VHN-95338",
         },
         {
            db: "BID",
            id: "92968",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-005041",
         },
         {
            db: "NVD",
            id: "CVE-2016-6518",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201609-365",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2016-08070",
         },
         {
            db: "VULHUB",
            id: "VHN-95338",
         },
         {
            db: "BID",
            id: "92968",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-005041",
         },
         {
            db: "NVD",
            id: "CVE-2016-6518",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201609-365",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2016-09-26T00:00:00",
            db: "CNVD",
            id: "CNVD-2016-08070",
         },
         {
            date: "2016-09-26T00:00:00",
            db: "VULHUB",
            id: "VHN-95338",
         },
         {
            date: "2016-09-14T00:00:00",
            db: "BID",
            id: "92968",
         },
         {
            date: "2016-10-04T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2016-005041",
         },
         {
            date: "2016-09-26T15:59:01.780000",
            db: "NVD",
            id: "CVE-2016-6518",
         },
         {
            date: "2016-09-19T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201609-365",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2016-09-26T00:00:00",
            db: "CNVD",
            id: "CNVD-2016-08070",
         },
         {
            date: "2016-09-28T00:00:00",
            db: "VULHUB",
            id: "VHN-95338",
         },
         {
            date: "2016-09-14T00:00:00",
            db: "BID",
            id: "92968",
         },
         {
            date: "2016-10-04T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2016-005041",
         },
         {
            date: "2016-09-28T13:48:45.757000",
            db: "NVD",
            id: "CVE-2016-6518",
         },
         {
            date: "2016-09-27T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201609-365",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201609-365",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei Service disruption on devices  (DoS) Vulnerabilities",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2016-005041",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "resource management error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201609-365",
         },
      ],
      trust: 0.6,
   },
}

var-201704-0463
Vulnerability from variot

Huawei AC6605 with software V200R001C00; AC6605 with software V200R002C00; ACU with software V200R001C00; ACU with software V200R002C00; S2300, S3300, S2700, S3700 with software V100R006C05 and earlier versions; S5300, S5700, S6300, S6700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions; S7700, S9300, S9300E, S9700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions could allow remote attackers to send a special SSH packet to the VRP device to cause a denial of service. plural Huawei Product software includes VRP Special to device SSH Packets are sent and service operation is interrupted (DoS) There are vulnerabilities that are put into a state.By a remote attacker, VRP Special to device SSH Packets are sent and service operation is interrupted (DoS) There is a possibility of being put into a state. HuaweiAC6605 is a wireless access controller product from China's Huawei company. A security vulnerability exists in the SSH module of several Huawei products. The vulnerability is caused by the lack of valid verification of a domain in the message content when the program processes the message. This vulnerability could be exploited by an attacker to cause a device service interruption using the VRP platform. The following products and versions are affected: Huawei AC6605 V200R001C00 Version, AC6605 V200R002C00 Version, ACU V200R001C00 Version, V200R002C00 Version, S2300/ S3300/S2700/ S3700 V100R006C05 and previous versions, S5300/ S5700/S6300/ S6700 V100R006 Version, V200R001 Version, V200R002 Version, V200R003, V200R005C00SPC300 and earlier versions, S7700/S9300/S9300E/S9700 V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201704-0463",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r002",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r002",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "s9700",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc300",
         },
         {
            model: "s5700",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc300",
         },
         {
            model: "s9300e",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc300",
         },
         {
            model: "s9300e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "s9300e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002",
         },
         {
            model: "s7700",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc300",
         },
         {
            model: "s5300",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc300",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "ac6605",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "ac6605_v200r001c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "s9300",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc300",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "s6300",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc300",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003",
         },
         {
            model: "s6700",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc300",
         },
         {
            model: "acu",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "acu_v200r002c00",
         },
         {
            model: "s9300e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003",
         },
         {
            model: "acu",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "acu_v200r001c00",
         },
         {
            model: "s series",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c05",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "ac6605",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "ac6605_v200r002c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "s9300e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002",
         },
         {
            model: "ac6605",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "acu",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300e",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ac6605 v200r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ac6605 v200r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "acu v200r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "acu v200r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 <=v100r006c05",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s3300 <=v100r006c05",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 <=v100r006c05",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s3700 <=v100r006c05",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v100r006",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r001",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r002",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r003",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 <=v200r005c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v100r006",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r001",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r002",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r003",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 <=v200r005c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v100r006",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r001",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r002",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r003",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 <=v200r005c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v100r006",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r001",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r002",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r003",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 <=v200r005c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v100r006",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r001",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r002",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r003",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 <=v200r005c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v100r006",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r001",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r002",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r003",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 <=v200r005c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300e v100r006",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300e v200r001",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300e v200r002",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300e v200r003",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300e <=v200r005c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v100r006",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r001",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r002",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r003",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 <=v200r005c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "v200r005c00spc300",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "v200r005c00spc300",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-03649",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008290",
         },
         {
            db: "NVD",
            id: "CVE-2014-8572",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201605-577",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ac6605_firmware:ac6605_v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ac6605_firmware:ac6605_v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ac6605:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:acu_firmware:acu_v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:acu_firmware:acu_v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:acu:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s_series_firmware:v100r006c05:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s3300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s3700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r002:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "v200r005c00spc300",
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v100r006:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r002:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "v200r005c00spc300",
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v100r006:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r002:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "v200r005c00spc300",
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v100r006:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v100r006:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r002:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "v200r005c00spc300",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v100r006:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r002:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "v200r005c00spc300",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v100r006:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r002:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "v200r005c00spc300",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v100r006:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r002:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "v200r005c00spc300",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300e_firmware:v100r006:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300e_firmware:v200r001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300e_firmware:v200r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300e_firmware:v200r002:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "v200r005c00spc300",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9300e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2014-8572",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Huawei",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201605-577",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2014-8572",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 7.8,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2014-8572",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "High",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "CNVD-2016-03649",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "HIGH",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "VHN-76517",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "HIGH",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.9,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.5,
                  baseSeverity: "High",
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2014-8572",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2014-8572",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2016-03649",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201605-577",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULHUB",
                  id: "VHN-76517",
                  trust: 0.1,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-03649",
         },
         {
            db: "VULHUB",
            id: "VHN-76517",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008290",
         },
         {
            db: "NVD",
            id: "CVE-2014-8572",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201605-577",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Huawei AC6605 with software V200R001C00; AC6605 with software V200R002C00; ACU with software V200R001C00; ACU with software V200R002C00; S2300, S3300, S2700, S3700 with software V100R006C05 and earlier versions; S5300, S5700, S6300, S6700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions; S7700, S9300, S9300E, S9700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions could allow remote attackers to send a special SSH packet to the VRP device to cause a denial of service. plural Huawei Product software includes VRP Special to device SSH Packets are sent and service operation is interrupted (DoS) There are vulnerabilities that are put into a state.By a remote attacker, VRP Special to device SSH Packets are sent and service operation is interrupted (DoS) There is a possibility of being put into a state. HuaweiAC6605 is a wireless access controller product from China's Huawei company. A security vulnerability exists in the SSH module of several Huawei products. The vulnerability is caused by the lack of valid verification of a domain in the message content when the program processes the message. This vulnerability could be exploited by an attacker to cause a device service interruption using the VRP platform. The following products and versions are affected: Huawei AC6605 V200R001C00 Version, AC6605 V200R002C00 Version, ACU V200R001C00 Version, V200R002C00 Version, S2300/ S3300/S2700/ S3700 V100R006C05 and previous versions, S5300/ S5700/S6300/ S6700 V100R006 Version, V200R001 Version, V200R002 Version, V200R003, V200R005C00SPC300 and earlier versions, S7700/S9300/S9300E/S9700 V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions",
      sources: [
         {
            db: "NVD",
            id: "CVE-2014-8572",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008290",
         },
         {
            db: "CNVD",
            id: "CNVD-2016-03649",
         },
         {
            db: "VULHUB",
            id: "VHN-76517",
         },
      ],
      trust: 2.25,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2014-8572",
            trust: 3.1,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008290",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201605-577",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2016-03649",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-76517",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-03649",
         },
         {
            db: "VULHUB",
            id: "VHN-76517",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008290",
         },
         {
            db: "NVD",
            id: "CVE-2014-8572",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201605-577",
         },
      ],
   },
   id: "VAR-201704-0463",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-03649",
         },
         {
            db: "VULHUB",
            id: "VHN-76517",
         },
      ],
      trust: 1.2565105382926829,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-03649",
         },
      ],
   },
   last_update_date: "2023-12-18T13:08:53.241000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Huawei-SA-20141010-01-VRP",
            trust: 0.8,
            url: "http://www.huawei.com/en/psirt/security-advisories/hw-373182",
         },
         {
            title: "Patches for various Huawei Product Denial of Service Vulnerabilities (CNVD-2016-03649)",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/76517",
         },
         {
            title: "Multiple Huawei Product security vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=61890",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-03649",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008290",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201605-577",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-20",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-76517",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008290",
         },
         {
            db: "NVD",
            id: "CVE-2014-8572",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "http://www.huawei.com/en/psirt/security-advisories/hw-373182",
         },
         {
            trust: 1.2,
            url: "http://www.huawei.com/cn/psirt/security-advisories/hw-373183",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-8572",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-8572",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-03649",
         },
         {
            db: "VULHUB",
            id: "VHN-76517",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008290",
         },
         {
            db: "NVD",
            id: "CVE-2014-8572",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201605-577",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2016-03649",
         },
         {
            db: "VULHUB",
            id: "VHN-76517",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008290",
         },
         {
            db: "NVD",
            id: "CVE-2014-8572",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201605-577",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2016-05-27T00:00:00",
            db: "CNVD",
            id: "CNVD-2016-03649",
         },
         {
            date: "2017-04-02T00:00:00",
            db: "VULHUB",
            id: "VHN-76517",
         },
         {
            date: "2017-05-09T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2014-008290",
         },
         {
            date: "2017-04-02T20:59:00.423000",
            db: "NVD",
            id: "CVE-2014-8572",
         },
         {
            date: "2016-05-23T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201605-577",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2016-05-27T00:00:00",
            db: "CNVD",
            id: "CNVD-2016-03649",
         },
         {
            date: "2017-04-11T00:00:00",
            db: "VULHUB",
            id: "VHN-76517",
         },
         {
            date: "2017-05-09T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2014-008290",
         },
         {
            date: "2017-04-11T01:11:55.313000",
            db: "NVD",
            id: "CVE-2014-8572",
         },
         {
            date: "2016-05-23T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201605-577",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201605-577",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei Service disruption in product software  (DoS) Vulnerabilities",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2014-008290",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "input validation",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201605-577",
         },
      ],
      trust: 0.6,
   },
}

var-201704-0464
Vulnerability from variot

Huawei S9300, S9303, S9306, S9312 with software V100R002; S7700, S7703, S7706, S7712 with software V100R003, V100R006, V200R001, V200R002, V200R003, V200R005; S9300E, S9303E, S9306E, S9312E with software V200R001; S9700, S9703, S9706, S9712 with software V200R002, V200R003, V200R005; S12708, S12712 with software V200R005; 5700HI, 5300HI with software V100R006, V200R001, V200R002, V200R003, V200R005; 5710EI, 5310EI with software V200R002, V200R003, V200R005; 5710HI, 5310HI with software V200R003, V200R005; 6700EI, 6300EI with software V200R005 could cause a leak of IP addresses of devices, related to unintended interface support for VRP MPLS LSP Ping. Huawei S9300 and other Huawei S series switches are Huawei. An information disclosure vulnerability exists in several Huawei switches that use the VRP platform. The Huawei S9300 and others are all S-series switches of China's Huawei (Huawei). The following products and versions are affected: Huawei S300 V100R002 version, V100R003 version, V100R006 version, V200R001 version, V200R002 version, V200R003 version; S9303 V100R002 version, V100R003 version, V200R001 version, V200R003 version; V100R003 Version, V100R006 Version, V200R001 Version, V200R002 Version, V200R003 Version; S9312 V100R002 Version, V100R003 Version, V100R006 Version, V200R001 Version, V200R002 Version, V200R003 Version; S7700 V100R002 Version, V100R003 Version, V100R006 Version, V200R001 Version, V200R002 Version, V200R003 Version; S7703 V100R002 Version, V100R003 Version, V100R006 Version, V200R001 Version, V200R002 Version, V200R003 Version; S7706 V100R002 Version, V100R003 Version, V100R006 Version, V200R001 Version, V200R002 Version, V200R003 Version; S7712 V100R002 Version, V100R003 Version, V100R006 Version, V200R001 Version, V200R002 Version, V200R003 Version; S9300E V200R001 Version, V200R002 Version, V200R003 Version, V200R005 Version; S9303E V200R001 Version, V200R002 Version, V200R003 Version, V200R005 Version; S9306E V200R001 Version, V200R002 Version, V200R003 Version, V200R005 Version; S9312E

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201704-0464",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "5300hi",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "5300hi",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r005",
         },
         {
            model: "5700hi",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r005",
         },
         {
            model: "5300hi",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003",
         },
         {
            model: "5700hi",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003",
         },
         {
            model: "5710ei",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r002",
         },
         {
            model: "5710ei",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003",
         },
         {
            model: "5300hi",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "5300hi",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r002",
         },
         {
            model: "5700hi",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r002",
         },
         {
            model: "s9300e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "s9300e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002",
         },
         {
            model: "s9712",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005",
         },
         {
            model: "s9703",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002",
         },
         {
            model: "s7712",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003",
         },
         {
            model: "s9306",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "s7706",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005",
         },
         {
            model: "s9303",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005",
         },
         {
            model: "s9712",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003",
         },
         {
            model: "s9706",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005",
         },
         {
            model: "5700hi",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "s9312e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "s9312e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002",
         },
         {
            model: "s7703",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003",
         },
         {
            model: "s7706",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003",
         },
         {
            model: "s9303",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "s9706",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r003",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003",
         },
         {
            model: "s9703",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005",
         },
         {
            model: "6700ei",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005",
         },
         {
            model: "s9312",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r002",
         },
         {
            model: "5310ei",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002",
         },
         {
            model: "s9300e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003",
         },
         {
            model: "s7712",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "s9703",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003",
         },
         {
            model: "s9312e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r002",
         },
         {
            model: "s7703",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "s7703",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002",
         },
         {
            model: "s9312e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003",
         },
         {
            model: "s9312",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "s9306e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "s9306e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002",
         },
         {
            model: "5310ei",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003",
         },
         {
            model: "s9712",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "s9712",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002",
         },
         {
            model: "s9312",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002",
         },
         {
            model: "s9312",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r003",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "s9306",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r002",
         },
         {
            model: "s7706",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r002",
         },
         {
            model: "s7706",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002",
         },
         {
            model: "5310ei",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003",
         },
         {
            model: "s9303",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "s9706",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r003",
         },
         {
            model: "s9706",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002",
         },
         {
            model: "s9306e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005",
         },
         {
            model: "5310hi",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005",
         },
         {
            model: "s7703",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r002",
         },
         {
            model: "s9312",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005",
         },
         {
            model: "s9703",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "5710ei",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005",
         },
         {
            model: "s9306e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003",
         },
         {
            model: "5310hi",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005",
         },
         {
            model: "s9306",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "s9306",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002",
         },
         {
            model: "s9312",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003",
         },
         {
            model: "s7712",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r002",
         },
         {
            model: "s9306",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r003",
         },
         {
            model: "s9300e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005",
         },
         {
            model: "5700hi",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003",
         },
         {
            model: "s9303e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "s9303e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002",
         },
         {
            model: "s7703",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "s12712",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005",
         },
         {
            model: "s7706",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r002",
         },
         {
            model: "6300ei",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005",
         },
         {
            model: "s9303",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r002",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002",
         },
         {
            model: "s7703",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r003",
         },
         {
            model: "s9306",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005",
         },
         {
            model: "5710hi",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005",
         },
         {
            model: "s7712",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "s7712",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002",
         },
         {
            model: "s7712",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r003",
         },
         {
            model: "s9303e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005",
         },
         {
            model: "s9306",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003",
         },
         {
            model: "s7706",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "5710hi",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003",
         },
         {
            model: "s9303",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006",
         },
         {
            model: "s7703",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005",
         },
         {
            model: "s9303e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003",
         },
         {
            model: "s12708",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005",
         },
         {
            model: "s9312",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "s9303",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002",
         },
         {
            model: "s7706",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r003",
         },
         {
            model: "s9303",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r003",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "s7712",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001",
         },
         {
            model: "s7700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7703",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7706",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7712",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300e",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9303",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9303e",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9306",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9306e",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9312",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9312e",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9703",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9706",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9712",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300/ s9303/ s9306/ s9312/ s7700/ s7703/ s7706/ s7712 v100r002",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300/ s9303/ s9306/ s9312/ s7700/ s7703/ s7706/ s7712 v100r003",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300/ s9303/ s9306/ s9312/ s7700/ s7703/ s7706/ s7712 v100r006",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300/ s9303/ s9306/ s9312/ s7700/ s7703/ s7706/ s7712 v200r001",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300/ s9303/ s9306/ s9312/ s7700/ s7703/ s7706/ s7712 v200r002",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300/ s9303/ s9306/ s9312/ s7700/ s7703/ s7706/ s7712 v200r003",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300/ s9303/ s9306/ s9312/ s7700/ s7703/ s7706/ s7712 v200r005",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300e/ s9303e/ s9306e/ s9312e/ s9700/ s9703/ s9706/ s9712 v200r001",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300e/ s9303e/ s9306e/ s9312e/ s9700/ s9703/ s9706/ s9712 v200r002",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300e/ s9303e/ s9306e/ s9312e/ s9700/ s9703/ s9706/ s9712 v200r003",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300e/ s9303e/ s9306e/ s9312e/ s9700/ s9703/ s9706/ s9712 v200r005",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12708/ s12712 v200r005",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "5700hi/5300hi v100r006",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "5700hi/5300hi v200r001",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "5700hi/5300hi v200r002",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "5700hi/5300hi v200r003",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "5700hi/5300hi v200r005",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "5710ei/5310ei v200r002",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "5710ei/5310ei v200r003",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "5710ei/5310ei v200r005",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "5710hi/5310hi v200r003",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "5710hi/5310hi v200r005",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "6700ei/6300ei v200r005",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-04631",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008288",
         },
         {
            db: "NVD",
            id: "CVE-2014-8570",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201704-210",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v100r002:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v100r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v100r006:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r002:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r005:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9303_firmware:v200r002:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9303_firmware:v200r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9303_firmware:v200r005:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9303_firmware:v100r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9303_firmware:v200r001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9303_firmware:v100r002:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9303_firmware:v100r006:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9303:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9306_firmware:v100r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9306_firmware:v100r006:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9306_firmware:v200r001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9306_firmware:v200r002:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9306_firmware:v200r005:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9306_firmware:v100r002:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9306_firmware:v200r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9306:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9312_firmware:v100r002:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9312_firmware:v100r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9312_firmware:v100r006:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9312_firmware:v200r002:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9312_firmware:v200r005:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9312_firmware:v200r001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9312_firmware:v200r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9312:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r002:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r005:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v100r002:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v100r006:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v100r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7703_firmware:v100r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7703_firmware:v100r006:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7703_firmware:v200r001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7703_firmware:v200r002:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7703_firmware:v200r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7703_firmware:v100r002:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7703_firmware:v200r005:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7703:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7706_firmware:v100r002:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7706_firmware:v100r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7706_firmware:v100r006:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7706_firmware:v200r001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7706_firmware:v200r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7706_firmware:v200r002:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7706_firmware:v200r005:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7706:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7712_firmware:v200r002:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7712_firmware:v200r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7712_firmware:v200r005:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7712_firmware:v100r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7712_firmware:v200r001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7712_firmware:v100r002:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7712_firmware:v100r006:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7712:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300e_firmware:v200r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300e_firmware:v200r005:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300e_firmware:v200r002:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300e_firmware:v200r001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9300e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9303e_firmware:v200r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9303e_firmware:v200r005:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9303e_firmware:v200r001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9303e_firmware:v200r002:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9303e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9306e_firmware:v200r005:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9306e_firmware:v200r002:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9306e_firmware:v200r001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9306e_firmware:v200r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9306e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9312e_firmware:v200r005:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9312e_firmware:v200r001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9312e_firmware:v200r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9312e_firmware:v200r002:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9312e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r005:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r002:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9703_firmware:v200r001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9703_firmware:v200r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9703_firmware:v200r002:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9703_firmware:v200r005:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9703:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9706_firmware:v200r002:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9706_firmware:v200r005:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9706_firmware:v200r001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9706_firmware:v200r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9706:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9712_firmware:v200r001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9712_firmware:v200r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9712_firmware:v200r002:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9712_firmware:v200r005:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9712:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12708_firmware:v200r005:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s12708:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12712_firmware:v200r005:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s12712:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:5700hi_firmware:v200r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:5700hi_firmware:v200r005:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:5700hi_firmware:v100r006:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:5700hi_firmware:v200r002:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:5700hi_firmware:v200r001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:5700hi:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:5300hi_firmware:v200r002:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:5300hi_firmware:v200r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:5300hi_firmware:v200r005:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:5300hi_firmware:v100r006:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:5300hi_firmware:v200r001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:5300hi:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:5710ei_firmware:v200r005:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:5710ei_firmware:v200r002:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:5710ei_firmware:v200r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:5710ei:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:5310ei_firmware:v200r002:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:5310ei_firmware:v200r005:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:5310ei_firmware:v200r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:5310ei:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:5310hi_firmware:v200r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:5310hi_firmware:v200r005:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:5310hi:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:5710hi_firmware:v200r003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:5710hi_firmware:v200r005:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:5710hi:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:6700ei_firmware:v200r005:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:6700ei:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:6300ei_firmware:v200r005:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:6300ei:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2014-8570",
         },
      ],
   },
   cve: "CVE-2014-8570",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 5,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2014-8570",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "NONE",
                  baseScore: 5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  id: "CNVD-2017-04631",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  id: "VHN-76515",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 5.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitabilityScore: 3.9,
                  impactScore: 1.4,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
                  version: "3.0",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 5.3,
                  baseSeverity: "Medium",
                  confidentialityImpact: "Low",
                  exploitabilityScore: null,
                  id: "CVE-2014-8570",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2014-8570",
                  trust: 1.8,
                  value: "MEDIUM",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2017-04631",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201704-210",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-76515",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-04631",
         },
         {
            db: "VULHUB",
            id: "VHN-76515",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008288",
         },
         {
            db: "NVD",
            id: "CVE-2014-8570",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201704-210",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Huawei S9300, S9303, S9306, S9312 with software V100R002; S7700, S7703, S7706, S7712 with software V100R003, V100R006, V200R001, V200R002, V200R003, V200R005; S9300E, S9303E, S9306E, S9312E with software V200R001; S9700, S9703, S9706, S9712 with software V200R002, V200R003, V200R005; S12708, S12712 with software V200R005; 5700HI, 5300HI with software V100R006, V200R001, V200R002, V200R003, V200R005; 5710EI, 5310EI with software V200R002, V200R003, V200R005; 5710HI, 5310HI with software V200R003, V200R005; 6700EI, 6300EI with software V200R005 could cause a leak of IP addresses of devices, related to unintended interface support for VRP MPLS LSP Ping. Huawei S9300 and other Huawei S series switches are Huawei. An information disclosure vulnerability exists in several Huawei switches that use the VRP platform. The Huawei S9300 and others are all S-series switches of China's Huawei (Huawei). The following products and versions are affected: Huawei S300 V100R002 version, V100R003 version, V100R006 version, V200R001 version, V200R002 version, V200R003 version; S9303 V100R002 version, V100R003 version, V200R001 version, V200R003 version; V100R003 Version, V100R006 Version, V200R001 Version, V200R002 Version, V200R003 Version; S9312 V100R002 Version, V100R003 Version, V100R006 Version, V200R001 Version, V200R002 Version, V200R003 Version; S7700 V100R002 Version, V100R003 Version, V100R006 Version, V200R001 Version, V200R002 Version,  V200R003 Version; S7703 V100R002 Version, V100R003 Version, V100R006 Version, V200R001 Version, V200R002 Version, V200R003 Version; S7706 V100R002 Version, V100R003 Version, V100R006 Version, V200R001 Version, V200R002 Version, V200R003 Version; S7712 V100R002 Version, V100R003 Version, V100R006 Version, V200R001 Version, V200R002 Version, V200R003 Version; S9300E V200R001 Version, V200R002 Version, V200R003 Version, V200R005 Version; S9303E V200R001 Version, V200R002 Version, V200R003 Version, V200R005 Version; S9306E V200R001 Version, V200R002 Version, V200R003 Version, V200R005 Version; S9312E",
      sources: [
         {
            db: "NVD",
            id: "CVE-2014-8570",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008288",
         },
         {
            db: "CNVD",
            id: "CNVD-2017-04631",
         },
         {
            db: "VULHUB",
            id: "VHN-76515",
         },
      ],
      trust: 2.25,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2014-8570",
            trust: 3.1,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008288",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201704-210",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2017-04631",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-76515",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-04631",
         },
         {
            db: "VULHUB",
            id: "VHN-76515",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008288",
         },
         {
            db: "NVD",
            id: "CVE-2014-8570",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201704-210",
         },
      ],
   },
   id: "VAR-201704-0464",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-04631",
         },
         {
            db: "VULHUB",
            id: "VHN-76515",
         },
      ],
      trust: 1.5366909704166667,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-04631",
         },
      ],
   },
   last_update_date: "2023-12-18T12:51:20.663000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Huawei-SA-20140924-01-VRP",
            trust: 0.8,
            url: "http://www.huawei.com/en/psirt/security-advisories/hw-372145",
         },
         {
            title: "Patches for various Huawei switch information disclosure vulnerabilities",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/91943",
         },
         {
            title: "Various Huawei switch information disclosure vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=69056",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-04631",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008288",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201704-210",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-200",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-76515",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008288",
         },
         {
            db: "NVD",
            id: "CVE-2014-8570",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.3,
            url: "http://www.huawei.com/en/psirt/security-advisories/hw-372145",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-8570",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-8570",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-04631",
         },
         {
            db: "VULHUB",
            id: "VHN-76515",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008288",
         },
         {
            db: "NVD",
            id: "CVE-2014-8570",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201704-210",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2017-04631",
         },
         {
            db: "VULHUB",
            id: "VHN-76515",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008288",
         },
         {
            db: "NVD",
            id: "CVE-2014-8570",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201704-210",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-04-19T00:00:00",
            db: "CNVD",
            id: "CNVD-2017-04631",
         },
         {
            date: "2017-04-02T00:00:00",
            db: "VULHUB",
            id: "VHN-76515",
         },
         {
            date: "2017-05-08T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2014-008288",
         },
         {
            date: "2017-04-02T20:59:00.343000",
            db: "NVD",
            id: "CVE-2014-8570",
         },
         {
            date: "2017-04-06T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201704-210",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-04-19T00:00:00",
            db: "CNVD",
            id: "CNVD-2017-04631",
         },
         {
            date: "2017-04-10T00:00:00",
            db: "VULHUB",
            id: "VHN-76515",
         },
         {
            date: "2017-05-08T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2014-008288",
         },
         {
            date: "2017-04-10T20:26:59.530000",
            db: "NVD",
            id: "CVE-2014-8570",
         },
         {
            date: "2017-04-06T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201704-210",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201704-210",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei Device in the product software  IP Vulnerability that could lead to address disclosure",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2014-008288",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "information disclosure",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201704-210",
         },
      ],
      trust: 0.6,
   },
}

var-201604-0306
Vulnerability from variot

Huawei Quidway S9700, S5700, S5300, S9300, and S7700 switches with software before V200R003SPH012 allow remote attackers to cause a denial of service (switch restart) via crafted traffic. Huawei S9300, S5700, S5300, S9300, and S7700 are all S series switches of Huawei. There are security vulnerabilities in various HuaweiQuidway switches. Multiple Huawei Quidway S-Series Switches are prone to a denial-of-service vulnerability. Huawei Quidway S9700, S5700, S5300, S9300, and S7700 are all S-series switch products of China's Huawei (Huawei). The following products and versions are affected: Huawei Quidway S9700, S5700, S5300, S9300, and S7700 using software versions earlier than V200R003SPH012

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201604-0306",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "s9300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00spc500",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00spc500",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00spc500",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00spc500",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00spc500",
         },
         {
            model: "quidway s9700",
            scope: null,
            trust: 1.4,
            vendor: "huawei",
            version: null,
         },
         {
            model: "quidway s5700",
            scope: null,
            trust: 1.4,
            vendor: "huawei",
            version: null,
         },
         {
            model: "quidway s5300",
            scope: null,
            trust: 1.4,
            vendor: "huawei",
            version: null,
         },
         {
            model: "quidway s9300",
            scope: null,
            trust: 1.4,
            vendor: "huawei",
            version: null,
         },
         {
            model: "quidway s7700",
            scope: null,
            trust: 1.4,
            vendor: "huawei",
            version: null,
         },
         {
            model: "quidway",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r003sph012",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-02160",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-002072",
         },
         {
            db: "NVD",
            id: "CVE-2016-3678",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201604-178",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:huawei:s7700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:huawei:s5700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:huawei:s9300_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:huawei:s5300_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:huawei:s9700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2016-3678",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The vendor reported this issue.",
      sources: [
         {
            db: "BID",
            id: "85731",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2016-3678",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: true,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 7.8,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2016-3678",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "High",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "CNVD-2016-02160",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "VHN-92497",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "HIGH",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.9,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.5,
                  baseSeverity: "High",
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2016-3678",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2016-3678",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2016-02160",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201604-178",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULHUB",
                  id: "VHN-92497",
                  trust: 0.1,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-02160",
         },
         {
            db: "VULHUB",
            id: "VHN-92497",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-002072",
         },
         {
            db: "NVD",
            id: "CVE-2016-3678",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201604-178",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Huawei Quidway S9700, S5700, S5300, S9300, and S7700 switches with software before V200R003SPH012 allow remote attackers to cause a denial of service (switch restart) via crafted traffic. Huawei S9300, S5700, S5300, S9300, and S7700 are all S series switches of Huawei. There are security vulnerabilities in various HuaweiQuidway switches. Multiple Huawei Quidway S-Series Switches are prone to a denial-of-service vulnerability. Huawei Quidway S9700, S5700, S5300, S9300, and S7700 are all S-series switch products of China's Huawei (Huawei). The following products and versions are affected: Huawei Quidway S9700, S5700, S5300, S9300, and S7700 using software versions earlier than V200R003SPH012",
      sources: [
         {
            db: "NVD",
            id: "CVE-2016-3678",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-002072",
         },
         {
            db: "CNVD",
            id: "CNVD-2016-02160",
         },
         {
            db: "BID",
            id: "85731",
         },
         {
            db: "VULHUB",
            id: "VHN-92497",
         },
      ],
      trust: 2.52,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2016-3678",
            trust: 3.4,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-002072",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201604-178",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2016-02160",
            trust: 0.6,
         },
         {
            db: "BID",
            id: "85731",
            trust: 0.3,
         },
         {
            db: "VULHUB",
            id: "VHN-92497",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-02160",
         },
         {
            db: "VULHUB",
            id: "VHN-92497",
         },
         {
            db: "BID",
            id: "85731",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-002072",
         },
         {
            db: "NVD",
            id: "CVE-2016-3678",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201604-178",
         },
      ],
   },
   id: "VAR-201604-0306",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-02160",
         },
         {
            db: "VULHUB",
            id: "VHN-92497",
         },
      ],
      trust: 1.2715110655555555,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-02160",
         },
      ],
   },
   last_update_date: "2023-12-18T13:44:13.822000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "huawei-sa-20160330-01-switch",
            trust: 0.8,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160330-01-switch-en",
         },
         {
            title: "Patches for multiple HuaweiQuidway switch denial of service vulnerabilities",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/73980",
         },
         {
            title: "Multiple Huawei Quidway Repair measures for switch denial of service vulnerability",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=60879",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-02160",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-002072",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201604-178",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-20",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-92497",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-002072",
         },
         {
            db: "NVD",
            id: "CVE-2016-3678",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.6,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160330-01-switch-en",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-3678",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-3678",
         },
         {
            trust: 0.3,
            url: "http://www.huawei.com",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-02160",
         },
         {
            db: "VULHUB",
            id: "VHN-92497",
         },
         {
            db: "BID",
            id: "85731",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-002072",
         },
         {
            db: "NVD",
            id: "CVE-2016-3678",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201604-178",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2016-02160",
         },
         {
            db: "VULHUB",
            id: "VHN-92497",
         },
         {
            db: "BID",
            id: "85731",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-002072",
         },
         {
            db: "NVD",
            id: "CVE-2016-3678",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201604-178",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2016-04-13T00:00:00",
            db: "CNVD",
            id: "CNVD-2016-02160",
         },
         {
            date: "2016-04-11T00:00:00",
            db: "VULHUB",
            id: "VHN-92497",
         },
         {
            date: "2016-03-30T00:00:00",
            db: "BID",
            id: "85731",
         },
         {
            date: "2016-04-18T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2016-002072",
         },
         {
            date: "2016-04-11T15:59:10.597000",
            db: "NVD",
            id: "CVE-2016-3678",
         },
         {
            date: "2016-04-12T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201604-178",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2016-04-13T00:00:00",
            db: "CNVD",
            id: "CNVD-2016-02160",
         },
         {
            date: "2016-04-14T00:00:00",
            db: "VULHUB",
            id: "VHN-92497",
         },
         {
            date: "2016-03-30T00:00:00",
            db: "BID",
            id: "85731",
         },
         {
            date: "2016-04-18T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2016-002072",
         },
         {
            date: "2016-04-14T20:18:10.387000",
            db: "NVD",
            id: "CVE-2016-3678",
         },
         {
            date: "2016-04-12T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201604-178",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201604-178",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei Quidway Denial of service in switch product software  (DoS) Vulnerability",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2016-002072",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "input validation",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201604-178",
         },
      ],
      trust: 0.6,
   },
}

var-201802-0296
Vulnerability from variot

Huawei S12700 V200R008C00, V200R009C00, S5700 V200R007C00, V200R008C00, V200R009C00, S6700 V200R008C00, V200R009C00, S7700 V200R008C00, V200R009C00, S9700 V200R008C00, V200R009C00 have a numeric errors vulnerability. An unauthenticated, remote attacker may send specific TCP messages with keychain authentication option to the affected products. Due to the improper validation of the messages, it will cause numeric errors when handling the messages. Successful exploit will cause the affected products to reset. plural Huawei The product contains a numerical processing vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. HuaweiS12700 is an intelligent routing switch of China Huawei. A numerical calculation error vulnerability exists in several Huawei router products. The vulnerability stems from a program that fails to adequately verify the message. There are security vulnerabilities in several Huawei products. The following products and versions are affected: Huawei S12700 V200R008C00 Version, V200R009C00 Version; S5700 V200R007C00 Version, V200R008C00 Version, V200R009C00 Version; S6700 V200R008C00 Version, V200R009C00 Version; S7700 V200R008C00 Version, V200R009C00 Version; S9700 V200R008C00 Version, V200R009C00 Version

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201802-0296",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "s12700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s12700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-37844",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012509",
         },
         {
            db: "NVD",
            id: "CVE-2017-17300",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-669",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2017-17300",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Huawei internal tester",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201712-669",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2017-17300",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 7.8,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2017-17300",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "High",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "CNVD-2017-37844",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "HIGH",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "VHN-108309",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "HIGH",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.9,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.5,
                  baseSeverity: "High",
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2017-17300",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2017-17300",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2017-37844",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201712-669",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULHUB",
                  id: "VHN-108309",
                  trust: 0.1,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-37844",
         },
         {
            db: "VULHUB",
            id: "VHN-108309",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012509",
         },
         {
            db: "NVD",
            id: "CVE-2017-17300",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-669",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Huawei S12700 V200R008C00, V200R009C00, S5700 V200R007C00, V200R008C00, V200R009C00, S6700 V200R008C00, V200R009C00, S7700 V200R008C00, V200R009C00, S9700 V200R008C00, V200R009C00 have a numeric errors vulnerability. An unauthenticated, remote attacker may send specific TCP messages with keychain authentication option to the affected products. Due to the improper validation of the messages, it will cause numeric errors when handling the messages. Successful exploit will cause the affected products to reset. plural Huawei The product contains a numerical processing vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. HuaweiS12700 is an intelligent routing switch of China Huawei. A numerical calculation error vulnerability exists in several Huawei router products. The vulnerability stems from a program that fails to adequately verify the message. There are security vulnerabilities in several Huawei products. The following products and versions are affected: Huawei S12700 V200R008C00 Version, V200R009C00 Version; S5700 V200R007C00 Version, V200R008C00 Version, V200R009C00 Version; S6700 V200R008C00 Version, V200R009C00 Version; S7700 V200R008C00 Version, V200R009C00 Version; S9700 V200R008C00 Version, V200R009C00 Version",
      sources: [
         {
            db: "NVD",
            id: "CVE-2017-17300",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012509",
         },
         {
            db: "CNVD",
            id: "CNVD-2017-37844",
         },
         {
            db: "VULHUB",
            id: "VHN-108309",
         },
      ],
      trust: 2.25,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2017-17300",
            trust: 3.1,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012509",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-669",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2017-37844",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-108309",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-37844",
         },
         {
            db: "VULHUB",
            id: "VHN-108309",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012509",
         },
         {
            db: "NVD",
            id: "CVE-2017-17300",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-669",
         },
      ],
   },
   id: "VAR-201802-0296",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-37844",
         },
         {
            db: "VULHUB",
            id: "VHN-108309",
         },
      ],
      trust: 1.493392932,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-37844",
         },
      ],
   },
   last_update_date: "2023-12-18T13:33:59.596000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "huawei-sa-20171215-01-router",
            trust: 0.8,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-router-en",
         },
         {
            title: "Patches for various Huawei router product numerical calculation error vulnerabilities",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/111425",
         },
         {
            title: "Multiple Huawei Product security vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=77207",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-37844",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012509",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-669",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-20",
            trust: 1.1,
         },
         {
            problemtype: "CWE-189",
            trust: 0.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-108309",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012509",
         },
         {
            db: "NVD",
            id: "CVE-2017-17300",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-router-en",
         },
         {
            trust: 0.8,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-17300",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-17300",
         },
         {
            trust: 0.6,
            url: "http://www.huawei.com/cn/psirt/security-advisories/2017/huawei-sa-20171215-01-router-cn",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-37844",
         },
         {
            db: "VULHUB",
            id: "VHN-108309",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012509",
         },
         {
            db: "NVD",
            id: "CVE-2017-17300",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-669",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2017-37844",
         },
         {
            db: "VULHUB",
            id: "VHN-108309",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012509",
         },
         {
            db: "NVD",
            id: "CVE-2017-17300",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-669",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-12-22T00:00:00",
            db: "CNVD",
            id: "CNVD-2017-37844",
         },
         {
            date: "2018-02-15T00:00:00",
            db: "VULHUB",
            id: "VHN-108309",
         },
         {
            date: "2018-03-16T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2017-012509",
         },
         {
            date: "2018-02-15T16:29:03.563000",
            db: "NVD",
            id: "CVE-2017-17300",
         },
         {
            date: "2017-12-21T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201712-669",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-12-22T00:00:00",
            db: "CNVD",
            id: "CNVD-2017-37844",
         },
         {
            date: "2019-10-03T00:00:00",
            db: "VULHUB",
            id: "VHN-108309",
         },
         {
            date: "2018-03-16T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2017-012509",
         },
         {
            date: "2019-10-03T00:03:26.223000",
            db: "NVD",
            id: "CVE-2017-17300",
         },
         {
            date: "2019-10-23T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201712-669",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201712-669",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei Numerical processing vulnerabilities in products",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2017-012509",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "input validation error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201712-669",
         },
      ],
      trust: 0.6,
   },
}

var-201704-0502
Vulnerability from variot

Huawei S5300 with software V200R003C00, V200R007C00, V200R008C00, V200R009C00; S5700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C03, V200R007C00, V200R008C00, V200R009C00; S6300 with software V200R003C00, V200R005C00, V200R008C00, V200R009C00; S6700 with software V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R008C00, V200R009C00; S7700 with software V200R007C00, V200R008C00, V200R009C00; S9300 with software V200R007C00, V200R008C00, V200R009C00; S9700 with software V200R007C00, V200R008C00, V200R009C00; and S12700 with software V200R007C00, V200R007C01, V200R008C00, V200R009C00 allow the attacker to cause a denial of service condition by sending malformed MPLS packets. Multiple Huawei Product has a service disruption (DoS) There are vulnerabilities that are put into a state.An attacker could create a malformed MPLS Service interruption due to packet transmission (DoS) There is a possibility of being put into a state. Huawei S9700 is the S series switch of China Huawei. A denial of service vulnerability exists in several Huawei products due to the failure of the program to properly verify MultiprotocolLabelSwitching (MPLS) messages. Multiple Huawei products are prone to a remote denial-of-service vulnerability. Attackers can exploit this issue to crash the affected device, denying service to legitimate users. The following products and versions are affected: Huawei S9700 V200R009C00 , V200R008C00 , V200R007C00 ; Huawei S9300 V200R009C00 , V200R008C00 , V200R007C00 ; Huawei S7700 V200R009C00 , V200R008C00 , V200R007C00 ; Huawei S6700 V200R009C00 , V200R008C00 , V200R005C00 , V200R003C00 , V200R002C00 , V200R001C01 , V200R001C00 ; Huawei S6300 V200R009C00 , V200R008C00 , V200R005C00 , V200R003C00 ; Huawei S5700 V200R009C00 , V200R008C00 , V200R007C00 , V200R005C00 , V200R003C00 , V200R002C00 , V200R001C00 ; Huawei S5300 V200R009C00 , V200R008C00 , V200R007C00 , V200R003C00 ; Huawei S12700 V200R009C00 , V200R008C00 , V200R007C01 , V200R007C00

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201704-0502",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "s9300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s5700 v200r005c00",
            scope: null,
            trust: 1.5,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r008c00",
            scope: null,
            trust: 1.5,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c01",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c03",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c01",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s7700 v200r008c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r008c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r001c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r001c01",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r002c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r003c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r008c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r003c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r005c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r008c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r002c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r003c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r008c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r003c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r007c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r008c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r008c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r007c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r007c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r007c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r007c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r007c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r009c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r009c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r009c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r009c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r009c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r009c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r009c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r007c01",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r001c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r005c03",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r009c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r005c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r001c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r009c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r009c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r009c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r009c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r009c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r009c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r009c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r009c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-11388",
         },
         {
            db: "BID",
            id: "94285",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008266",
         },
         {
            db: "NVD",
            id: "CVE-2016-8773",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201611-370",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r007c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r005c03:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r001c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2016-8773",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The vendor reported this issue.",
      sources: [
         {
            db: "BID",
            id: "94285",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2016-8773",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 5,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2016-8773",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "CNVD-2016-11388",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "HIGH",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "VHN-97593",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.9,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.5,
                  baseSeverity: "High",
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2016-8773",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2016-8773",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2016-11388",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201611-370",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-97593",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-11388",
         },
         {
            db: "VULHUB",
            id: "VHN-97593",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008266",
         },
         {
            db: "NVD",
            id: "CVE-2016-8773",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201611-370",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Huawei S5300 with software V200R003C00, V200R007C00, V200R008C00, V200R009C00; S5700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C03, V200R007C00, V200R008C00, V200R009C00; S6300 with software V200R003C00, V200R005C00, V200R008C00, V200R009C00; S6700 with software V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R008C00, V200R009C00; S7700 with software V200R007C00, V200R008C00, V200R009C00; S9300 with software V200R007C00, V200R008C00, V200R009C00; S9700 with software V200R007C00, V200R008C00, V200R009C00; and S12700 with software V200R007C00, V200R007C01, V200R008C00, V200R009C00 allow the attacker to cause a denial of service condition by sending malformed MPLS packets. Multiple Huawei Product has a service disruption (DoS) There are vulnerabilities that are put into a state.An attacker could create a malformed MPLS Service interruption due to packet transmission (DoS) There is a possibility of being put into a state. Huawei S9700 is the S series switch of China Huawei. A denial of service vulnerability exists in several Huawei products due to the failure of the program to properly verify MultiprotocolLabelSwitching (MPLS) messages. Multiple Huawei products are prone to a remote denial-of-service vulnerability. \nAttackers can exploit this issue to crash the affected device, denying service to legitimate users. The following products and versions are affected: Huawei S9700 V200R009C00 , V200R008C00 , V200R007C00 ; Huawei S9300 V200R009C00 , V200R008C00 , V200R007C00 ; Huawei S7700 V200R009C00 , V200R008C00 , V200R007C00 ; Huawei S6700 V200R009C00 , V200R008C00 , V200R005C00 , V200R003C00 , V200R002C00 , V200R001C01 , V200R001C00 ; Huawei S6300 V200R009C00 , V200R008C00 , V200R005C00 , V200R003C00 ; Huawei S5700 V200R009C00 , V200R008C00 , V200R007C00 , V200R005C00 , V200R003C00 , V200R002C00 , V200R001C00 ; Huawei S5300 V200R009C00 , V200R008C00 , V200R007C00 , V200R003C00 ; Huawei S12700 V200R009C00 , V200R008C00 , V200R007C01 , V200R007C00 ",
      sources: [
         {
            db: "NVD",
            id: "CVE-2016-8773",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008266",
         },
         {
            db: "CNVD",
            id: "CNVD-2016-11388",
         },
         {
            db: "BID",
            id: "94285",
         },
         {
            db: "VULHUB",
            id: "VHN-97593",
         },
      ],
      trust: 2.52,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2016-8773",
            trust: 3.4,
         },
         {
            db: "BID",
            id: "94285",
            trust: 2.6,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008266",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201611-370",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2016-11388",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-97593",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-11388",
         },
         {
            db: "VULHUB",
            id: "VHN-97593",
         },
         {
            db: "BID",
            id: "94285",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008266",
         },
         {
            db: "NVD",
            id: "CVE-2016-8773",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201611-370",
         },
      ],
   },
   id: "VAR-201704-0502",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-11388",
         },
         {
            db: "VULHUB",
            id: "VHN-97593",
         },
      ],
      trust: 1.5252524428571426,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-11388",
         },
      ],
   },
   last_update_date: "2023-12-18T13:48:39.743000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "huawei-sa-20161111-01-mpls",
            trust: 0.8,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161111-01-mpls-en",
         },
         {
            title: "Patch for Denial of Service Vulnerability (CNVD-2016-11388) for multiple Huawei products",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/84128",
         },
         {
            title: "Multiple Huawei Fixes for product input validation vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=65729",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-11388",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008266",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201611-370",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-20",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-97593",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008266",
         },
         {
            db: "NVD",
            id: "CVE-2016-8773",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.3,
            url: "http://www.securityfocus.com/bid/94285",
         },
         {
            trust: 1.7,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161111-01-mpls-en",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-8773",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-8773",
         },
         {
            trust: 0.6,
            url: "http://www.huawei.com/cn/psirt/security-advisories/2016/huawei-sa-20161111-01-mpls-cn",
         },
         {
            trust: 0.3,
            url: "http://www.huawei.com",
         },
         {
            trust: 0.3,
            url: "http://www.huawei.com/en/psirt/security-advisories/2016/huawei-sa-20161111-01-mpls-en",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-11388",
         },
         {
            db: "VULHUB",
            id: "VHN-97593",
         },
         {
            db: "BID",
            id: "94285",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008266",
         },
         {
            db: "NVD",
            id: "CVE-2016-8773",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201611-370",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2016-11388",
         },
         {
            db: "VULHUB",
            id: "VHN-97593",
         },
         {
            db: "BID",
            id: "94285",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008266",
         },
         {
            db: "NVD",
            id: "CVE-2016-8773",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201611-370",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2016-11-22T00:00:00",
            db: "CNVD",
            id: "CNVD-2016-11388",
         },
         {
            date: "2017-04-02T00:00:00",
            db: "VULHUB",
            id: "VHN-97593",
         },
         {
            date: "2016-11-11T00:00:00",
            db: "BID",
            id: "94285",
         },
         {
            date: "2017-05-09T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2016-008266",
         },
         {
            date: "2017-04-02T20:59:01.407000",
            db: "NVD",
            id: "CVE-2016-8773",
         },
         {
            date: "2016-11-18T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201611-370",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2016-11-22T00:00:00",
            db: "CNVD",
            id: "CNVD-2016-11388",
         },
         {
            date: "2017-04-11T00:00:00",
            db: "VULHUB",
            id: "VHN-97593",
         },
         {
            date: "2016-11-24T01:09:00",
            db: "BID",
            id: "94285",
         },
         {
            date: "2017-05-09T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2016-008266",
         },
         {
            date: "2017-04-11T01:13:07.097000",
            db: "NVD",
            id: "CVE-2016-8773",
         },
         {
            date: "2016-11-18T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201611-370",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201611-370",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Multiple  Huawei Service disruption in products  (DoS) Vulnerabilities",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2016-008266",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "input validation",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201611-370",
         },
      ],
      trust: 0.6,
   },
}

var-201803-1329
Vulnerability from variot

Huawei S12700 V200R005C00; V200R006C00; V200R007C00; V200R007C01; V200R007C20; V200R008C00; V200R009C00;S1700 V200R006C10; V200R009C00;S2700 V100R006C03; V200R003C00; V200R005C00; V200R006C00; V200R006C10; V200R007C00; V200R007C00B050; V200R007C00SPC009T; V200R007C00SPC019T; V200R008C00; V200R009C00;S3700 V100R006C03;S5700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R003C02; V200R005C00; V200R005C01; V200R005C02; V200R005C03; V200R006C00; V200R007C00; V200R008C00; V200R009C00;S6700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R005C01; V200R005C02; V200R008C00; V200R009C00;S7700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R006C00; V200R006C01; V200R007C00; V200R007C01; V200R008C00; V200R008C06; V200R009C00;S9700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R006C00; V200R007C00; V200R007C01; V200R008C00; V200R009C00 have a memory leak vulnerability. In some specific conditions, if attackers send specific malformed MPLS Service PING messages to the affected products, products do not release the memory when handling the packets. So successful exploit will result in memory leak of the affected products. plural Huawei The product contains a resource management vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. HuaweiS12700 is an intelligent routing switch of China Huawei. The following products and versions are affected: Huawei S12700 V200R005C00 Version, V200R006C00 Version, V200R007C00 Version, V200R007C01 Version, V200R007C20 Version, V200R008C00 Version, V200R009C00 Version; S1700 V200R006C10 Version, V200R009C00 Version; S2700 V100R006C03 Version, V200R003C00 Version, V200R005C00 Version, V200R006C00 Version, V200R006C10 Version, V200R007C00 Version, V200R007C00B050 Version, V200R007C00SPC009T Version, V200R007C00SPC019T Version, V200R008C00 Version, V200R009C00 Version; S3700 V100R006C03 Version; S5700 V200R001C00 Version, V200R001C01 Version, V200R002C00 Version, V200R003C00 Version, V200R003C02 Version, V200R005C00 Version, V200R005C01 Version, V200R005C02 Version, V200R005C03 Version, V200R006C00 Version, V200R007C00 Version, V200R008C00 Version, V200R009C00 Version; S6700 V200R001C00 Version, V200R001C01 Version, V200R002C00 Version, V200R003C00 Version, V200R005C00 Version, V200R005C01 Version, V200R005C02 Version, V200R008C00 Version, V200R009C00 Version; S7700

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201803-1329",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "s6700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r001c01",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r001c01",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00spc019t",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c02",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c20",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c01",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c01",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s3700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c03",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c10",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c01",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00b050",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c01",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c01",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c02",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00spc009t",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c03",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c01",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c06",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c10",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c02",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c01",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c03",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c01",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s12700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s3700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r005c03",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r007c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v100r006c03",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r001c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r003c02",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r001c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r001c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r007c20",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700 v200r006c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r006c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r007c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r005c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r005c02",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r005c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r005c02",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r006c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r007c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r008c06",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r001c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r007c00b050",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r007c00spc009t",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r007c00spc019t",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s3700 v100r006c03",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-07349",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012890",
         },
         {
            db: "NVD",
            id: "CVE-2017-17141",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-302",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r007c20:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r007c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r006c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r006c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r007c00b050:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r007c00spc009t:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r007c00spc019t:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v100r006c03:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s3700_firmware:v100r006c03:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s3700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r001c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r003c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r005c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r005c03:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r005c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r001c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r005c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r005c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r006c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r001c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r007c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r008c06:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r007c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r001c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2017-17141",
         },
      ],
   },
   cve: "CVE-2017-17141",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 4.3,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 8.6,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Medium",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 4.3,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2017-17141",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 8.6,
                  id: "CNVD-2018-07349",
                  impactScore: 2.9,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 0.6,
                  vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "PARTIAL",
                  baseScore: 4.3,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 8.6,
                  id: "VHN-108134",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:M/AU:N/C:N/I:N/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "LOW",
                  baseScore: 3.7,
                  baseSeverity: "LOW",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 2.2,
                  impactScore: 1.4,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
                  version: "3.0",
               },
               {
                  attackComplexity: "High",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "Low",
                  baseScore: 3.7,
                  baseSeverity: "Low",
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2017-17141",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2017-17141",
                  trust: 1.8,
                  value: "LOW",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2018-07349",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201712-302",
                  trust: 0.6,
                  value: "LOW",
               },
               {
                  author: "VULHUB",
                  id: "VHN-108134",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-07349",
         },
         {
            db: "VULHUB",
            id: "VHN-108134",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012890",
         },
         {
            db: "NVD",
            id: "CVE-2017-17141",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-302",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Huawei S12700 V200R005C00; V200R006C00; V200R007C00; V200R007C01; V200R007C20; V200R008C00; V200R009C00;S1700 V200R006C10; V200R009C00;S2700 V100R006C03; V200R003C00; V200R005C00; V200R006C00; V200R006C10; V200R007C00; V200R007C00B050; V200R007C00SPC009T; V200R007C00SPC019T; V200R008C00; V200R009C00;S3700 V100R006C03;S5700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R003C02; V200R005C00; V200R005C01; V200R005C02; V200R005C03; V200R006C00; V200R007C00; V200R008C00; V200R009C00;S6700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R005C01; V200R005C02; V200R008C00; V200R009C00;S7700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R006C00; V200R006C01; V200R007C00; V200R007C01; V200R008C00; V200R008C06; V200R009C00;S9700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R006C00; V200R007C00; V200R007C01; V200R008C00; V200R009C00 have a memory leak vulnerability. In some specific conditions, if attackers send specific malformed MPLS Service PING messages to the affected products, products do not release the memory when handling the packets. So successful exploit will result in memory leak of the affected products. plural Huawei The product contains a resource management vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. HuaweiS12700 is an intelligent routing switch of China Huawei. The following products and versions are affected: Huawei S12700 V200R005C00 Version, V200R006C00 Version, V200R007C00 Version, V200R007C01 Version, V200R007C20 Version, V200R008C00 Version, V200R009C00 Version; S1700 V200R006C10 Version, V200R009C00 Version; S2700 V100R006C03 Version, V200R003C00 Version, V200R005C00 Version, V200R006C00 Version,  V200R006C10 Version, V200R007C00 Version, V200R007C00B050 Version, V200R007C00SPC009T Version, V200R007C00SPC019T Version, V200R008C00 Version, V200R009C00 Version; S3700 V100R006C03 Version; S5700 V200R001C00 Version, V200R001C01 Version, V200R002C00 Version, V200R003C00 Version, V200R003C02 Version, V200R005C00 Version, V200R005C01 Version, V200R005C02 Version,  V200R005C03 Version, V200R006C00 Version, V200R007C00 Version, V200R008C00 Version, V200R009C00 Version; S6700 V200R001C00 Version, V200R001C01 Version, V200R002C00 Version, V200R003C00 Version, V200R005C00 Version, V200R005C01 Version, V200R005C02 Version, V200R008C00 Version, V200R009C00 Version; S7700",
      sources: [
         {
            db: "NVD",
            id: "CVE-2017-17141",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012890",
         },
         {
            db: "CNVD",
            id: "CNVD-2018-07349",
         },
         {
            db: "VULHUB",
            id: "VHN-108134",
         },
      ],
      trust: 2.25,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2017-17141",
            trust: 3.1,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012890",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-302",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2018-07349",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-108134",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-07349",
         },
         {
            db: "VULHUB",
            id: "VHN-108134",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012890",
         },
         {
            db: "NVD",
            id: "CVE-2017-17141",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-302",
         },
      ],
   },
   id: "VAR-201803-1329",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-07349",
         },
         {
            db: "VULHUB",
            id: "VHN-108134",
         },
      ],
      trust: 1.5932156033333333,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-07349",
         },
      ],
   },
   last_update_date: "2023-12-18T12:19:01.627000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "huawei-sa-20171206-01-mpls",
            trust: 0.8,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-mpls-en",
         },
         {
            title: "Patch of several Huawei product memory leak vulnerabilities (CNVD-2018-07349)",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/125245",
         },
         {
            title: "Multiple Huawei Product security vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=100236",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-07349",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012890",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-302",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-772",
            trust: 1.1,
         },
         {
            problemtype: "CWE-399",
            trust: 0.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-108134",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012890",
         },
         {
            db: "NVD",
            id: "CVE-2017-17141",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.3,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-mpls-en",
         },
         {
            trust: 0.8,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-17141",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-17141",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-07349",
         },
         {
            db: "VULHUB",
            id: "VHN-108134",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012890",
         },
         {
            db: "NVD",
            id: "CVE-2017-17141",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-302",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2018-07349",
         },
         {
            db: "VULHUB",
            id: "VHN-108134",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012890",
         },
         {
            db: "NVD",
            id: "CVE-2017-17141",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-302",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2018-04-10T00:00:00",
            db: "CNVD",
            id: "CNVD-2018-07349",
         },
         {
            date: "2018-03-05T00:00:00",
            db: "VULHUB",
            id: "VHN-108134",
         },
         {
            date: "2018-04-26T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2017-012890",
         },
         {
            date: "2018-03-05T19:29:00.737000",
            db: "NVD",
            id: "CVE-2017-17141",
         },
         {
            date: "2017-12-07T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201712-302",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2018-04-10T00:00:00",
            db: "CNVD",
            id: "CNVD-2018-07349",
         },
         {
            date: "2019-10-03T00:00:00",
            db: "VULHUB",
            id: "VHN-108134",
         },
         {
            date: "2018-04-26T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2017-012890",
         },
         {
            date: "2019-10-03T00:03:26.223000",
            db: "NVD",
            id: "CVE-2017-17141",
         },
         {
            date: "2019-10-23T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201712-302",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201712-302",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei Resource management vulnerabilities in products",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2017-012890",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "resource management error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201712-302",
         },
      ],
      trust: 0.6,
   },
}

var-201704-0113
Vulnerability from variot

Huawei switches S5700, S6700, S7700, S9700 with software V200R001C00SPC300, V200R002C00SPC100, V200R003C00SPC300, V200R005C00SPC500, V200R006C00; S12700 with software V200R005C00SPC500, V200R006C00; ACU2 with software V200R005C00SPC500, V200R006C00 have a permission control vulnerability. If a switch enables Authentication, Authorization, and Accounting (AAA) for permission control and user permissions are not appropriate, AAA users may obtain the virtual type terminal (VTY) access permission, resulting in privilege escalation. plural Huawei The switch software contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) An attack may be carried out. The Huawei S5700 and others are all enterprise-level switches of China's Huawei (Huawei). Attackers can exploit this vulnerability to gain access to VTY (virtual type terminal). The following products and versions are affected: Huawei S5700 V200R001C00SPC300 Version, V200R002C00SPC100 Version, V200R003C00SPC300 Version, V200R005C00SPC500 Version, V200R006C00 Version; S6700 V200R001C00SPC300 Version, V200R002C00SPC100 Version, V200R003C00SPC300 Version, V200R005C00SPC500 Version, V200R006C00 Version; S7700 V200R001C00SPC300 Version, V200R002C00SPC100 Version, V200R003C00SPC300 Version, V200R005C00SPC500 Version, V200R006C00 Version; S9700 V200R001C00SPC300 Version, V200R002C00SPC100 Version, V200R003C00SPC300 Version, V200R005C00SPC500 Version, V200R006C00 Version; S12700 V200R005C00SPC500 Version, V200R006C00 Version; ACU2 V200R005C00SPC500 Version, V200R006C00 Version

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201704-0113",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "acu2",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r005c00spc500",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r005c00spc500",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r005c00spc500",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r005c00spc500",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r002c00spc100",
         },
         {
            model: "acu2",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc500",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc100",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc100",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc100",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc500",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "acu2",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2016-008262",
         },
         {
            db: "NVD",
            id: "CVE-2016-2404",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201704-193",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r005c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r005c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r005c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r005c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r005c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:acu2_firmware:v200r005c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:acu2_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:acu2:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2016-2404",
         },
      ],
   },
   cve: "CVE-2016-2404",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 6.8,
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:M/Au:S/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Medium",
                  accessVector: "Network",
                  authentication: "Single",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 6,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2016-2404",
                  impactScore: null,
                  integrityImpact: "Partial",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:M/Au:S/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "VULHUB",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 6.8,
                  id: "VHN-91223",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:M/AU:S/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.6,
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "High",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.5,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2016-2404",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "Low",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2016-2404",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201704-193",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-91223",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-91223",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008262",
         },
         {
            db: "NVD",
            id: "CVE-2016-2404",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201704-193",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Huawei switches S5700, S6700, S7700, S9700 with software V200R001C00SPC300, V200R002C00SPC100, V200R003C00SPC300, V200R005C00SPC500, V200R006C00; S12700 with software V200R005C00SPC500, V200R006C00; ACU2 with software V200R005C00SPC500, V200R006C00 have a permission control vulnerability. If a switch enables Authentication, Authorization, and Accounting (AAA) for permission control and user permissions are not appropriate, AAA users may obtain the virtual type terminal (VTY) access permission, resulting in privilege escalation. plural Huawei The switch software contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) An attack may be carried out. The Huawei S5700 and others are all enterprise-level switches of China's Huawei (Huawei). Attackers can exploit this vulnerability to gain access to VTY (virtual type terminal). The following products and versions are affected: Huawei S5700 V200R001C00SPC300 Version, V200R002C00SPC100 Version, V200R003C00SPC300 Version, V200R005C00SPC500 Version, V200R006C00 Version; S6700 V200R001C00SPC300 Version, V200R002C00SPC100 Version, V200R003C00SPC300 Version, V200R005C00SPC500 Version, V200R006C00 Version; S7700 V200R001C00SPC300 Version, V200R002C00SPC100 Version, V200R003C00SPC300 Version,  V200R005C00SPC500 Version, V200R006C00 Version; S9700 V200R001C00SPC300 Version, V200R002C00SPC100 Version, V200R003C00SPC300 Version, V200R005C00SPC500 Version, V200R006C00 Version; S12700 V200R005C00SPC500 Version, V200R006C00 Version; ACU2 V200R005C00SPC500 Version, V200R006C00 Version",
      sources: [
         {
            db: "NVD",
            id: "CVE-2016-2404",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008262",
         },
         {
            db: "VULHUB",
            id: "VHN-91223",
         },
      ],
      trust: 1.71,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2016-2404",
            trust: 2.5,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008262",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201704-193",
            trust: 0.7,
         },
         {
            db: "VULHUB",
            id: "VHN-91223",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-91223",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008262",
         },
         {
            db: "NVD",
            id: "CVE-2016-2404",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201704-193",
         },
      ],
   },
   id: "VAR-201704-0113",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-91223",
         },
      ],
      trust: 0.6649307799999999,
   },
   last_update_date: "2023-12-18T13:03:08.931000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "huawei-sa-20160217-01-switch",
            trust: 0.8,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160217-01-switch-en",
         },
         {
            title: "Various Huawei patch permissions and access control vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=69041",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2016-008262",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201704-193",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-264",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-91223",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008262",
         },
         {
            db: "NVD",
            id: "CVE-2016-2404",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160217-01-switch-en",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-2404",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2404",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-91223",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008262",
         },
         {
            db: "NVD",
            id: "CVE-2016-2404",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201704-193",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-91223",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008262",
         },
         {
            db: "NVD",
            id: "CVE-2016-2404",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201704-193",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-04-02T00:00:00",
            db: "VULHUB",
            id: "VHN-91223",
         },
         {
            date: "2017-05-09T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2016-008262",
         },
         {
            date: "2017-04-02T20:59:00.860000",
            db: "NVD",
            id: "CVE-2016-2404",
         },
         {
            date: "2017-04-07T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201704-193",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-04-11T00:00:00",
            db: "VULHUB",
            id: "VHN-91223",
         },
         {
            date: "2017-05-09T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2016-008262",
         },
         {
            date: "2017-04-11T01:11:21.077000",
            db: "NVD",
            id: "CVE-2016-2404",
         },
         {
            date: "2017-04-07T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201704-193",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201704-193",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei Vulnerability related to authorization, authority, and access control in switch software",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2016-008262",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "permissions and access control",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201704-193",
         },
      ],
      trust: 0.6,
   },
}

var-201706-0187
Vulnerability from variot

The user authentication module in Huawei Campus switches S5700, S5300, S6300, and S6700 with software before V200R001SPH012 and S7700, S9300, and S9700 with software before V200R001SPH015 allows remote attackers to cause a denial of service (device restart) via vectors involving authentication, which trigger an array access violation. Huawei Campus Series Switches are prone to a denial-of-service vulnerability. Attackers can exploit this issue to restart the affected device, denying service to legitimate users. Huawei Campus switches S5700, etc. are all switch products of China's Huawei (Huawei). The user authentication module is a module for user login authentication. The following products and versions are affected: Huawei Campus switches S5700 V200R001SPH012 Version; Campus switches S5300 V200R001SPH012 Version; Campus switches S6300 V200R001SPH012 Version; Campus switches S6700 V200R001SPH012 Version; Campus switches S7700 V200R001SPH012 Version; Campus switches S9300 V200R001SPH012 Version; Campus switches S9700 V200R001SPH012 Version

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201706-0187",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "s6700",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s9700",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s9300",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s7700",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s5700",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s5300",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s6300",
            scope: "lte",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s5300",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r001sph012",
         },
         {
            model: "s5700",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r001sph012",
         },
         {
            model: "s6300",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r001sph012",
         },
         {
            model: "s6700",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r001sph012",
         },
         {
            model: "s7700",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r001sph015",
         },
         {
            model: "s9300",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r001sph015",
         },
         {
            model: "s9700",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r001sph015",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2015-007609",
         },
         {
            db: "NVD",
            id: "CVE-2015-2800",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201504-531",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "v200r001c00spc300",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:campus_s5700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "v200r001c00spc300",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:campus_s5300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "v200r001c00spc300",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:campus_s6300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "v200r001c00spc300",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:campus_s6700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "v200r001c00spc300",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:campus_s7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "v200r001c00spc300",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:campus_s9300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "v200r001c00spc300",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:campus_s9700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2015-2800",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "vhunter",
      sources: [
         {
            db: "BID",
            id: "73355",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201504-531",
         },
      ],
      trust: 0.9,
   },
   cve: "CVE-2015-2800",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 7.8,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2015-2800",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "High",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "VHN-80761",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "HIGH",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.9,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.5,
                  baseSeverity: "High",
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2015-2800",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2015-2800",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201504-531",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULHUB",
                  id: "VHN-80761",
                  trust: 0.1,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-80761",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007609",
         },
         {
            db: "NVD",
            id: "CVE-2015-2800",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201504-531",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The user authentication module in Huawei Campus switches S5700, S5300, S6300, and S6700 with software before V200R001SPH012 and S7700, S9300, and S9700 with software before V200R001SPH015 allows remote attackers to cause a denial of service (device restart) via vectors involving authentication, which trigger an array access violation. Huawei Campus Series Switches are prone to a denial-of-service vulnerability. \nAttackers can exploit this issue to restart the affected device, denying service to legitimate users. Huawei Campus switches S5700, etc. are all switch products of China's Huawei (Huawei). The user authentication module is a module for user login authentication. The following products and versions are affected: Huawei Campus switches S5700 V200R001SPH012 Version; Campus switches S5300 V200R001SPH012 Version; Campus switches S6300 V200R001SPH012 Version; Campus switches S6700 V200R001SPH012 Version; Campus switches S7700 V200R001SPH012 Version; Campus switches S9300 V200R001SPH012 Version; Campus switches S9700 V200R001SPH012 Version",
      sources: [
         {
            db: "NVD",
            id: "CVE-2015-2800",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007609",
         },
         {
            db: "BID",
            id: "73355",
         },
         {
            db: "VULHUB",
            id: "VHN-80761",
         },
      ],
      trust: 1.98,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2015-2800",
            trust: 2.8,
         },
         {
            db: "BID",
            id: "73355",
            trust: 2,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007609",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201504-531",
            trust: 0.7,
         },
         {
            db: "VULHUB",
            id: "VHN-80761",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-80761",
         },
         {
            db: "BID",
            id: "73355",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007609",
         },
         {
            db: "NVD",
            id: "CVE-2015-2800",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201504-531",
         },
      ],
   },
   id: "VAR-201706-0187",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-80761",
         },
      ],
      trust: 0.66499138,
   },
   last_update_date: "2023-12-18T13:29:17.104000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Huawei-SA-20150319-01-Campus switch",
            trust: 0.8,
            url: "http://www.huawei.com/en/psirt/security-advisories/hw-418554",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2015-007609",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-287",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-80761",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007609",
         },
         {
            db: "NVD",
            id: "CVE-2015-2800",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "http://www.securityfocus.com/bid/73355",
         },
         {
            trust: 1.7,
            url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-418554.htm",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2800",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-2800",
         },
         {
            trust: 0.3,
            url: "http://www.huawei.com/",
         },
         {
            trust: 0.3,
            url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/archive/hw-418554.htm",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-80761",
         },
         {
            db: "BID",
            id: "73355",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007609",
         },
         {
            db: "NVD",
            id: "CVE-2015-2800",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201504-531",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-80761",
         },
         {
            db: "BID",
            id: "73355",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007609",
         },
         {
            db: "NVD",
            id: "CVE-2015-2800",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201504-531",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-06-08T00:00:00",
            db: "VULHUB",
            id: "VHN-80761",
         },
         {
            date: "2015-03-19T00:00:00",
            db: "BID",
            id: "73355",
         },
         {
            date: "2017-07-07T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2015-007609",
         },
         {
            date: "2017-06-08T16:29:00.403000",
            db: "NVD",
            id: "CVE-2015-2800",
         },
         {
            date: "2015-03-19T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201504-531",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-06-20T00:00:00",
            db: "VULHUB",
            id: "VHN-80761",
         },
         {
            date: "2015-05-07T17:22:00",
            db: "BID",
            id: "73355",
         },
         {
            date: "2017-07-07T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2015-007609",
         },
         {
            date: "2017-06-20T13:20:13.737000",
            db: "NVD",
            id: "CVE-2015-2800",
         },
         {
            date: "2017-06-09T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201504-531",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201504-531",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei Campus Service operation interruption in user authentication module of switch products  (DoS) Vulnerabilities",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2015-007609",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "authorization issue",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201504-531",
         },
      ],
      trust: 0.6,
   },
}

var-201711-0985
Vulnerability from variot

AC6005 V200R006C10SPC200,AC6605 V200R006C10SPC200,AR1200 with software V200R005C10CP0582T, V200R005C10HP0581T, V200R005C20SPC026T,AR200 with software V200R005C20SPC026T,AR3200 V200R005C20SPC026T,CloudEngine 12800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 5800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 6800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 7800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 8800 with software V100R006C00, V200R001C00,E600 V200R008C00,S12700 with software V200R005C00, V200R006C00, V200R007C00, V200R008C00,S1700 with software V100R006C00, V100R007C00, V200R006C00,S2300 with software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S2700 with software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S5300 with software V100R005C00, V100R006C00, V100R006C01, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S5700 with software V100R005C00, V100R006C00, V100R006C01, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S6300 with software V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R008C00,S6700 with software V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S7700 with software V100R003C00, V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S9300 with software V100R001C00, V100R002C00, V100R003C00, V100R006C00, V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R008C10,S9700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00,Secospace USG6600 V500R001C00SPC050 have a MaxAge LSA vulnerability due to improper OSPF implementation. When the device receives special LSA packets, the LS (Link Status) age would be set to MaxAge, 3600 seconds. An attacker can exploit this vulnerability to poison the route table and launch a DoS attack. plural Huawei The product contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. HuaweiAC6005 and other products are all products of China Huawei. HuaweiAC6005 is an access control device. The CloudEngine 12800 is a data center switch device. The OSPF protocol of several Huawei products has a MaxAgeLSA vulnerability. The following products and versions are affected: Huawei AC6005 V200R006C10SPC200 Version; AC6605 V200R006C10SPC200 Version; AR1200 V200R005C10CP0582T Version, V200R005C10HP0581T Version, V200R005C20SPC026T Version; AR200 V200R005C20SPC026T Version; AR3200 V200R005C20SPC026T Version; CloudEngine 12800 V100R003C00 Version, V100R005C00 Version, V100R005C10 Version, V100R006C00 Version, V200R001C00 Version; CloudEngine 5800 V100R003C00 Version, V100R005C00 Version, V100R005C10 Version, V100R006C00 Version, V200R001C00 Version; CloudEngine 6800 V100R003C00 Version, V100R005C00 Version, V100R005C10 Version, V100R006C00 Version, V200R001C00 Version; CloudEngine 7800 V100R003C00 Version, V100R005C00 Version, V100R005C10 Version, V100R006C00 Version, V200R001C00 Version; CloudEngine 8800 V100R006C00, V200R001C00; E600 V200R008C00; S12700 V200R005C00, V200R006C00, V200R007C00, V200R008C00; S1700

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201711-0985",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "secospace usg6600",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v500r001c30",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "secospace usg6600",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v500r001c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "secospace usg6600",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v500r001c20",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s9700 v200r008c00",
            scope: null,
            trust: 1.2,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c00",
         },
         {
            model: "cloudengine 7800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "ar1200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c20spc026t",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "cloudengine 5800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "ar200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c20spc026t",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c03",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c00",
         },
         {
            model: "ac6005",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c10spc200",
         },
         {
            model: "cloudengine 12800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "cloudengine 7800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r005c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c02",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r001c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "cloudengine 12800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r005c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c05",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "ar3200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c20spc026t",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c00",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c02",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c10",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "cloudengine 5800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c02",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r003c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c10",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c01",
         },
         {
            model: "cloudengine 7800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c02",
         },
         {
            model: "cloudengine 12800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r003c00",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r005c00",
         },
         {
            model: "e600",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "cloudengine 8800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c10",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "cloudengine 12800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c01",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "cloudengine 7800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r005c10",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "cloudengine 6800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "cloudengine 5800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r003c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r005c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c01",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "cloudengine 12800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r005c10",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "cloudengine 6800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r005c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c01",
         },
         {
            model: "ar1200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c10cp0582t",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c03",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c01",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c01",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "ar1200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c10hp0581t",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c02",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c01",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r003c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c02",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "cloudengine 8800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "cloudengine 5800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r005c10",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c03",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c10",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c10",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c01",
         },
         {
            model: "cloudengine 6800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r003c00",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c01",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r005c00",
         },
         {
            model: "cloudengine 5800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r005c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "cloudengine 7800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r003c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r007c00",
         },
         {
            model: "cloudengine 6800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r005c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c05",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c10",
         },
         {
            model: "ac6605",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c10spc200",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c02",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c02",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c10",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c03",
         },
         {
            model: "cloudengine 6800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r005c10",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r002c00",
         },
         {
            model: "ac6005",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ac6605",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar1200",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar200",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar3200",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "cloudengine 12800",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "cloudengine 5800",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "cloudengine 6800",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "cloudengine 7800",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "cloudengine 8800",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "e600",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "secospace usg6600",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "secospace usg6600 v500r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "cloudengine v100r003c00",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "12800",
         },
         {
            model: "cloudengine v100r005c00",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "12800",
         },
         {
            model: "cloudengine v100r005c10",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "12800",
         },
         {
            model: "s12700 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "cloudengine v100r006c00",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "12800",
         },
         {
            model: "cloudengine v100r005c00",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "5800",
         },
         {
            model: "cloudengine v100r005c10",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "5800",
         },
         {
            model: "cloudengine v100r006c00",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "5800",
         },
         {
            model: "cloudengine v100r005c00",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "6800",
         },
         {
            model: "cloudengine v100r005c10",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "6800",
         },
         {
            model: "cloudengine v100r006c00",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "6800",
         },
         {
            model: "cloudengine v100r005c00",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "7800",
         },
         {
            model: "cloudengine v100r005c10",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "7800",
         },
         {
            model: "cloudengine v100r006c00",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "7800",
         },
         {
            model: "cloudengine v100r006c00",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "8800",
         },
         {
            model: "cloudengine v100r003c00",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "5800",
         },
         {
            model: "cloudengine v100r003c00",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "6800",
         },
         {
            model: "cloudengine v100r003c00",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "7800",
         },
         {
            model: "cloudengine v200r001c00",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "12800",
         },
         {
            model: "cloudengine v200r001c00",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "6800",
         },
         {
            model: "cloudengine v200r001c00",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "7800",
         },
         {
            model: "cloudengine v200r001c00",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "8800",
         },
         {
            model: "ac6005 v200r006c10spc200",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar1200 v200r005c10cp0582t",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar200 v200r005c20spc026t",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar3200 v200r005c20spc026t",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "secospace usg6600 v500r001c20",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "secospace usg6600 v500r001c30",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ac6605 v200r006c10spc200",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar1200 v200r005c10hp0581t",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar1200 v200r005c20spc026t",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "cloudengine v200r001c00",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "5800",
         },
         {
            model: "e600 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700 v100r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700 v100r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v100r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v100r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v100r006c05",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v200r003c02",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v200r003c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v200r005c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v200r005c02",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v200r005c03",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v100r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v100r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v100r006c03",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v100r006c05",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r003c02",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r003c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r005c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r005c02",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r005c03",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v100r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v100r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v100r006c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r001c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r003c02",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r003c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v100r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v100r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v100r006c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r001c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r003c02",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r003c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v100r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r001c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r003c02",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r003c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v100r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r001c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r003c02",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r003c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v100r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v100r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r001c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v100r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v100r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v100r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v100r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r008c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-37678",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-010631",
         },
         {
            db: "NVD",
            id: "CVE-2017-8147",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201711-982",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ac6005_firmware:v200r006c10spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ac6005:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ac6605_firmware:v200r006c10spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ac6605:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r005c20spc026t:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r005c10hp0581t:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r005c10cp0582t:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r005c20spc026t:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r005c20spc026t:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cloudengine_12800_firmware:v100r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cloudengine_12800_firmware:v100r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cloudengine_12800_firmware:v100r005c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cloudengine_12800_firmware:v100r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:cloudengine_12800:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cloudengine_5800_firmware:v100r005c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cloudengine_5800_firmware:v100r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cloudengine_5800_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cloudengine_5800_firmware:v100r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cloudengine_5800_firmware:v100r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:cloudengine_5800:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cloudengine_6800_firmware:v100r005c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cloudengine_6800_firmware:v100r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cloudengine_6800_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cloudengine_6800_firmware:v100r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cloudengine_6800_firmware:v100r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:cloudengine_6800:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cloudengine_7800_firmware:v100r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cloudengine_7800_firmware:v100r005c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cloudengine_7800_firmware:v100r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cloudengine_7800_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cloudengine_7800_firmware:v100r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:cloudengine_7800:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cloudengine_8800_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cloudengine_8800_firmware:v100r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:cloudengine_8800:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:e600_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:e600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v100r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v100r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v200r005c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v200r005c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v200r005c03:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v100r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v100r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v100r006c03:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v100r006c05:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v200r003c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v200r003c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r005c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r005c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r005c03:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v100r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v100r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v100r006c03:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r003c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v100r006c05:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r003c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r003c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r003c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v100r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v100r006c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r001c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v100r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r003c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r003c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v100r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v100r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v100r006c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r001c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r003c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r003c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v100r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r001c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v100r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r001c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r003c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r003c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r001c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v100r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v100r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v100r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v100r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v100r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v100r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r008c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2017-8147",
         },
      ],
   },
   cve: "CVE-2017-8147",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 5,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2017-8147",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "CNVD-2017-37678",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "VHN-116350",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.9,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.5,
                  baseSeverity: "High",
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2017-8147",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2017-8147",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2017-37678",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201711-982",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-116350",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-37678",
         },
         {
            db: "VULHUB",
            id: "VHN-116350",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-010631",
         },
         {
            db: "NVD",
            id: "CVE-2017-8147",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201711-982",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "AC6005 V200R006C10SPC200,AC6605 V200R006C10SPC200,AR1200 with software V200R005C10CP0582T, V200R005C10HP0581T, V200R005C20SPC026T,AR200 with software V200R005C20SPC026T,AR3200 V200R005C20SPC026T,CloudEngine 12800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 5800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 6800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 7800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 8800 with software V100R006C00, V200R001C00,E600 V200R008C00,S12700 with software V200R005C00, V200R006C00, V200R007C00, V200R008C00,S1700 with software V100R006C00, V100R007C00, V200R006C00,S2300 with software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S2700 with software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S5300 with software V100R005C00, V100R006C00, V100R006C01, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S5700 with software V100R005C00, V100R006C00, V100R006C01, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S6300 with software V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R008C00,S6700 with software V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S7700 with software V100R003C00, V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S9300 with software V100R001C00, V100R002C00, V100R003C00, V100R006C00, V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R008C10,S9700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00,Secospace USG6600 V500R001C00SPC050 have a MaxAge LSA vulnerability due to improper OSPF implementation. When the device receives special LSA packets, the LS (Link Status) age would be set to MaxAge, 3600 seconds. An attacker can exploit this vulnerability to poison the route table and launch a DoS attack. plural Huawei The product contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. HuaweiAC6005 and other products are all products of China Huawei. HuaweiAC6005 is an access control device. The CloudEngine 12800 is a data center switch device. The OSPF protocol of several Huawei products has a MaxAgeLSA vulnerability. The following products and versions are affected: Huawei AC6005 V200R006C10SPC200 Version; AC6605 V200R006C10SPC200 Version; AR1200 V200R005C10CP0582T Version, V200R005C10HP0581T Version, V200R005C20SPC026T Version; AR200 V200R005C20SPC026T Version; AR3200 V200R005C20SPC026T Version; CloudEngine 12800 V100R003C00 Version, V100R005C00 Version, V100R005C10 Version, V100R006C00 Version, V200R001C00 Version; CloudEngine 5800 V100R003C00 Version, V100R005C00 Version, V100R005C10 Version, V100R006C00 Version, V200R001C00 Version; CloudEngine 6800 V100R003C00 Version, V100R005C00 Version, V100R005C10 Version, V100R006C00 Version, V200R001C00 Version; CloudEngine 7800 V100R003C00 Version, V100R005C00 Version, V100R005C10 Version, V100R006C00 Version, V200R001C00 Version; CloudEngine 8800 V100R006C00, V200R001C00; E600 V200R008C00; S12700 V200R005C00, V200R006C00, V200R007C00, V200R008C00; S1700",
      sources: [
         {
            db: "NVD",
            id: "CVE-2017-8147",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-010631",
         },
         {
            db: "CNVD",
            id: "CNVD-2017-37678",
         },
         {
            db: "VULHUB",
            id: "VHN-116350",
         },
      ],
      trust: 2.25,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2017-8147",
            trust: 3.1,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-010631",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201711-982",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2017-37678",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-116350",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-37678",
         },
         {
            db: "VULHUB",
            id: "VHN-116350",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-010631",
         },
         {
            db: "NVD",
            id: "CVE-2017-8147",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201711-982",
         },
      ],
   },
   id: "VAR-201711-0985",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-37678",
         },
         {
            db: "VULHUB",
            id: "VHN-116350",
         },
      ],
      trust: 1.538758527333333,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-37678",
         },
      ],
   },
   last_update_date: "2023-12-18T13:14:05.774000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "huawei-sa-20170720-01-ospf",
            trust: 0.8,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170720-01-ospf-en",
         },
         {
            title: "A patch for the MaxAgeLSA vulnerability exists in the OSPF protocol of various Huawei products.",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/111227",
         },
         {
            title: "Multiple Huawei Product security vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=76692",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-37678",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-010631",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201711-982",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-20",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-116350",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-010631",
         },
         {
            db: "NVD",
            id: "CVE-2017-8147",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170720-01-ospf-en",
         },
         {
            trust: 0.8,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-8147",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-8147",
         },
         {
            trust: 0.6,
            url: "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20170720-01-ospf-cn",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-37678",
         },
         {
            db: "VULHUB",
            id: "VHN-116350",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-010631",
         },
         {
            db: "NVD",
            id: "CVE-2017-8147",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201711-982",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2017-37678",
         },
         {
            db: "VULHUB",
            id: "VHN-116350",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-010631",
         },
         {
            db: "NVD",
            id: "CVE-2017-8147",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201711-982",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-12-20T00:00:00",
            db: "CNVD",
            id: "CNVD-2017-37678",
         },
         {
            date: "2017-11-22T00:00:00",
            db: "VULHUB",
            id: "VHN-116350",
         },
         {
            date: "2017-12-20T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2017-010631",
         },
         {
            date: "2017-11-22T19:29:03.257000",
            db: "NVD",
            id: "CVE-2017-8147",
         },
         {
            date: "2017-11-23T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201711-982",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-12-20T00:00:00",
            db: "CNVD",
            id: "CNVD-2017-37678",
         },
         {
            date: "2017-12-08T00:00:00",
            db: "VULHUB",
            id: "VHN-116350",
         },
         {
            date: "2017-12-20T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2017-010631",
         },
         {
            date: "2017-12-08T14:47:28.643000",
            db: "NVD",
            id: "CVE-2017-8147",
         },
         {
            date: "2020-11-06T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201711-982",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201711-982",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei Vulnerability related to input validation in products",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2017-010631",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "input validation error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201711-982",
         },
      ],
      trust: 0.6,
   },
}

var-202103-0520
Vulnerability from variot

There is a use-after-free vulnerability in a Huawei product. A module cannot deal with specific operations in special scenarios. Attackers can exploit this vulnerability by performing malicious operations. This can cause memory use-after-free, compromising normal service. Affected product include some versions of NIP6300, NIP6600, NIP6800, S1700, S2700, S5700, S6700 , S7700, S9700, Secospace USG6300, Secospace USG6500, Secospace USG6600 and USG9500. plural Huawei The product contains a vulnerability related to the use of freed memory.Denial of service (DoS) It may be put into a state

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202103-0520",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c00spc100",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00spc300",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c00spc100",
         },
         {
            model: "secospace usg6500",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c60",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c00",
         },
         {
            model: "secospace usg6600",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c60",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c00",
         },
         {
            model: "secospace usg6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c30",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "usg9500",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c60",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00spc500",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "nip6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c60",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c01b102",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "secospace usg6500",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c30",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00spc300",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c01",
         },
         {
            model: "secospace usg6600",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c30",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00spc300",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00spc300",
         },
         {
            model: "usg9500",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c30",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10spc100",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c00spc100",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c00spc100",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c00spc100",
         },
         {
            model: "nip6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c30",
         },
         {
            model: "nip6800",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c60",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c00spc100",
         },
         {
            model: "nip6600",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c30",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00spc200",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c01b102",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10spc100",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00spc300",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c01",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00spc300",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00spc300",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "secospace usg6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c60",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c00spc100",
         },
         {
            model: "s6700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "nip6800",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "nip6300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "nip6600",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-004609",
         },
         {
            db: "NVD",
            id: "CVE-2021-22321",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c60:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r007c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r007c01b102:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r010c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r011c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r011c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r009c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r009c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r010c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r011c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r011c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r010c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r011c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r011c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r010c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r011c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r011c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r011c10spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r010c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r011c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r011c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r011c10spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r010c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r011c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r011c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r007c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r007c01b102:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r010c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r011c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r011c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c60:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c60:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-22321",
         },
      ],
   },
   cve: "CVE-2021-22321",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 5,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2021-22321",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.9,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "LOW",
                  baseScore: 5.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.9,
                  impactScore: 1.4,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "Low",
                  baseScore: 5.3,
                  baseSeverity: "Medium",
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2021-22321",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2021-22321",
                  trust: 1.8,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202103-1277",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULMON",
                  id: "CVE-2021-22321",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2021-22321",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-004609",
         },
         {
            db: "NVD",
            id: "CVE-2021-22321",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202103-1277",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "There is a use-after-free vulnerability in a Huawei product. A module cannot deal with specific operations in special scenarios. Attackers can exploit this vulnerability by performing malicious operations. This can cause memory use-after-free, compromising normal service. Affected product include some versions of NIP6300, NIP6600, NIP6800, S1700, S2700, S5700, S6700 , S7700, S9700, Secospace USG6300, Secospace USG6500, Secospace USG6600 and USG9500. plural Huawei The product contains a vulnerability related to the use of freed memory.Denial of service (DoS) It may be put into a state",
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-22321",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-004609",
         },
         {
            db: "VULMON",
            id: "CVE-2021-22321",
         },
      ],
      trust: 1.71,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2021-22321",
            trust: 2.5,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-004609",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202103-1277",
            trust: 0.6,
         },
         {
            db: "VULMON",
            id: "CVE-2021-22321",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2021-22321",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-004609",
         },
         {
            db: "NVD",
            id: "CVE-2021-22321",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202103-1277",
         },
      ],
   },
   id: "VAR-202103-0520",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.47662309363636357,
   },
   last_update_date: "2023-12-18T14:00:12.591000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "huawei-sa-20210210-01-uaf",
            trust: 0.8,
            url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-01-uaf-en",
         },
         {
            title: "Huawei Repair measures for resource management errors and vulnerabilities in multiple products",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=145149",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-004609",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202103-1277",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-416",
            trust: 1,
         },
         {
            problemtype: "Use of freed memory (CWE-416) [NVD Evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-004609",
         },
         {
            db: "NVD",
            id: "CVE-2021-22321",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-01-uaf-en",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2021-22321",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/416.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2021-22321",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-004609",
         },
         {
            db: "NVD",
            id: "CVE-2021-22321",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202103-1277",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULMON",
            id: "CVE-2021-22321",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-004609",
         },
         {
            db: "NVD",
            id: "CVE-2021-22321",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202103-1277",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-03-22T00:00:00",
            db: "VULMON",
            id: "CVE-2021-22321",
         },
         {
            date: "2021-11-25T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2021-004609",
         },
         {
            date: "2021-03-22T20:15:17.613000",
            db: "NVD",
            id: "CVE-2021-22321",
         },
         {
            date: "2021-03-22T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202103-1277",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-03-24T00:00:00",
            db: "VULMON",
            id: "CVE-2021-22321",
         },
         {
            date: "2021-11-25T06:44:00",
            db: "JVNDB",
            id: "JVNDB-2021-004609",
         },
         {
            date: "2021-03-24T20:32:07.130000",
            db: "NVD",
            id: "CVE-2021-22321",
         },
         {
            date: "2021-08-16T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202103-1277",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202103-1277",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei  Product Free Memory Usage Vulnerability",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-004609",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "resource management error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202103-1277",
         },
      ],
      trust: 0.6,
   },
}

var-201912-0913
Vulnerability from variot

There is a weak algorithm vulnerability in some Huawei products. The affected products use weak algorithms by default. Attackers may exploit the vulnerability to cause information leaks. plural Huawei The product contains a vulnerability related to the use of cryptographic algorithms.Information may be obtained. Huawei S12700, etc. are all enterprise-class switch products from Huawei.

A number of Huawei products have encryption problem vulnerabilities

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201912-0913",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r012c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c02",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r012c20",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c00",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c20",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c10",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r012c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c01",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r012c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r012c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c00",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c10",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c02",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c01",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c03",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r012c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c01",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r012c00",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r012c20",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r012c00",
         },
         {
            model: "s12700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r007c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r007c20",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r011c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r012c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700 v200r006c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700 v200r011c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700 v200r012c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700 v200r012c20",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r006c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r011c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r011c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r012c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r005c02",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r005c03",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r011c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r011c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r012c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r012c20",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r005c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r005c02",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r011c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r011c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r012c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r011c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r012c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r007c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r011c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r012c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2020-02964",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-013188",
         },
         {
            db: "NVD",
            id: "CVE-2019-19397",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r007c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r007c20:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r012c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r006c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r012c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r012c20:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r006c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r011c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r012c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r005c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r005c03:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r011c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r012c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r012c20:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r005c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r005c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r011c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r012c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r012c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r007c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r012c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2019-19397",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The vulnerability was discovered by Huawei internal testing.",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201912-194",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2019-19397",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 5,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2019-19397",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  id: "CNVD-2020-02964",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.6,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 3.9,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 7.5,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2019-19397",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2019-19397",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2020-02964",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201912-194",
                  trust: 0.6,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2020-02964",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-013188",
         },
         {
            db: "NVD",
            id: "CVE-2019-19397",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201912-194",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "There is a weak algorithm vulnerability in some Huawei products. The affected products use weak algorithms by default. Attackers may exploit the vulnerability to cause information leaks. plural Huawei The product contains a vulnerability related to the use of cryptographic algorithms.Information may be obtained. Huawei S12700, etc. are all enterprise-class switch products from Huawei. \n\nA number of Huawei products have encryption problem vulnerabilities",
      sources: [
         {
            db: "NVD",
            id: "CVE-2019-19397",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-013188",
         },
         {
            db: "CNVD",
            id: "CNVD-2020-02964",
         },
      ],
      trust: 2.16,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2019-19397",
            trust: 3,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-013188",
            trust: 0.8,
         },
         {
            db: "CNVD",
            id: "CNVD-2020-02964",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201912-194",
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2020-02964",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-013188",
         },
         {
            db: "NVD",
            id: "CVE-2019-19397",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201912-194",
         },
      ],
   },
   id: "VAR-201912-0913",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2020-02964",
         },
      ],
      trust: 1.5410781591666667,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2020-02964",
         },
      ],
   },
   last_update_date: "2023-12-18T13:01:57.204000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "huawei-sa-20191204-01-vrp",
            trust: 0.8,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-01-vrp-en",
         },
         {
            title: "Patch for Vulnerability in multiple Huawei products",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/197263",
         },
         {
            title: "Multiple Huawei Product encryption problem vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=105645",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2020-02964",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-013188",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201912-194",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "NVD-CWE-noinfo",
            trust: 1,
         },
         {
            problemtype: "CWE-327",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2019-013188",
         },
         {
            db: "NVD",
            id: "CVE-2019-19397",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-19397",
         },
         {
            trust: 1.6,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-01-vrp-en",
         },
         {
            trust: 0.8,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-19397",
         },
         {
            trust: 0.6,
            url: "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20191204-01-vrp-cn",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2020-02964",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-013188",
         },
         {
            db: "NVD",
            id: "CVE-2019-19397",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201912-194",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2020-02964",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-013188",
         },
         {
            db: "NVD",
            id: "CVE-2019-19397",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201912-194",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2020-01-20T00:00:00",
            db: "CNVD",
            id: "CNVD-2020-02964",
         },
         {
            date: "2019-12-23T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2019-013188",
         },
         {
            date: "2019-12-13T15:15:11.113000",
            db: "NVD",
            id: "CVE-2019-19397",
         },
         {
            date: "2019-12-04T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201912-194",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2020-01-21T00:00:00",
            db: "CNVD",
            id: "CNVD-2020-02964",
         },
         {
            date: "2019-12-23T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2019-013188",
         },
         {
            date: "2021-07-21T11:39:23.747000",
            db: "NVD",
            id: "CVE-2019-19397",
         },
         {
            date: "2020-03-26T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201912-194",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201912-194",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei Vulnerabilities related to the use of cryptographic algorithms in products",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2019-013188",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "encryption problem",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201912-194",
         },
      ],
      trust: 0.6,
   },
}

var-201801-0087
Vulnerability from variot

Multiple Huawei Campus switches allow remote attackers to enumerate usernames via vectors involving use of SSH by the maintenance terminal. plural Huawei Campus A switch product contains an information disclosure vulnerability.Information may be obtained. Huawei Campus Series Switches is China's Huawei series of Campus switches. Huawei Campus Series Switches has a user enumeration vulnerability that allows an attacker to exploit a vulnerability to obtain a valid username and initiate further attacks. An attacker may leverage this issue to harvest valid usernames, which may aid in further attacks. A remote attacker can use this vulnerability to log in to the server through SSH to guess whether a user name exists on the switch device based on the information returned by the server

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201801-0087",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "s3700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r006c05",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r002c00spc300",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00spc500",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r006c05",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r002c00spc300",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r006c05",
         },
         {
            model: "s3300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r006c05",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc500",
         },
         {
            model: "s9300e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc300",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc500",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc300",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "s9300e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc500",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc300",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc300",
         },
         {
            model: "s9300e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc300",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc300",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s2300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s3300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s3700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300e",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus series switches",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2014-05162",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008459",
         },
         {
            db: "NVD",
            id: "CVE-2014-5394",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201408-326",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300e_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300e_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300e_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9300e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v100r006c05:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v100r006c05:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s3300_firmware:v100r006c05:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s3300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s3700_firmware:v100r006c05:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s3700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2014-5394",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Huawei",
      sources: [
         {
            db: "BID",
            id: "69302",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201408-326",
         },
      ],
      trust: 0.9,
   },
   cve: "CVE-2014-5394",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Medium",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 4.3,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2014-5394",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "NONE",
                  baseScore: 5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  id: "CNVD-2014-05162",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  id: "VHN-73335",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:M/AU:N/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 5.9,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 2.2,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.0",
               },
               {
                  attackComplexity: "High",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 5.9,
                  baseSeverity: "Medium",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2014-5394",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2014-5394",
                  trust: 1.8,
                  value: "MEDIUM",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2014-05162",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201408-326",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-73335",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2014-05162",
         },
         {
            db: "VULHUB",
            id: "VHN-73335",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008459",
         },
         {
            db: "NVD",
            id: "CVE-2014-5394",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201408-326",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Multiple Huawei Campus switches allow remote attackers to enumerate usernames via vectors involving use of SSH by the maintenance terminal. plural Huawei Campus A switch product contains an information disclosure vulnerability.Information may be obtained. Huawei Campus Series Switches is China's Huawei series of Campus switches. Huawei Campus Series Switches has a user enumeration vulnerability that allows an attacker to exploit a vulnerability to obtain a valid username and initiate further attacks. \nAn attacker may leverage this issue to harvest valid usernames, which may aid in further attacks. A remote attacker can use this vulnerability to log in to the server through SSH to guess whether a user name exists on the switch device based on the information returned by the server",
      sources: [
         {
            db: "NVD",
            id: "CVE-2014-5394",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008459",
         },
         {
            db: "CNVD",
            id: "CNVD-2014-05162",
         },
         {
            db: "BID",
            id: "69302",
         },
         {
            db: "VULHUB",
            id: "VHN-73335",
         },
      ],
      trust: 2.52,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2014-5394",
            trust: 2.8,
         },
         {
            db: "BID",
            id: "69302",
            trust: 2.6,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008459",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201408-326",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2014-05162",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-73335",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2014-05162",
         },
         {
            db: "VULHUB",
            id: "VHN-73335",
         },
         {
            db: "BID",
            id: "69302",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008459",
         },
         {
            db: "NVD",
            id: "CVE-2014-5394",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201408-326",
         },
      ],
   },
   id: "VAR-201801-0087",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2014-05162",
         },
         {
            db: "VULHUB",
            id: "VHN-73335",
         },
      ],
      trust: 1.3045695790909089,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2014-05162",
         },
      ],
   },
   last_update_date: "2023-12-18T13:24:12.542000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Huawei-SA-20140820-01-Campus Switch",
            trust: 0.8,
            url: "http://www.huawei.com/us/psirt/security-advisories/2014/hw-362701",
         },
         {
            title: "Huawei Campus Series Switches User Enumeration Patch",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/49234",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2014-05162",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008459",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-200",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-73335",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008459",
         },
         {
            db: "NVD",
            id: "CVE-2014-5394",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.3,
            url: "http://www.securityfocus.com/bid/69302",
         },
         {
            trust: 1.7,
            url: "http://www.huawei.com/us/psirt/security-advisories/2014/hw-362701",
         },
         {
            trust: 1.7,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/97763",
         },
         {
            trust: 0.8,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-5394",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-5394",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2014-05162",
         },
         {
            db: "VULHUB",
            id: "VHN-73335",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008459",
         },
         {
            db: "NVD",
            id: "CVE-2014-5394",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201408-326",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2014-05162",
         },
         {
            db: "VULHUB",
            id: "VHN-73335",
         },
         {
            db: "BID",
            id: "69302",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008459",
         },
         {
            db: "NVD",
            id: "CVE-2014-5394",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201408-326",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2014-08-22T00:00:00",
            db: "CNVD",
            id: "CNVD-2014-05162",
         },
         {
            date: "2018-01-08T00:00:00",
            db: "VULHUB",
            id: "VHN-73335",
         },
         {
            date: "2014-08-20T00:00:00",
            db: "BID",
            id: "69302",
         },
         {
            date: "2018-02-09T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2014-008459",
         },
         {
            date: "2018-01-08T19:29:00.610000",
            db: "NVD",
            id: "CVE-2014-5394",
         },
         {
            date: "2014-08-21T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201408-326",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2014-08-22T00:00:00",
            db: "CNVD",
            id: "CNVD-2014-05162",
         },
         {
            date: "2018-01-29T00:00:00",
            db: "VULHUB",
            id: "VHN-73335",
         },
         {
            date: "2015-03-19T09:24:00",
            db: "BID",
            id: "69302",
         },
         {
            date: "2018-02-09T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2014-008459",
         },
         {
            date: "2018-01-29T19:03:59.157000",
            db: "NVD",
            id: "CVE-2014-5394",
         },
         {
            date: "2018-01-09T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201408-326",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201408-326",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei Campus Information disclosure vulnerability in switch products",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2014-008459",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "information disclosure",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201408-326",
         },
      ],
      trust: 0.6,
   },
}

var-201804-0646
Vulnerability from variot

S12700 V200R005C00, V200R006C00, V200R006C01, V200R007C00, V200R007C01, V200R007C20, V200R008C00, V200R008C06, V200R009C00, V200R010C00, S7700 V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R006C01, V200R007C00, V200R007C01, V200R008C00, V200R008C06, V200R009C00, V200R010C00, S9700 V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R006C01, V200R007C00, V200R007C01, V200R008C00, V200R009C00, V200R010C00 have an improper authorization vulnerability on Huawei switch products. The system incorrectly performs an authorization check when a normal user attempts to access certain information which is supposed to be accessed only by authenticated user. Successful exploit could cause information disclosure. HuaweiS12700 is an enterprise-class switch product from China's Huawei company. The Huawei S7700 and S9700 are Huawei's intelligent routing switches. A security vulnerability exists in the Huawei S12700, S7700, and S9700. The following products are affected: Huawei S12700 V200R005C00 Version, V200R006C00 Version, V200R006C01 Version, V200R007C00 Version, V200R007C01 Version, V200R007C20 Version, V200R008C00 Version, V200R008C06 Version, V200R009C00 Version, V200R010C00 Version; S7700 V200R001C00 Version, V200R001C01 Version, V200R002C00 Version, V200R003C00 Version, V200R005C00 Version, V200R006C00 Version, V200R006C01 Version, V200R007C00 Version, V200R007C01 Version, V200R008C00 Version, V200R008C06 version version, V200R009C00 Version, V200R010C00 Version; S9700 V200R001C00 Version, V200R001C01 Version, V200R002C00 Version, V200R003C00 Version, V200R005C00 Version, V200R006C00, V200R006C01, V200R007C00 Version , version V200R007C01, version V200R008C00, version V200R009C00, version V200R010C00

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201804-0646",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r006c01",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r007c01",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c20",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c01",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c06",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c01",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c01",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c06",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c01",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c01",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c01",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s12700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r007c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r001c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r007c20",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r007c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r006c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r008c06",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r006c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r007c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r008c06",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r001c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r006c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-06688",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-013294",
         },
         {
            db: "NVD",
            id: "CVE-2017-15327",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201804-530",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r006c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r007c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r007c20:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r008c06:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r006c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r001c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r007c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r008c06:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r006c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r001c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r007c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2017-15327",
         },
      ],
   },
   cve: "CVE-2017-15327",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 4,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "Single",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 4,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2017-15327",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.9,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  id: "CNVD-2018-06688",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.6,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 4,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8,
                  id: "VHN-106138",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:S/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitabilityScore: 2.8,
                  impactScore: 1.4,
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
                  version: "3.0",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 4.3,
                  baseSeverity: "Medium",
                  confidentialityImpact: "Low",
                  exploitabilityScore: null,
                  id: "CVE-2017-15327",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "Low",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2017-15327",
                  trust: 1.8,
                  value: "MEDIUM",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2018-06688",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201804-530",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-106138",
                  trust: 0.1,
                  value: "MEDIUM",
               },
               {
                  author: "VULMON",
                  id: "CVE-2017-15327",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-06688",
         },
         {
            db: "VULHUB",
            id: "VHN-106138",
         },
         {
            db: "VULMON",
            id: "CVE-2017-15327",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-013294",
         },
         {
            db: "NVD",
            id: "CVE-2017-15327",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201804-530",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "S12700 V200R005C00, V200R006C00, V200R006C01, V200R007C00, V200R007C01, V200R007C20, V200R008C00, V200R008C06, V200R009C00, V200R010C00, S7700 V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R006C01, V200R007C00, V200R007C01, V200R008C00, V200R008C06, V200R009C00, V200R010C00, S9700 V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R006C01, V200R007C00, V200R007C01, V200R008C00, V200R009C00, V200R010C00 have an improper authorization vulnerability on Huawei switch products. The system incorrectly performs an authorization check when a normal user attempts to access certain information which is supposed to be accessed only by authenticated user. Successful exploit could cause information disclosure. HuaweiS12700 is an enterprise-class switch product from China's Huawei company. The Huawei S7700 and S9700 are Huawei's intelligent routing switches. A security vulnerability exists in the Huawei S12700, S7700, and S9700. The following products are affected: Huawei S12700 V200R005C00 Version, V200R006C00 Version, V200R006C01 Version, V200R007C00 Version, V200R007C01 Version, V200R007C20 Version, V200R008C00 Version, V200R008C06 Version, V200R009C00 Version, V200R010C00 Version; S7700 V200R001C00 Version, V200R001C01 Version, V200R002C00 Version, V200R003C00 Version,  V200R005C00 Version, V200R006C00 Version, V200R006C01 Version, V200R007C00 Version, V200R007C01 Version, V200R008C00 Version, V200R008C06 version version, V200R009C00 Version, V200R010C00 Version; S9700 V200R001C00 Version, V200R001C01 Version, V200R002C00 Version, V200R003C00 Version, V200R005C00 Version, V200R006C00, V200R006C01, V200R007C00 Version , version V200R007C01, version V200R008C00, version V200R009C00, version V200R010C00",
      sources: [
         {
            db: "NVD",
            id: "CVE-2017-15327",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-013294",
         },
         {
            db: "CNVD",
            id: "CNVD-2018-06688",
         },
         {
            db: "VULHUB",
            id: "VHN-106138",
         },
         {
            db: "VULMON",
            id: "CVE-2017-15327",
         },
      ],
      trust: 2.34,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2017-15327",
            trust: 3.2,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-013294",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201804-530",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2018-06688",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-106138",
            trust: 0.1,
         },
         {
            db: "VULMON",
            id: "CVE-2017-15327",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-06688",
         },
         {
            db: "VULHUB",
            id: "VHN-106138",
         },
         {
            db: "VULMON",
            id: "CVE-2017-15327",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-013294",
         },
         {
            db: "NVD",
            id: "CVE-2017-15327",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201804-530",
         },
      ],
   },
   id: "VAR-201804-0646",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-06688",
         },
         {
            db: "VULHUB",
            id: "VHN-106138",
         },
      ],
      trust: 1.6275098991304346,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-06688",
         },
      ],
   },
   last_update_date: "2023-12-18T13:28:57.668000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "huawei-sa-20180328-01-authentication",
            trust: 0.8,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180328-01-authentication-en",
         },
         {
            title: "Patches for improperly exploited vulnerabilities in various Huawei switches",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/124285",
         },
         {
            title: "Huawei S12700 , S7700  and S9700 Security vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=83292",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-06688",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-013294",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201804-530",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-200",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-106138",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-013294",
         },
         {
            db: "NVD",
            id: "CVE-2017-15327",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.8,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180328-01-authentication-en",
         },
         {
            trust: 0.8,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-15327",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-15327",
         },
         {
            trust: 0.6,
            url: "http://www.huawei.com/cn/psirt/security-advisories/2018/huawei-sa-20180328-01-authentication-cn",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/200.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-06688",
         },
         {
            db: "VULHUB",
            id: "VHN-106138",
         },
         {
            db: "VULMON",
            id: "CVE-2017-15327",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-013294",
         },
         {
            db: "NVD",
            id: "CVE-2017-15327",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201804-530",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2018-06688",
         },
         {
            db: "VULHUB",
            id: "VHN-106138",
         },
         {
            db: "VULMON",
            id: "CVE-2017-15327",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-013294",
         },
         {
            db: "NVD",
            id: "CVE-2017-15327",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201804-530",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2018-03-29T00:00:00",
            db: "CNVD",
            id: "CNVD-2018-06688",
         },
         {
            date: "2018-04-11T00:00:00",
            db: "VULHUB",
            id: "VHN-106138",
         },
         {
            date: "2018-04-11T00:00:00",
            db: "VULMON",
            id: "CVE-2017-15327",
         },
         {
            date: "2018-06-19T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2017-013294",
         },
         {
            date: "2018-04-11T17:29:00.147000",
            db: "NVD",
            id: "CVE-2017-15327",
         },
         {
            date: "2018-04-12T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201804-530",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2018-03-29T00:00:00",
            db: "CNVD",
            id: "CNVD-2018-06688",
         },
         {
            date: "2018-05-23T00:00:00",
            db: "VULHUB",
            id: "VHN-106138",
         },
         {
            date: "2018-05-23T00:00:00",
            db: "VULMON",
            id: "CVE-2017-15327",
         },
         {
            date: "2018-06-19T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2017-013294",
         },
         {
            date: "2018-05-23T14:26:57.757000",
            db: "NVD",
            id: "CVE-2017-15327",
         },
         {
            date: "2018-04-12T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201804-530",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201804-530",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei Information disclosure vulnerability in products",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2017-013294",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "information disclosure",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201804-530",
         },
      ],
      trust: 0.6,
   },
}

var-202106-0619
Vulnerability from variot

There has a license management vulnerability in some Huawei products. An attacker with high privilege needs to perform specific operations to exploit the vulnerability on the affected device. Due to improper license management of the device, as a result, the license file can be applied and affect integrity of the device. Affected product versions include:S12700 V200R007C01,V200R007C01B102,V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S1700 V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S2700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S5700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100;S6700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100;S7700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S9700 V200R007C01,V200R007C01B102,V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10. plural Huawei The product contains unspecified vulnerabilities.Information may be tampered with. Huawei S12700, etc. are all enterprise-class switch products of China's Huawei (Huawei) company

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0619",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c00spc100",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00spc300",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c00spc100",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c00",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c01b102",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00spc300",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c01",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00spc300",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00spc300",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10spc100",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c00spc100",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c00spc100",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c00spc100",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c00spc100",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c01b102",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10spc100",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00spc300",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c01",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00spc300",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00spc300",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c00spc100",
         },
         {
            model: "s12700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r007c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r011c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r007c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r011c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700 v200r011c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r011c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r011c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r011c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r011c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r011c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r011c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r010c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r007c01b102",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r010c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r011c00spc100",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700 v200r010c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700 v200r011c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700 v200r011c00spc100",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r011c00spc100",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r010c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r010c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r011c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r011c00spc100",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r011c10spc100",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r011c00spc100",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r011c10spc100",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r010c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r011c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r011c00spc100",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r007c01b102",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r010c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r011c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r011c00spc100",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r011c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2021-84913",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008864",
         },
         {
            db: "NVD",
            id: "CVE-2021-22329",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r007c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r007c01b102:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r010c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r011c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r011c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r010c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r011c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r011c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r010c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r011c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r011c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r010c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r011c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r011c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r011c10spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r010c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r011c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r011c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r011c10spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r010c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r011c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r011c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r007c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r007c01b102:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r010c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r011c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r011c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-22329",
         },
      ],
   },
   cve: "CVE-2021-22329",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 4,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 8,
                  impactScore: 2.9,
                  integrityImpact: "PARTIAL",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:S/C:N/I:P/A:N",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "Single",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 4,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2021-22329",
                  impactScore: null,
                  integrityImpact: "Partial",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.9,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:S/C:N/I:P/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "CNVD",
                  availabilityImpact: "NONE",
                  baseScore: 4,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 8,
                  id: "CNVD-2021-84913",
                  impactScore: 2.9,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:S/C:N/I:P/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 4.9,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 1.2,
                  impactScore: 3.6,
                  integrityImpact: "HIGH",
                  privilegesRequired: "HIGH",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 4.9,
                  baseSeverity: "Medium",
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2021-22329",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "High",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2021-22329",
                  trust: 1.8,
                  value: "MEDIUM",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2021-84913",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202106-1957",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULMON",
                  id: "CVE-2021-22329",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2021-84913",
         },
         {
            db: "VULMON",
            id: "CVE-2021-22329",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008864",
         },
         {
            db: "NVD",
            id: "CVE-2021-22329",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-1957",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "There has a license management vulnerability in some Huawei products. An attacker with high privilege needs to perform specific operations to exploit the vulnerability on the affected device. Due to improper license management of the device, as a result, the license file can be applied and affect integrity of the device. Affected product versions include:S12700 V200R007C01,V200R007C01B102,V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S1700 V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S2700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S5700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100;S6700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100;S7700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S9700 V200R007C01,V200R007C01B102,V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10. plural  Huawei The product contains unspecified vulnerabilities.Information may be tampered with. Huawei S12700, etc. are all enterprise-class switch products of China's Huawei (Huawei) company",
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-22329",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008864",
         },
         {
            db: "CNVD",
            id: "CNVD-2021-84913",
         },
         {
            db: "VULMON",
            id: "CVE-2021-22329",
         },
      ],
      trust: 2.25,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2021-22329",
            trust: 3.9,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008864",
            trust: 0.8,
         },
         {
            db: "CNVD",
            id: "CNVD-2021-84913",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-1957",
            trust: 0.6,
         },
         {
            db: "VULMON",
            id: "CVE-2021-22329",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2021-84913",
         },
         {
            db: "VULMON",
            id: "CVE-2021-22329",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008864",
         },
         {
            db: "NVD",
            id: "CVE-2021-22329",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-1957",
         },
      ],
   },
   id: "VAR-202106-0619",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2021-84913",
         },
      ],
      trust: 1.509002045,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2021-84913",
         },
      ],
   },
   last_update_date: "2023-12-18T13:27:41.787000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "huawei-sa-20210407-01-resourcemanagement",
            trust: 0.8,
            url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210407-01-resourcemanagement-en",
         },
         {
            title: "Patch for Incorrect license management vulnerabilities for multiple Huawei products",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/297536",
         },
         {
            title: "Huawei S2700 Security vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156248",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2021-84913",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008864",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-1957",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "NVD-CWE-noinfo",
            trust: 1,
         },
         {
            problemtype: "Lack of information (CWE-noinfo) [NVD Evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-008864",
         },
         {
            db: "NVD",
            id: "CVE-2021-22329",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.3,
            url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210407-01-resourcemanagement-en",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2021-22329",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2021-84913",
         },
         {
            db: "VULMON",
            id: "CVE-2021-22329",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008864",
         },
         {
            db: "NVD",
            id: "CVE-2021-22329",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-1957",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2021-84913",
         },
         {
            db: "VULMON",
            id: "CVE-2021-22329",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008864",
         },
         {
            db: "NVD",
            id: "CVE-2021-22329",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-1957",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-11-08T00:00:00",
            db: "CNVD",
            id: "CNVD-2021-84913",
         },
         {
            date: "2021-06-29T00:00:00",
            db: "VULMON",
            id: "CVE-2021-22329",
         },
         {
            date: "2022-03-29T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2021-008864",
         },
         {
            date: "2021-06-29T20:15:08.083000",
            db: "NVD",
            id: "CVE-2021-22329",
         },
         {
            date: "2021-06-29T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202106-1957",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-11-08T00:00:00",
            db: "CNVD",
            id: "CNVD-2021-84913",
         },
         {
            date: "2021-07-07T00:00:00",
            db: "VULMON",
            id: "CVE-2021-22329",
         },
         {
            date: "2022-03-29T09:13:00",
            db: "JVNDB",
            id: "JVNDB-2021-008864",
         },
         {
            date: "2021-07-07T11:34:52.937000",
            db: "NVD",
            id: "CVE-2021-22329",
         },
         {
            date: "2021-07-08T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202106-1957",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202106-1957",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei  Product vulnerabilities",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-008864",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "other",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202106-1957",
         },
      ],
      trust: 0.6,
   },
}

var-201803-1326
Vulnerability from variot

PEM module of DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a DoS vulnerability in PEM module of Huawei products due to insufficient verification. An authenticated local attacker can make processing into deadloop by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service. plural Huawei The product contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Huawei DP300, IPSModule, and NGFWModule are all products of China Huawei. DP300 is a video conferencing terminal. RP200 is a video conferencing all-in-one device. The vulnerability is caused by insufficient execution verification of the program. The following products and versions are affected: Huawei DP300 V500R002C00 Version; IPS Module V500R001C00 Version, V500R001C30 Version; NGFW Module V500R001C00 Version, V500R002C00 Version; NIP6300 V500R001C00 Version, V500R001C30 Version; NIP6600 V500R001C00 Version, V500R001C30 Version; RP200 V500R002C00 Version, V600R006C00 Version; S12700 V200R007C00 Version, V200R007C01 Version, V200R008C00 Version, V200R009C00 Version, V200R010C00 Version; S1700 V200R006C10 Version, V200R009C00 Version, V200R010C00 Version; S2700 V200R006C10 Version, V200R007C00 Version, V200R008C00 Version, V200R009C00 Version, V200R010C00 Version; S5700 V200R006C00 Version, V200R007C00 Version, V200R008C00 Version , V200R009C00, V200R010C00; S6700 V200R008C00, V200R009C00, V200R010C00; S7700 V200R007C00, V200R008C00, V200R009C00, V200000; S9700

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201803-1326",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "tp3206",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r002c10",
         },
         {
            model: "te60",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v600r006c00",
         },
         {
            model: "usg9500",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v500r001c00",
         },
         {
            model: "tp3106",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r002c00",
         },
         {
            model: "te60",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v500r002c00",
         },
         {
            model: "usg9500",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v500r001c30",
         },
         {
            model: "te60",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r001c10",
         },
         {
            model: "tp3206",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r002c00",
         },
         {
            model: "viewpoint 9030",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r011c03",
         },
         {
            model: "viewpoint 9030",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r011c02",
         },
         {
            model: "te40",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v600r006c00",
         },
         {
            model: "secospace usg6500",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c00",
         },
         {
            model: "te30",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r002c00",
         },
         {
            model: "ngfw module",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c00",
         },
         {
            model: "rp200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v600r006c00",
         },
         {
            model: "secospace usg6600",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "te40",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r002c00",
         },
         {
            model: "secospace usg6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c30",
         },
         {
            model: "ngfw module",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r002c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "secospace usg6600",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c30s",
         },
         {
            model: "rp200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r002c00",
         },
         {
            model: "te60",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r001c02",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "nip6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "secospace usg6500",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c30",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c10",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c01",
         },
         {
            model: "nip6600",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "te30",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r001c10",
         },
         {
            model: "nip6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c30",
         },
         {
            model: "ips module",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c00",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "nip6600",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c30",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "dp300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r002c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c10",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "te50",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v600r006c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "te30",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v600r006c00",
         },
         {
            model: "secospace usg6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c00",
         },
         {
            model: "te50",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r002c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c01",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "ips module",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c30",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "te30",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r001c02",
         },
         {
            model: "dp300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ips module",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ngfw module",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "nip6300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "nip6600",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "rp200",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "secospace usg6300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "secospace usg6500",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "secospace usg6600",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te30",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te40",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te50",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te60",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "tp3106",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "tp3206",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "usg9500",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "viewpoint 9030",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ips module v500r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ngfw module v500r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "nip6300 v500r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "nip6600 v500r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "secospace usg6300 v500r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "secospace usg6500 v500r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "secospace usg6600 v500r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r007c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "dp300 v500r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te60 v100r001c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te60 v100r001c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te60 v500r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te60 v600r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "viewpoint v100r011c03",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "9030",
         },
         {
            model: "viewpoint v100r011c02",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "9030",
         },
         {
            model: "tp3206 v100r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "tp3106 v100r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "rp200 v500r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "rp200 v600r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te30 v100r001c02",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te30 v100r001c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te30 v500r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te30 v600r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te40 v500r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te40 v600r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te50 v500r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te50 v600r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ips module v500r001c30",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "nip6300 v500r001c30",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "nip6600 v500r001c30",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "secospace usg6300 v500r001c30",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "secospace usg6500 v500r001c30",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "usg9500 v500r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "usg9500 v500r001c30",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "tp3206 v100r002c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700 v200r006c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r006c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r007c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "secospace usg6600 v500r001c30s",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ngfw module v500r001c30",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-38291",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012867",
         },
         {
            db: "NVD",
            id: "CVE-2017-17138",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-305",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r007c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r006c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r006c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r007c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30s:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v100r001c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2017-17138",
         },
      ],
   },
   cve: "CVE-2017-17138",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 2.1,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.9,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "LOW",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Local",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 2.1,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2017-17138",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Low",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "SINGLE",
                  author: "CNVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 4.6,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.1,
                  id: "CNVD-2017-38291",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.6,
                  vectorString: "AV:L/AC:L/Au:S/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "PARTIAL",
                  baseScore: 2.1,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.9,
                  id: "VHN-108130",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "LOW",
                  trust: 0.1,
                  vectorString: "AV:L/AC:L/AU:N/C:N/I:N/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 1.8,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 5.5,
                  baseSeverity: "Medium",
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2017-17138",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "Low",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2017-17138",
                  trust: 1.8,
                  value: "MEDIUM",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2017-38291",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201712-305",
                  trust: 0.6,
                  value: "LOW",
               },
               {
                  author: "VULHUB",
                  id: "VHN-108130",
                  trust: 0.1,
                  value: "LOW",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-38291",
         },
         {
            db: "VULHUB",
            id: "VHN-108130",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012867",
         },
         {
            db: "NVD",
            id: "CVE-2017-17138",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-305",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "PEM module of DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a DoS vulnerability in PEM module of Huawei products due to insufficient verification. An authenticated local attacker can make processing into deadloop by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service. plural Huawei The product contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Huawei DP300, IPSModule, and NGFWModule are all products of China Huawei. DP300 is a video conferencing terminal. RP200 is a video conferencing all-in-one device. The vulnerability is caused by insufficient execution verification of the program. The following products and versions are affected: Huawei DP300 V500R002C00 Version; IPS Module V500R001C00 Version, V500R001C30 Version; NGFW Module V500R001C00 Version, V500R002C00 Version; NIP6300 V500R001C00 Version, V500R001C30 Version; NIP6600 V500R001C00 Version, V500R001C30 Version; RP200 V500R002C00 Version, V600R006C00 Version; S12700 V200R007C00 Version, V200R007C01 Version, V200R008C00 Version, V200R009C00 Version, V200R010C00 Version; S1700 V200R006C10 Version, V200R009C00 Version, V200R010C00 Version; S2700 V200R006C10 Version, V200R007C00 Version, V200R008C00 Version, V200R009C00 Version, V200R010C00 Version; S5700 V200R006C00 Version, V200R007C00 Version, V200R008C00 Version , V200R009C00, V200R010C00; S6700 V200R008C00, V200R009C00, V200R010C00; S7700 V200R007C00, V200R008C00, V200R009C00, V200000; S9700",
      sources: [
         {
            db: "NVD",
            id: "CVE-2017-17138",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012867",
         },
         {
            db: "CNVD",
            id: "CNVD-2017-38291",
         },
         {
            db: "VULHUB",
            id: "VHN-108130",
         },
      ],
      trust: 2.25,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2017-17138",
            trust: 3.1,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012867",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-305",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2017-38291",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-108130",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-38291",
         },
         {
            db: "VULHUB",
            id: "VHN-108130",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012867",
         },
         {
            db: "NVD",
            id: "CVE-2017-17138",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-305",
         },
      ],
   },
   id: "VAR-201803-1326",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-38291",
         },
         {
            db: "VULHUB",
            id: "VHN-108130",
         },
      ],
      trust: 1.570591724,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-38291",
         },
      ],
   },
   last_update_date: "2023-12-18T12:02:29.539000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "huawei-sa-20171206-01-pem",
            trust: 0.8,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
         },
         {
            title: "Patches for multiple Huawei product PEM module denial of service vulnerabilities",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/111831",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-38291",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012867",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-20",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-108130",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012867",
         },
         {
            db: "NVD",
            id: "CVE-2017-17138",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
         },
         {
            trust: 0.8,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-17138",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-17138",
         },
         {
            trust: 0.6,
            url: "http://www.huawei.com/cn/psirt/security-advisories/2017/huawei-sa-20171206-01-pem-cn",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-38291",
         },
         {
            db: "VULHUB",
            id: "VHN-108130",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012867",
         },
         {
            db: "NVD",
            id: "CVE-2017-17138",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-305",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2017-38291",
         },
         {
            db: "VULHUB",
            id: "VHN-108130",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012867",
         },
         {
            db: "NVD",
            id: "CVE-2017-17138",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-305",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-12-27T00:00:00",
            db: "CNVD",
            id: "CNVD-2017-38291",
         },
         {
            date: "2018-03-05T00:00:00",
            db: "VULHUB",
            id: "VHN-108130",
         },
         {
            date: "2018-04-25T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2017-012867",
         },
         {
            date: "2018-03-05T19:29:00.580000",
            db: "NVD",
            id: "CVE-2017-17138",
         },
         {
            date: "2017-12-07T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201712-305",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-12-27T00:00:00",
            db: "CNVD",
            id: "CNVD-2017-38291",
         },
         {
            date: "2018-03-27T00:00:00",
            db: "VULHUB",
            id: "VHN-108130",
         },
         {
            date: "2018-04-25T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2017-012867",
         },
         {
            date: "2018-03-27T15:33:35.427000",
            db: "NVD",
            id: "CVE-2017-17138",
         },
         {
            date: "2018-03-06T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201712-305",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201712-305",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei Vulnerability related to input validation in products",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2017-012867",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "input validation",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201712-305",
         },
      ],
      trust: 0.6,
   },
}

var-201802-0546
Vulnerability from variot

XML parser in Huawei S12700 V200R005C00,S1700 V200R009C00, V200R010C00,S3700 V100R006C03, V100R006C05,S5700 V200R001C00, V200R002C00, V200R003C00, V200R003C02, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S6700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C02, V200R008C00, V200R009C00, V200R010C00,S7700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S9700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,eCNS210_TD V100R004C10, V100R004C10SPC003, V100R004C10SPC100, V100R004C10SPC101, V100R004C10SPC102, V100R004C10SPC200, V100R004C10SPC221, V100R004C10SPC400 has a DOS vulnerability. An attacker may craft specific XML files to the affected products. Due to not check the specially XML file and to parse this file, successful exploit will result in DOS attacks. plural Huawei The product contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. HuaweiS12700 is an enterprise-class switch product from China's Huawei company. XMLparser is one of the XML parsers. The vulnerability stems from the failure of the network system or product to properly validate the input data. The following products and versions are affected: Huawei S12700 V200R005C00 Version; S1700 V200R009C00 Version, V200R010C00 Version; S2300 V100R006C03 Version, V100R006C05 Version, V200R003C00 Version, V200R005C00 Version, V200R006C00 Version, V200R007C00 Version, V200R008C00 Version, V200R009C00 Version, V200R010C00 Version; S3300 V100R006C03 Version , V100R006C05 version; S3700 V100R006C03 version, V100R006C05 version; S5300, etc

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201802-0546",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "ecns210 td",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r004c10spc221",
         },
         {
            model: "ecns210 td",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r004c10spc400",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "ecns210 td",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r004c10spc200",
         },
         {
            model: "ecns210 td",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r004c10spc101",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "ecns210 td",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r004c10spc102",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c02",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "ecns210 td",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r004c10spc100",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c02",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "ecns210 td",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r004c10spc003",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "ecns210 td",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r004c10",
         },
         {
            model: "ecns210 td",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s3700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r005c02",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r003c02",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s3300 v100r006c05",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v100r006c03",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s3300 v100r006c03",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ecns210 td v100r004c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v100r006c05",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r003c02",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r005c03",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r005c05",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s600-e v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s600-e v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r005c02",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s600-e v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ecns210 td v100r004c10spc003",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ecns210 td v100r004c10spc100",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ecns210 td v100r004c10spc101",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ecns210 td v100r004c10spc102",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ecns210 td v100r004c10spc200",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ecns210 td v100r004c10spc221",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ecns210 td v100r004c10spc400",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-38223",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012479",
         },
         {
            db: "NVD",
            id: "CVE-2017-15333",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-060",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r003c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r005c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r005c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10spc400:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10spc101:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10spc003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10spc102:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10spc221:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ecns210_td:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2017-15333",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Huawei internal tester, The vulnerability was discovered by Huawei internal testing.",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201712-060",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2017-15333",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 4.3,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 8.6,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: true,
                  vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Medium",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 4.3,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2017-15333",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "CNVD-2017-38223",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "PARTIAL",
                  baseScore: 4.3,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 8.6,
                  id: "VHN-106145",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:M/AU:N/C:N/I:N/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "HIGH",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 4.7,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 1,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "High",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 4.7,
                  baseSeverity: "Medium",
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2017-15333",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "Required",
                  vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2017-15333",
                  trust: 1.8,
                  value: "MEDIUM",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2017-38223",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201712-060",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-106145",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-38223",
         },
         {
            db: "VULHUB",
            id: "VHN-106145",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012479",
         },
         {
            db: "NVD",
            id: "CVE-2017-15333",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-060",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "XML parser in Huawei S12700 V200R005C00,S1700 V200R009C00, V200R010C00,S3700 V100R006C03, V100R006C05,S5700 V200R001C00, V200R002C00, V200R003C00, V200R003C02, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S6700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C02, V200R008C00, V200R009C00, V200R010C00,S7700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S9700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,eCNS210_TD V100R004C10, V100R004C10SPC003, V100R004C10SPC100, V100R004C10SPC101, V100R004C10SPC102, V100R004C10SPC200, V100R004C10SPC221, V100R004C10SPC400 has a DOS vulnerability. An attacker may craft specific XML files to the affected products. Due to not check the specially XML file and to parse this file, successful exploit will result in DOS attacks. plural Huawei The product contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. HuaweiS12700 is an enterprise-class switch product from China's Huawei company. XMLparser is one of the XML parsers. The vulnerability stems from the failure of the network system or product to properly validate the input data. The following products and versions are affected: Huawei S12700 V200R005C00 Version; S1700 V200R009C00 Version, V200R010C00 Version; S2300 V100R006C03 Version, V100R006C05 Version, V200R003C00 Version, V200R005C00 Version, V200R006C00 Version, V200R007C00 Version, V200R008C00 Version, V200R009C00 Version, V200R010C00 Version; S3300 V100R006C03 Version , V100R006C05 version; S3700 V100R006C03 version, V100R006C05 version; S5300, etc",
      sources: [
         {
            db: "NVD",
            id: "CVE-2017-15333",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012479",
         },
         {
            db: "CNVD",
            id: "CNVD-2017-38223",
         },
         {
            db: "VULHUB",
            id: "VHN-106145",
         },
      ],
      trust: 2.25,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2017-15333",
            trust: 3.1,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012479",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-060",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2017-38223",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-106145",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-38223",
         },
         {
            db: "VULHUB",
            id: "VHN-106145",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012479",
         },
         {
            db: "NVD",
            id: "CVE-2017-15333",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-060",
         },
      ],
   },
   id: "VAR-201802-0546",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-38223",
         },
         {
            db: "VULHUB",
            id: "VHN-106145",
         },
      ],
      trust: 1.6031872141095889,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-38223",
         },
      ],
   },
   last_update_date: "2023-12-18T13:33:59.516000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "huawei-sa-20171201-01-xml",
            trust: 0.8,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-xml-en",
         },
         {
            title: "Patches for various Huawei product XML parser denial of service vulnerabilities",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/111799",
         },
         {
            title: "Multiple Huawei product XML Remediation measures for resolver security vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=76888",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-38223",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012479",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-060",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-20",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-106145",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012479",
         },
         {
            db: "NVD",
            id: "CVE-2017-15333",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.1,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-xml-en",
         },
         {
            trust: 0.8,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-15333",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-15333",
         },
         {
            trust: 0.6,
            url: "http://www.huawei.com/cn/psirt/security-advisories/2017/huawei-sa-20171201-01-xml-cn",
         },
         {
            trust: 0.6,
            url: "http://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20171201-01-xml-cn",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-38223",
         },
         {
            db: "VULHUB",
            id: "VHN-106145",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012479",
         },
         {
            db: "NVD",
            id: "CVE-2017-15333",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-060",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2017-38223",
         },
         {
            db: "VULHUB",
            id: "VHN-106145",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012479",
         },
         {
            db: "NVD",
            id: "CVE-2017-15333",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-060",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-12-27T00:00:00",
            db: "CNVD",
            id: "CNVD-2017-38223",
         },
         {
            date: "2018-02-15T00:00:00",
            db: "VULHUB",
            id: "VHN-106145",
         },
         {
            date: "2018-03-12T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2017-012479",
         },
         {
            date: "2018-02-15T16:29:00.423000",
            db: "NVD",
            id: "CVE-2017-15333",
         },
         {
            date: "2017-12-05T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201712-060",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-12-27T00:00:00",
            db: "CNVD",
            id: "CNVD-2017-38223",
         },
         {
            date: "2018-02-27T00:00:00",
            db: "VULHUB",
            id: "VHN-106145",
         },
         {
            date: "2018-03-12T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2017-012479",
         },
         {
            date: "2018-02-27T15:17:47.120000",
            db: "NVD",
            id: "CVE-2017-15333",
         },
         {
            date: "2019-05-08T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201712-060",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201712-060",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei Vulnerability related to input validation in products",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2017-012479",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "input validation error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201712-060",
         },
      ],
      trust: 0.6,
   },
}

var-201803-1330
Vulnerability from variot

PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a null pointer reference vulnerability due to insufficient verification. An authenticated local attacker calls PEM decoder with special parameter which could cause a denial of service. plural Huawei The product includes NULL A vulnerability related to pointer dereference exists.Service operation interruption (DoS) There is a possibility of being put into a state. Huawei DP300, IPSModule, and NGFWModule are all products of China Huawei. DP300 is a video conferencing terminal. RP200 is a video conferencing all-in-one device. PEM module is one of the security modules. The following products and versions are affected: Huawei DP300 V500R002C00 Version; IPS Module V500R001C00 Version, V500R001C30 Version; NGFW Module V500R001C00 Version, V500R002C00 Version; NIP6300 V500R001C00 Version, V500R001C30 Version; NIP6600 V500R001C00 Version, V500R001C30 Version; RP200 V500R002C00 Version, V600R006C00 Version; S12700 V200R007C00 Version, V200R007C01 Version, V200R008C00 Version, V200R009C00 Version, V200R010C00 Version; S1700 V200R006C10 Version, V200R009C00 Version, V200R010C00 Version; S2700 V200R006C10 Version, V200R007C00 Version, V200R008C00 Version, V200R009C00 Version, V200R010C00 Version; S5700 V200R006C00 Version, V200R007C00 Version, V200R008C00 Version, V200R009C00 Version, V200R010C00 Version; S6700 V200R008C00 Version, V200R009C00 Version, V200R010C00 Version; S7700 V200R007C00 Version, V200R008C00 Version, V200R009C00 Version, V200R010C00 Version; S9700 V200R007C00 Version, V200R007C01 Version, V200R008C00 Version, V200R009C00 Version, V200R010C00 Version; Secospace

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201803-1330",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "te30",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v500r002c00",
         },
         {
            model: "tp3206",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r002c10",
         },
         {
            model: "te40",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v500r002c00",
         },
         {
            model: "usg9500",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v500r001c00",
         },
         {
            model: "tp3106",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r002c00",
         },
         {
            model: "usg9500",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v500r001c30",
         },
         {
            model: "tp3206",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r002c00",
         },
         {
            model: "viewpoint 9030",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r011c03",
         },
         {
            model: "viewpoint 9030",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r011c02",
         },
         {
            model: "te30",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v600r006c00",
         },
         {
            model: "te40",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v600r006c00",
         },
         {
            model: "secospace usg6500",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c00",
         },
         {
            model: "ngfw module",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c00",
         },
         {
            model: "rp200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v600r006c00",
         },
         {
            model: "secospace usg6600",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "te60",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v600r006c00",
         },
         {
            model: "secospace usg6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c30",
         },
         {
            model: "ngfw module",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r002c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "secospace usg6600",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c30s",
         },
         {
            model: "rp200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r002c00",
         },
         {
            model: "te60",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r001c02",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "nip6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "te60",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r002c00",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "secospace usg6500",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c30",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c10",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c01",
         },
         {
            model: "nip6600",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "te30",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r001c10",
         },
         {
            model: "nip6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c30",
         },
         {
            model: "ips module",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c00",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "te60",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r001c10",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "nip6600",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c30",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "dp300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r002c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c10",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "te50",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v600r006c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "secospace usg6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c00",
         },
         {
            model: "te50",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r002c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c01",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "ips module",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c30",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "te30",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r001c02",
         },
         {
            model: "dp300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ips module",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ngfw module",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "nip6300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "nip6600",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "rp200",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "secospace usg6300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "secospace usg6500",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "secospace usg6600",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te30",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te40",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te50",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te60",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "tp3106",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "tp3206",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "usg9500",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "viewpoint 9030",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ips module v500r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ngfw module v500r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "nip6300 v500r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "nip6600 v500r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "secospace usg6300 v500r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "secospace usg6500 v500r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "secospace usg6600 v500r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r007c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "dp300 v500r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te60 v100r001c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te60 v100r001c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te60 v500r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te60 v600r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "viewpoint v100r011c03",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "9030",
         },
         {
            model: "viewpoint v100r011c02",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "9030",
         },
         {
            model: "tp3206 v100r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "tp3106 v100r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "rp200 v500r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "rp200 v600r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te30 v100r001c02",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te30 v100r001c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te30 v500r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te30 v600r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te40 v500r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te40 v600r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te50 v500r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te50 v600r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ips module v100r001c30",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ngfw module v500r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "nip6300 v500r001c30",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "nip6600 v500r001c30",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "secospace usg6300 v100r001c30",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "secospace usg6500 v100r001c30",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "usg9500 v500r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "usg9500 v500r001c30",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "tp3206 v100r002c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700 v100r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r006c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r007c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "secospace usg6600 v500r001c30s",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-38288",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012864",
         },
         {
            db: "NVD",
            id: "CVE-2017-17135",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-130",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r007c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r006c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r006c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r007c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30s:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v100r001c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2017-17135",
         },
      ],
   },
   cve: "CVE-2017-17135",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 2.1,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.9,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "LOW",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Local",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 2.1,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2017-17135",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Low",
                  trust: 0.9,
                  userInteractionRequired: null,
                  vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "SINGLE",
                  author: "CNVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 4.6,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.1,
                  id: "CNVD-2017-38288",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.6,
                  vectorString: "AV:L/AC:L/Au:S/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "PARTIAL",
                  baseScore: 2.1,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.9,
                  id: "VHN-108127",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "LOW",
                  trust: 0.1,
                  vectorString: "AV:L/AC:L/AU:N/C:N/I:N/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 1.8,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 5.5,
                  baseSeverity: "Medium",
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2017-17135",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "Low",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2017-17135",
                  trust: 1.8,
                  value: "MEDIUM",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2017-38288",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201712-130",
                  trust: 0.6,
                  value: "LOW",
               },
               {
                  author: "VULHUB",
                  id: "VHN-108127",
                  trust: 0.1,
                  value: "LOW",
               },
               {
                  author: "VULMON",
                  id: "CVE-2017-17135",
                  trust: 0.1,
                  value: "LOW",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-38288",
         },
         {
            db: "VULHUB",
            id: "VHN-108127",
         },
         {
            db: "VULMON",
            id: "CVE-2017-17135",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012864",
         },
         {
            db: "NVD",
            id: "CVE-2017-17135",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-130",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a null pointer reference vulnerability due to insufficient verification. An authenticated local attacker calls PEM decoder with special parameter which could cause a denial of service. plural Huawei The product includes NULL A vulnerability related to pointer dereference exists.Service operation interruption (DoS) There is a possibility of being put into a state. Huawei DP300, IPSModule, and NGFWModule are all products of China Huawei. DP300 is a video conferencing terminal. RP200 is a video conferencing all-in-one device. PEM module is one of the security modules. The following products and versions are affected: Huawei DP300 V500R002C00 Version; IPS Module V500R001C00 Version, V500R001C30 Version; NGFW Module V500R001C00 Version, V500R002C00 Version; NIP6300 V500R001C00 Version, V500R001C30 Version; NIP6600 V500R001C00 Version, V500R001C30 Version; RP200 V500R002C00 Version, V600R006C00 Version; S12700 V200R007C00 Version, V200R007C01 Version, V200R008C00 Version, V200R009C00 Version, V200R010C00 Version; S1700 V200R006C10 Version, V200R009C00 Version, V200R010C00 Version; S2700 V200R006C10 Version, V200R007C00 Version, V200R008C00 Version, V200R009C00 Version, V200R010C00 Version; S5700 V200R006C00 Version, V200R007C00 Version, V200R008C00 Version, V200R009C00 Version, V200R010C00 Version; S6700 V200R008C00 Version, V200R009C00 Version, V200R010C00 Version; S7700 V200R007C00 Version, V200R008C00 Version, V200R009C00 Version, V200R010C00 Version; S9700 V200R007C00 Version, V200R007C01 Version, V200R008C00 Version, V200R009C00 Version, V200R010C00 Version; Secospace",
      sources: [
         {
            db: "NVD",
            id: "CVE-2017-17135",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012864",
         },
         {
            db: "CNVD",
            id: "CNVD-2017-38288",
         },
         {
            db: "VULHUB",
            id: "VHN-108127",
         },
         {
            db: "VULMON",
            id: "CVE-2017-17135",
         },
      ],
      trust: 2.34,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2017-17135",
            trust: 3.2,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012864",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-130",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2017-38288",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-108127",
            trust: 0.1,
         },
         {
            db: "VULMON",
            id: "CVE-2017-17135",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-38288",
         },
         {
            db: "VULHUB",
            id: "VHN-108127",
         },
         {
            db: "VULMON",
            id: "CVE-2017-17135",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012864",
         },
         {
            db: "NVD",
            id: "CVE-2017-17135",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-130",
         },
      ],
   },
   id: "VAR-201803-1330",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-38288",
         },
         {
            db: "VULHUB",
            id: "VHN-108127",
         },
      ],
      trust: 1.5705351149152542,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-38288",
         },
      ],
   },
   last_update_date: "2023-12-18T14:05:30.089000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "huawei-sa-20171206-01-pem",
            trust: 0.8,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
         },
         {
            title: "Patches for a variety of Huawei product PEM module null pointer access vulnerabilities",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/111825",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-38288",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012864",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-476",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-108127",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012864",
         },
         {
            db: "NVD",
            id: "CVE-2017-17135",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.8,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
         },
         {
            trust: 0.8,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-17135",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-17135",
         },
         {
            trust: 0.6,
            url: "http://www.huawei.com/cn/psirt/security-advisories/2017/huawei-sa-20171206-01-pem-cn",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/476.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-38288",
         },
         {
            db: "VULHUB",
            id: "VHN-108127",
         },
         {
            db: "VULMON",
            id: "CVE-2017-17135",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012864",
         },
         {
            db: "NVD",
            id: "CVE-2017-17135",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-130",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2017-38288",
         },
         {
            db: "VULHUB",
            id: "VHN-108127",
         },
         {
            db: "VULMON",
            id: "CVE-2017-17135",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012864",
         },
         {
            db: "NVD",
            id: "CVE-2017-17135",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-130",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-12-27T00:00:00",
            db: "CNVD",
            id: "CNVD-2017-38288",
         },
         {
            date: "2018-03-05T00:00:00",
            db: "VULHUB",
            id: "VHN-108127",
         },
         {
            date: "2018-03-05T00:00:00",
            db: "VULMON",
            id: "CVE-2017-17135",
         },
         {
            date: "2018-04-25T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2017-012864",
         },
         {
            date: "2018-03-05T19:29:00.427000",
            db: "NVD",
            id: "CVE-2017-17135",
         },
         {
            date: "2017-12-05T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201712-130",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-12-27T00:00:00",
            db: "CNVD",
            id: "CNVD-2017-38288",
         },
         {
            date: "2018-03-27T00:00:00",
            db: "VULHUB",
            id: "VHN-108127",
         },
         {
            date: "2018-03-27T00:00:00",
            db: "VULMON",
            id: "CVE-2017-17135",
         },
         {
            date: "2018-04-25T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2017-012864",
         },
         {
            date: "2018-03-27T15:29:45.937000",
            db: "NVD",
            id: "CVE-2017-17135",
         },
         {
            date: "2018-03-06T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201712-130",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201712-130",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei In product  NULL Pointer dereference vulnerability",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2017-012864",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201712-130",
         },
      ],
      trust: 0.6,
   },
}

var-201802-0527
Vulnerability from variot

XML parser in Huawei S12700 V200R005C00,S1700 V200R009C00, V200R010C00,S3700 V100R006C03, V100R006C05,S5700 V200R001C00, V200R002C00, V200R003C00, V200R003C02, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S6700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C02, V200R008C00, V200R009C00, V200R010C00,S7700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S9700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,eCNS210_TD V100R004C10, V100R004C10SPC003, V100R004C10SPC100, V100R004C10SPC101, V100R004C10SPC102, V100R004C10SPC200, V100R004C10SPC221, V100R004C10SPC400 has a DOS vulnerability. An attacker may craft specific XML files to the affected products. Due to not check the specially XML file and to parse this file, successful exploit will result in DOS attacks. plural Huawei The product contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. HuaweiS12700 is an enterprise-class switch product from China's Huawei company. XMLparser is one of the XML parsers. The vulnerability stems from the failure of the network system or product to properly validate the input data

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201802-0527",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "ecns210 td",
            scope: "eq",
            trust: 2.4,
            vendor: "huawei",
            version: "v100r004c10spc101",
         },
         {
            model: "ecns210 td",
            scope: "eq",
            trust: 2.4,
            vendor: "huawei",
            version: "v100r004c10spc102",
         },
         {
            model: "ecns210 td",
            scope: "eq",
            trust: 2.4,
            vendor: "huawei",
            version: "v100r004c10spc200",
         },
         {
            model: "ecns210 td",
            scope: "eq",
            trust: 2.4,
            vendor: "huawei",
            version: "v100r004c10spc221",
         },
         {
            model: "ecns210 td",
            scope: "eq",
            trust: 2.4,
            vendor: "huawei",
            version: "v100r004c10spc400",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 2.4,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 2.4,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 2.4,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 2.4,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 2.4,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "ecns210 td",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r004c10",
         },
         {
            model: "ecns210 td",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r004c10spc003",
         },
         {
            model: "ecns210 td",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v100r004c10spc100",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r003c02",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r005c02",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s3700",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v100r006c03",
         },
         {
            model: "s3700",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v100r006c05",
         },
         {
            model: "s12700 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v100r006c03",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v100r006c05",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s3300 v100r006c05",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s3300 v100r006c03",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r003c02",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r005c03",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r005c05",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r003c02",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s600-e v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s600-e v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s600-e v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r005c02",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r005c02",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ecns210 td v100r004c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ecns210 td v100r004c10spc003",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ecns210 td v100r004c10spc100",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ecns210 td v100r004c10spc101",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ecns210 td v100r004c10spc102",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ecns210 td v100r004c10spc200",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ecns210 td v100r004c10spc221",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ecns210 td v100r004c10spc400",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-38222",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012436",
         },
         {
            db: "NVD",
            id: "CVE-2017-15346",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-061",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r003c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r005c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r005c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10spc003:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10spc101:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10spc102:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10spc221:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10spc400:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ecns210_td:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2017-15346",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The vulnerability was discovered by Huawei internal testing.",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201712-061",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2017-15346",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 4.3,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 8.6,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: true,
                  vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Medium",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 4.3,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2017-15346",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.9,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "CNVD-2017-38222",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "PARTIAL",
                  baseScore: 4.3,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 8.6,
                  id: "VHN-106159",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:M/AU:N/C:N/I:N/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "HIGH",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 4.7,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 1,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "High",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 4.7,
                  baseSeverity: "Medium",
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2017-15346",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "Required",
                  vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2017-15346",
                  trust: 1.8,
                  value: "MEDIUM",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2017-38222",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201712-061",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-106159",
                  trust: 0.1,
                  value: "MEDIUM",
               },
               {
                  author: "VULMON",
                  id: "CVE-2017-15346",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-38222",
         },
         {
            db: "VULHUB",
            id: "VHN-106159",
         },
         {
            db: "VULMON",
            id: "CVE-2017-15346",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012436",
         },
         {
            db: "NVD",
            id: "CVE-2017-15346",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-061",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "XML parser in Huawei S12700 V200R005C00,S1700 V200R009C00, V200R010C00,S3700 V100R006C03, V100R006C05,S5700 V200R001C00, V200R002C00, V200R003C00, V200R003C02, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S6700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C02, V200R008C00, V200R009C00, V200R010C00,S7700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S9700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,eCNS210_TD V100R004C10, V100R004C10SPC003, V100R004C10SPC100, V100R004C10SPC101, V100R004C10SPC102, V100R004C10SPC200, V100R004C10SPC221, V100R004C10SPC400 has a DOS vulnerability. An attacker may craft specific XML files to the affected products. Due to not check the specially XML file and to parse this file, successful exploit will result in DOS attacks. plural Huawei The product contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. HuaweiS12700 is an enterprise-class switch product from China's Huawei company. XMLparser is one of the XML parsers. The vulnerability stems from the failure of the network system or product to properly validate the input data",
      sources: [
         {
            db: "NVD",
            id: "CVE-2017-15346",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012436",
         },
         {
            db: "CNVD",
            id: "CNVD-2017-38222",
         },
         {
            db: "VULHUB",
            id: "VHN-106159",
         },
         {
            db: "VULMON",
            id: "CVE-2017-15346",
         },
      ],
      trust: 2.34,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2017-15346",
            trust: 3.2,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012436",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-061",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2017-38222",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-106159",
            trust: 0.1,
         },
         {
            db: "VULMON",
            id: "CVE-2017-15346",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-38222",
         },
         {
            db: "VULHUB",
            id: "VHN-106159",
         },
         {
            db: "VULMON",
            id: "CVE-2017-15346",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012436",
         },
         {
            db: "NVD",
            id: "CVE-2017-15346",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-061",
         },
      ],
   },
   id: "VAR-201802-0527",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-38222",
         },
         {
            db: "VULHUB",
            id: "VHN-106159",
         },
      ],
      trust: 1.6031872141095889,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-38222",
         },
      ],
   },
   last_update_date: "2023-12-18T12:50:54.517000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "huawei-sa-20171201-01-xml",
            trust: 0.8,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-xml-en",
         },
         {
            title: "Huawei's various product XML parser denial of service vulnerability patch",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/111809",
         },
         {
            title: "Multiple Huawei product XML Remediation measures for resolver security vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=76889",
         },
         {
            title: "Huawei Security Advisories: Security Advisory - Two DOS Vulnerabilities of XML Parser in Some Huawei Products",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=huawei_security_advisories&qid=2e3897be411afe991825f2d2f5ab3ea5",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-38222",
         },
         {
            db: "VULMON",
            id: "CVE-2017-15346",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012436",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-061",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-20",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-106159",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012436",
         },
         {
            db: "NVD",
            id: "CVE-2017-15346",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.3,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-xml-en",
         },
         {
            trust: 1.2,
            url: "http://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20171201-01-xml-cn",
         },
         {
            trust: 0.8,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-15346",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-15346",
         },
         {
            trust: 0.6,
            url: "http://www.huawei.com/cn/psirt/security-advisories/2017/huawei-sa-20171201-01-xml-cn",
         },
         {
            trust: 0.6,
            url: "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20200909-01-mbb-cn",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/20.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-38222",
         },
         {
            db: "VULHUB",
            id: "VHN-106159",
         },
         {
            db: "VULMON",
            id: "CVE-2017-15346",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012436",
         },
         {
            db: "NVD",
            id: "CVE-2017-15346",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-061",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2017-38222",
         },
         {
            db: "VULHUB",
            id: "VHN-106159",
         },
         {
            db: "VULMON",
            id: "CVE-2017-15346",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012436",
         },
         {
            db: "NVD",
            id: "CVE-2017-15346",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-061",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-12-27T00:00:00",
            db: "CNVD",
            id: "CNVD-2017-38222",
         },
         {
            date: "2018-02-15T00:00:00",
            db: "VULHUB",
            id: "VHN-106159",
         },
         {
            date: "2018-02-15T00:00:00",
            db: "VULMON",
            id: "CVE-2017-15346",
         },
         {
            date: "2018-03-09T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2017-012436",
         },
         {
            date: "2018-02-15T16:29:01.047000",
            db: "NVD",
            id: "CVE-2017-15346",
         },
         {
            date: "2017-12-05T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201712-061",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-12-27T00:00:00",
            db: "CNVD",
            id: "CNVD-2017-38222",
         },
         {
            date: "2018-02-24T00:00:00",
            db: "VULHUB",
            id: "VHN-106159",
         },
         {
            date: "2018-02-24T00:00:00",
            db: "VULMON",
            id: "CVE-2017-15346",
         },
         {
            date: "2018-03-09T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2017-012436",
         },
         {
            date: "2018-02-24T21:26:57.047000",
            db: "NVD",
            id: "CVE-2017-15346",
         },
         {
            date: "2020-10-22T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201712-061",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201712-061",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei Vulnerability related to input validation in products",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2017-012436",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "input validation error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201712-061",
         },
      ],
      trust: 0.6,
   },
}

var-201803-1080
Vulnerability from variot

Huawei S12700 V200R007C00, V200R008C00, S5700 V200R007C00, S7700 V200R002C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, S9700 V200R007C00 have an input validation vulnerability. Due to the lack of input validation, an attacker may craft a malformed packet and send it to the device using VRP, causing the device to display additional memory data and possibly leading to sensitive information leakage. plural Huawei The product contains an input validation vulnerability.Information may be obtained. The Huawei S9700, S5700, S7700, and S9700 are the switch devices of Huawei (Huawei). Multiple Huawei Products are prone to an information-disclosure vulnerability. Remote attackers can exploit this issue to obtain sensitive information that may lead to further attacks. Huawei S12700 and others are all intelligent routing switches of China Huawei (Huawei). The following products and versions are affected: Huawei S12700 V200R007C00, V200R008C00; S5700 V200R007C00; S7700 V200R002C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201803-1080",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "s7700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s7700 v200r005c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r002c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r006c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r008c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r008c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r007c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r007c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r007c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r007c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r009c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r009c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r009c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r009c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-13267",
         },
         {
            db: "BID",
            id: "95149",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008969",
         },
         {
            db: "NVD",
            id: "CVE-2016-8785",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201612-757",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2016-8785",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The vendor reported the issue.",
      sources: [
         {
            db: "BID",
            id: "95149",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2016-8785",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: true,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Medium",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 4.3,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2016-8785",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "NONE",
                  baseScore: 5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  id: "CNVD-2016-13267",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  id: "VHN-97605",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:M/AU:N/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitabilityScore: 2.8,
                  impactScore: 1.4,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
                  version: "3.0",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 4.3,
                  baseSeverity: "Medium",
                  confidentialityImpact: "Low",
                  exploitabilityScore: null,
                  id: "CVE-2016-8785",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "Required",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2016-8785",
                  trust: 1.8,
                  value: "MEDIUM",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2016-13267",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201612-757",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-97605",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-13267",
         },
         {
            db: "VULHUB",
            id: "VHN-97605",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008969",
         },
         {
            db: "NVD",
            id: "CVE-2016-8785",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201612-757",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Huawei S12700 V200R007C00, V200R008C00, S5700 V200R007C00, S7700 V200R002C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, S9700 V200R007C00 have an input validation vulnerability. Due to the lack of input validation, an attacker may craft a malformed packet and send it to the device using VRP, causing the device to display additional memory data and possibly leading to sensitive information leakage. plural Huawei The product contains an input validation vulnerability.Information may be obtained. The Huawei S9700, S5700, S7700, and S9700 are the switch devices of Huawei (Huawei). Multiple Huawei Products are prone to an information-disclosure vulnerability. \nRemote attackers can exploit this issue to obtain sensitive information that may lead to further attacks. Huawei S12700 and others are all intelligent routing switches of China Huawei (Huawei). The following products and versions are affected: Huawei S12700 V200R007C00, V200R008C00; S5700 V200R007C00; S7700 V200R002C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00",
      sources: [
         {
            db: "NVD",
            id: "CVE-2016-8785",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008969",
         },
         {
            db: "CNVD",
            id: "CNVD-2016-13267",
         },
         {
            db: "BID",
            id: "95149",
         },
         {
            db: "VULHUB",
            id: "VHN-97605",
         },
      ],
      trust: 2.52,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2016-8785",
            trust: 3.4,
         },
         {
            db: "BID",
            id: "95149",
            trust: 2,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008969",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201612-757",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2016-13267",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-97605",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-13267",
         },
         {
            db: "VULHUB",
            id: "VHN-97605",
         },
         {
            db: "BID",
            id: "95149",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008969",
         },
         {
            db: "NVD",
            id: "CVE-2016-8785",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201612-757",
         },
      ],
   },
   id: "VAR-201803-1080",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-13267",
         },
         {
            db: "VULHUB",
            id: "VHN-97605",
         },
      ],
      trust: 1.3964623299999999,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-13267",
         },
      ],
   },
   last_update_date: "2023-12-18T12:57:02.491000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "huawei-sa-20161228-04-vrp",
            trust: 0.8,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161228-04-vrp-en",
         },
         {
            title: "Patches for multiple HuaweiVRP platform switch input verification vulnerabilities",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/87001",
         },
         {
            title: "Various Huawei product input verification vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=66714",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-13267",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008969",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201612-757",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-20",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-97605",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008969",
         },
         {
            db: "NVD",
            id: "CVE-2016-8785",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "http://www.securityfocus.com/bid/95149",
         },
         {
            trust: 1.7,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161228-04-vrp-en",
         },
         {
            trust: 0.8,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-8785",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-8785",
         },
         {
            trust: 0.6,
            url: "http://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20161228-04-vrp-cn",
         },
         {
            trust: 0.3,
            url: "http://www.huawei.com",
         },
         {
            trust: 0.3,
            url: "http://www.huawei.com/en/psirt/security-advisories/2016/huawei-sa-20161228-04-vrp-en",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-13267",
         },
         {
            db: "VULHUB",
            id: "VHN-97605",
         },
         {
            db: "BID",
            id: "95149",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008969",
         },
         {
            db: "NVD",
            id: "CVE-2016-8785",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201612-757",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2016-13267",
         },
         {
            db: "VULHUB",
            id: "VHN-97605",
         },
         {
            db: "BID",
            id: "95149",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008969",
         },
         {
            db: "NVD",
            id: "CVE-2016-8785",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201612-757",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2016-12-29T00:00:00",
            db: "CNVD",
            id: "CNVD-2016-13267",
         },
         {
            date: "2018-03-09T00:00:00",
            db: "VULHUB",
            id: "VHN-97605",
         },
         {
            date: "2016-12-28T00:00:00",
            db: "BID",
            id: "95149",
         },
         {
            date: "2018-04-18T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2016-008969",
         },
         {
            date: "2018-03-09T21:29:00.377000",
            db: "NVD",
            id: "CVE-2016-8785",
         },
         {
            date: "2016-12-29T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201612-757",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2016-12-29T00:00:00",
            db: "CNVD",
            id: "CNVD-2016-13267",
         },
         {
            date: "2018-03-26T00:00:00",
            db: "VULHUB",
            id: "VHN-97605",
         },
         {
            date: "2017-01-12T06:07:00",
            db: "BID",
            id: "95149",
         },
         {
            date: "2018-04-18T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2016-008969",
         },
         {
            date: "2018-03-26T15:24:34.397000",
            db: "NVD",
            id: "CVE-2016-8785",
         },
         {
            date: "2018-03-12T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201612-757",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201612-757",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei Vulnerability related to input validation in products",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2016-008969",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "input validation",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201612-757",
         },
      ],
      trust: 0.6,
   },
}

var-201704-0422
Vulnerability from variot

Huawei AR3200 with software V200R007C00, V200R005C32, V200R005C20; S12700 with software V200R008C00, V200R007C00; S5300 with software V200R008C00, V200R007C00, V200R006C00; S5700 with software V200R008C00, V200R007C00, V200R006C00; S6300 with software V200R008C00, V200R007C00; S6700 with software V200R008C00, V200R007C00; S7700 with software V200R008C00, V200R007C00, V200R006C00; S9300 with software V200R008C00, V200R007C00, V200R006C00; and S9700 with software V200R008C00, V200R007C00, V200R006C00 allow remote attackers to send abnormal Multiprotocol Label Switching (MPLS) packets to cause memory exhaustion. The Huawei AR3200 is a Huawei router. The S9700, S5300, S5700, S6300, S6700, S7700, S9300, and S9700 are Huawei switch devices. A number of Huawei products have a memory leak vulnerability. The Multi-Protocol Labeling (MPLS) packet processing module of the device repeatedly requests the memory when processing abnormal packets. There is a risk that the continuous attack will cause the memory to run out. An attacker could exploit this vulnerability to cause the device to run out of memory. The Huawei AR3200 and others are all products of China's Huawei (Huawei). The following products are affected: Huawei AR3200 V200R007C00 Version, V200R005C32 Version, V200R005C20 Version; S12700 V200R008C00 Version, V200R007C00 Version; S5300 V200R008C00 Version, V200R007C00 Version, V200R006C00 Version; S5700 V200R008C00 Version, V200R007C00 Version, V200R006C00 Version; S6300 V200R008C00 Version, V200R007C00 Version; S6700 V200R008C00 version, V200R007C00 version; S7700 V200R008C00 version, V200R007C00 version, V200R006C00 version; S9300 V200R008C00 version, V2007C00 version, V200R006C00 version;

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201704-0422",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "s9300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "ar3200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "ar3200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c32",
         },
         {
            model: "ar3200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c20",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "ar3200",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar3200 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar3200 v200r005c32",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar3200 v200r005c20",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-11302",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008269",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201704-187",
         },
         {
            db: "NVD",
            id: "CVE-2016-8797",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r005c32:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r005c20:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2016-8797",
         },
      ],
   },
   cve: "CVE-2016-8797",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 5,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2016-8797",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.9,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "CNVD-2016-11302",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "VHN-97617",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.9,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.5,
                  baseSeverity: "High",
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2016-8797",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2016-8797",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2016-11302",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201704-187",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-97617",
                  trust: 0.1,
                  value: "MEDIUM",
               },
               {
                  author: "VULMON",
                  id: "CVE-2016-8797",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-11302",
         },
         {
            db: "VULHUB",
            id: "VHN-97617",
         },
         {
            db: "VULMON",
            id: "CVE-2016-8797",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008269",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201704-187",
         },
         {
            db: "NVD",
            id: "CVE-2016-8797",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Huawei AR3200 with software V200R007C00, V200R005C32, V200R005C20; S12700 with software V200R008C00, V200R007C00; S5300 with software V200R008C00, V200R007C00, V200R006C00; S5700 with software V200R008C00, V200R007C00, V200R006C00; S6300 with software V200R008C00, V200R007C00; S6700 with software V200R008C00, V200R007C00; S7700 with software V200R008C00, V200R007C00, V200R006C00; S9300 with software V200R008C00, V200R007C00, V200R006C00; and S9700 with software V200R008C00, V200R007C00, V200R006C00 allow remote attackers to send abnormal Multiprotocol Label Switching (MPLS) packets to cause memory exhaustion. The Huawei AR3200 is a Huawei router. The S9700, S5300, S5700, S6300, S6700, S7700, S9300, and S9700 are Huawei switch devices. A number of Huawei products have a memory leak vulnerability. The Multi-Protocol Labeling (MPLS) packet processing module of the device repeatedly requests the memory when processing abnormal packets. There is a risk that the continuous attack will cause the memory to run out. An attacker could exploit this vulnerability to cause the device to run out of memory. The Huawei AR3200 and others are all products of China's Huawei (Huawei). The following products are affected: Huawei AR3200 V200R007C00 Version, V200R005C32 Version, V200R005C20 Version; S12700 V200R008C00 Version, V200R007C00 Version; S5300 V200R008C00 Version, V200R007C00 Version, V200R006C00 Version; S5700 V200R008C00 Version, V200R007C00 Version, V200R006C00 Version; S6300 V200R008C00 Version, V200R007C00 Version;  S6700 V200R008C00 version, V200R007C00 version; S7700 V200R008C00 version, V200R007C00 version, V200R006C00 version; S9300 V200R008C00 version, V2007C00 version, V200R006C00 version;",
      sources: [
         {
            db: "NVD",
            id: "CVE-2016-8797",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008269",
         },
         {
            db: "CNVD",
            id: "CNVD-2016-11302",
         },
         {
            db: "VULHUB",
            id: "VHN-97617",
         },
         {
            db: "VULMON",
            id: "CVE-2016-8797",
         },
      ],
      trust: 2.34,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2016-8797",
            trust: 3.2,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008269",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201704-187",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2016-11302",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-97617",
            trust: 0.1,
         },
         {
            db: "VULMON",
            id: "CVE-2016-8797",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-11302",
         },
         {
            db: "VULHUB",
            id: "VHN-97617",
         },
         {
            db: "VULMON",
            id: "CVE-2016-8797",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008269",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201704-187",
         },
         {
            db: "NVD",
            id: "CVE-2016-8797",
         },
      ],
   },
   id: "VAR-201704-0422",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-11302",
         },
         {
            db: "VULHUB",
            id: "VHN-97617",
         },
      ],
      trust: 1.496474832857143,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-11302",
         },
      ],
   },
   last_update_date: "2024-02-13T22:59:50.414000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "huawei-sa-20160608-01-mpls",
            trust: 0.8,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160608-01-mpls-en",
         },
         {
            title: "Patches for memory leaks in various Huawei products",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/84093",
         },
         {
            title: "Various Huawei product memory leak vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=69035",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-11302",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008269",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201704-187",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-399",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-97617",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008269",
         },
         {
            db: "NVD",
            id: "CVE-2016-8797",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.8,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160608-01-mpls-en",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-8797",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-8797",
         },
         {
            trust: 0.6,
            url: "http://www.huawei.com/cn/psirt/security-advisories/2016/huawei-sa-20160608-01-mpls-cn",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/399.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-11302",
         },
         {
            db: "VULHUB",
            id: "VHN-97617",
         },
         {
            db: "VULMON",
            id: "CVE-2016-8797",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008269",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201704-187",
         },
         {
            db: "NVD",
            id: "CVE-2016-8797",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2016-11302",
         },
         {
            db: "VULHUB",
            id: "VHN-97617",
         },
         {
            db: "VULMON",
            id: "CVE-2016-8797",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-008269",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201704-187",
         },
         {
            db: "NVD",
            id: "CVE-2016-8797",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2016-11-18T00:00:00",
            db: "CNVD",
            id: "CNVD-2016-11302",
         },
         {
            date: "2017-04-02T00:00:00",
            db: "VULHUB",
            id: "VHN-97617",
         },
         {
            date: "2017-04-02T00:00:00",
            db: "VULMON",
            id: "CVE-2016-8797",
         },
         {
            date: "2017-05-09T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2016-008269",
         },
         {
            date: "2017-04-07T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201704-187",
         },
         {
            date: "2017-04-02T20:59:01.860000",
            db: "NVD",
            id: "CVE-2016-8797",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2016-11-18T00:00:00",
            db: "CNVD",
            id: "CNVD-2016-11302",
         },
         {
            date: "2017-04-11T00:00:00",
            db: "VULHUB",
            id: "VHN-97617",
         },
         {
            date: "2017-04-11T00:00:00",
            db: "VULMON",
            id: "CVE-2016-8797",
         },
         {
            date: "2017-05-09T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2016-008269",
         },
         {
            date: "2017-04-07T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201704-187",
         },
         {
            date: "2017-04-11T01:03:45.743000",
            db: "NVD",
            id: "CVE-2016-8797",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201704-187",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei Vulnerability that can consume memory in product software",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2016-008269",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "resource management error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201704-187",
         },
      ],
      trust: 0.6,
   },
}

var-201803-1331
Vulnerability from variot

PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a heap overflow vulnerability due to insufficient verification. An authenticated local attacker can make processing crash by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service. plural Huawei The product contains a buffer error vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Huawei DP300, IPSModule, and NGFWModule are all products of China Huawei. DP300 is a video conferencing terminal. RP200 is a video conferencing all-in-one device. The following products and versions are affected: Huawei DP300 V500R002C00 Version; IPS Module V500R001C00 Version, V500R001C30 Version; NGFW Module V500R001C00 Version, V500R002C00 Version; NIP6300 V500R001C00 Version, V500R001C30 Version; NIP6600 V500R001C00 Version, V500R001C30 Version; RP200 V500R002C00 Version, V600R006C00 Version; S12700 V200R007C00 Version, V200R007C01 Version, V200R008C00 Version, V200R009C00 Version, V200R010C00 Version; S1700 V200R006C10 Version, V200R009C00 Version, V200R010C00 Version; S2700 V200R006C10 Version, V200R007C00 Version, V200R008C00 Version, V200R009C00 Version, V200R010C00 Version; S5700 V200R006C00 Version, V200R007C00 Version, V200R008C00 Version, V200R009C00 Version, V200R010C00 Version; S6700 V200R008C00 Version, V200R009C00 Version, V200R010C00 Version; S7700 V200R007C00 Version, V200R008C00 Version, V200R009C00 Version, V200R010C00 Version; S9700 V200R007C00 Version, V200R007C01 Version, V200R008C00 Version, V200R009C00 Version, V200R010C00 Version; Secospace

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201803-1331",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "te40",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v600r006c00",
         },
         {
            model: "secospace usg6500",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v500r001c00",
         },
         {
            model: "te30",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v500r002c00",
         },
         {
            model: "secospace usg6600",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v500r001c00",
         },
         {
            model: "te40",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v500r002c00",
         },
         {
            model: "secospace usg6600",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v500r001c30s",
         },
         {
            model: "secospace usg6500",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v500r001c30",
         },
         {
            model: "te30",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r001c10",
         },
         {
            model: "te30",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v600r006c00",
         },
         {
            model: "te30",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v100r001c02",
         },
         {
            model: "tp3206",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r002c10",
         },
         {
            model: "ngfw module",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c00",
         },
         {
            model: "rp200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v600r006c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "te60",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v600r006c00",
         },
         {
            model: "secospace usg6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c30",
         },
         {
            model: "usg9500",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c00",
         },
         {
            model: "tp3106",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r002c00",
         },
         {
            model: "ngfw module",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r002c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "rp200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r002c00",
         },
         {
            model: "te60",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r001c02",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "nip6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "te60",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r002c00",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c10",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c01",
         },
         {
            model: "nip6600",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "usg9500",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c30",
         },
         {
            model: "nip6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c30",
         },
         {
            model: "ips module",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c00",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "te60",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r001c10",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "nip6600",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c30",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "dp300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r002c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c10",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "te50",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v600r006c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "tp3206",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r002c00",
         },
         {
            model: "viewpoint 9030",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r011c03",
         },
         {
            model: "viewpoint 9030",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r011c02",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "secospace usg6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c00",
         },
         {
            model: "te50",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r002c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c01",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "ips module",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c30",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "dp300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ips module",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ngfw module",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "nip6300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "nip6600",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "rp200",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "secospace usg6300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "secospace usg6500",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "secospace usg6600",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te30",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te40",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te50",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te60",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "tp3106",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "tp3206",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "usg9500",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "viewpoint 9030",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ips module v500r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "nip6300 v500r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "nip6600 v500r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "secospace usg6300 v500r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "secospace usg6500 v500r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "secospace usg6600 v500r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "dp300 v500r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te60 v100r001c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te60 v100r001c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te60 v500r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te60 v600r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "viewpoint v100r011c03",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "9030",
         },
         {
            model: "viewpoint v100r011c02",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "9030",
         },
         {
            model: "tp3206 v100r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "tp3106 v100r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "rp200 v500r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "rp200 v600r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te30 v100r001c02",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te30 v100r001c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te30 v500r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te30 v600r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te40 v500r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te40 v600r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te50 v500r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te50 v600r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ips module v500r001c30",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "nip6300 v500r001c30",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "nip6600 v500r001c30",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "secospace usg6300 v500r001c30",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "secospace usg6500 v100r001c30",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "tp3206 v100r002c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r006c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r007c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "secospace usg6600 v500r001c30s",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ngfw module v500r001c30",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-38289",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012865",
         },
         {
            db: "NVD",
            id: "CVE-2017-17136",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-129",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r007c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r006c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r006c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r007c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30s:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v100r001c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2017-17136",
         },
      ],
   },
   cve: "CVE-2017-17136",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 2.1,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.9,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "LOW",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Local",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 2.1,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2017-17136",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Low",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "SINGLE",
                  author: "CNVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 4.6,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.1,
                  id: "CNVD-2017-38289",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.6,
                  vectorString: "AV:L/AC:L/Au:S/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "PARTIAL",
                  baseScore: 2.1,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.9,
                  id: "VHN-108128",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "LOW",
                  trust: 0.1,
                  vectorString: "AV:L/AC:L/AU:N/C:N/I:N/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 1.8,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 5.5,
                  baseSeverity: "Medium",
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2017-17136",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "Low",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2017-17136",
                  trust: 1.8,
                  value: "MEDIUM",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2017-38289",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201712-129",
                  trust: 0.6,
                  value: "LOW",
               },
               {
                  author: "VULHUB",
                  id: "VHN-108128",
                  trust: 0.1,
                  value: "LOW",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-38289",
         },
         {
            db: "VULHUB",
            id: "VHN-108128",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012865",
         },
         {
            db: "NVD",
            id: "CVE-2017-17136",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-129",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a heap overflow vulnerability due to insufficient verification. An authenticated local attacker can make processing crash by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service. plural Huawei The product contains a buffer error vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Huawei DP300, IPSModule, and NGFWModule are all products of China Huawei. DP300 is a video conferencing terminal. RP200 is a video conferencing all-in-one device. The following products and versions are affected: Huawei DP300 V500R002C00 Version; IPS Module V500R001C00 Version, V500R001C30 Version; NGFW Module V500R001C00 Version, V500R002C00 Version; NIP6300 V500R001C00 Version, V500R001C30 Version; NIP6600 V500R001C00 Version, V500R001C30 Version; RP200 V500R002C00 Version, V600R006C00 Version; S12700 V200R007C00 Version, V200R007C01 Version, V200R008C00 Version, V200R009C00 Version, V200R010C00 Version; S1700 V200R006C10 Version, V200R009C00 Version, V200R010C00 Version; S2700 V200R006C10 Version, V200R007C00 Version, V200R008C00 Version, V200R009C00 Version, V200R010C00 Version; S5700 V200R006C00 Version, V200R007C00 Version, V200R008C00 Version, V200R009C00 Version, V200R010C00 Version; S6700 V200R008C00 Version, V200R009C00 Version, V200R010C00 Version; S7700 V200R007C00 Version, V200R008C00 Version, V200R009C00 Version, V200R010C00 Version; S9700 V200R007C00 Version, V200R007C01 Version, V200R008C00 Version, V200R009C00 Version, V200R010C00 Version; Secospace",
      sources: [
         {
            db: "NVD",
            id: "CVE-2017-17136",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012865",
         },
         {
            db: "CNVD",
            id: "CNVD-2017-38289",
         },
         {
            db: "VULHUB",
            id: "VHN-108128",
         },
      ],
      trust: 2.25,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2017-17136",
            trust: 3.1,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012865",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-129",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2017-38289",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-108128",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-38289",
         },
         {
            db: "VULHUB",
            id: "VHN-108128",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012865",
         },
         {
            db: "NVD",
            id: "CVE-2017-17136",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-129",
         },
      ],
   },
   id: "VAR-201803-1331",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-38289",
         },
         {
            db: "VULHUB",
            id: "VHN-108128",
         },
      ],
      trust: 1.5648380440740741,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-38289",
         },
      ],
   },
   last_update_date: "2023-12-18T13:52:43.961000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "huawei-sa-20171206-01-pem",
            trust: 0.8,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
         },
         {
            title: "Patches for multiple Huawei product PEM module heap overflow vulnerabilities",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/111827",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-38289",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012865",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-119",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-108128",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012865",
         },
         {
            db: "NVD",
            id: "CVE-2017-17136",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
         },
         {
            trust: 0.8,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-17136",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-17136",
         },
         {
            trust: 0.6,
            url: "http://www.huawei.com/cn/psirt/security-advisories/2017/huawei-sa-20171206-01-pem-cn",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-38289",
         },
         {
            db: "VULHUB",
            id: "VHN-108128",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012865",
         },
         {
            db: "NVD",
            id: "CVE-2017-17136",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-129",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2017-38289",
         },
         {
            db: "VULHUB",
            id: "VHN-108128",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012865",
         },
         {
            db: "NVD",
            id: "CVE-2017-17136",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-129",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-12-27T00:00:00",
            db: "CNVD",
            id: "CNVD-2017-38289",
         },
         {
            date: "2018-03-05T00:00:00",
            db: "VULHUB",
            id: "VHN-108128",
         },
         {
            date: "2018-04-25T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2017-012865",
         },
         {
            date: "2018-03-05T19:29:00.487000",
            db: "NVD",
            id: "CVE-2017-17136",
         },
         {
            date: "2017-12-05T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201712-129",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-12-27T00:00:00",
            db: "CNVD",
            id: "CNVD-2017-38289",
         },
         {
            date: "2018-03-27T00:00:00",
            db: "VULHUB",
            id: "VHN-108128",
         },
         {
            date: "2018-04-25T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2017-012865",
         },
         {
            date: "2018-03-27T15:30:04.670000",
            db: "NVD",
            id: "CVE-2017-17136",
         },
         {
            date: "2018-03-06T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201712-129",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201712-129",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei Product buffer error vulnerability",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2017-012865",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer overflow",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201712-129",
         },
      ],
      trust: 0.6,
   },
}

var-201609-0171
Vulnerability from variot

Huawei S7700, S9300, S9700, and S12700 devices with software before V200R008C00SPC500 use random numbers with insufficient entropy to generate self-signed certificates, which makes it easier for remote attackers to discover private keys by leveraging knowledge of a certificate. HuaweiS7700 is an intelligent routing switch of China Huawei. An insecure random number generation vulnerability exists in several Huawei products. The following products and versions are affected: Huawei S7700, S9300, S9700, and versions earlier than S12700 V200R008C00SPC500

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201609-0171",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "s9300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s7700 v200r003c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r005c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r003c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r005c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r003c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r005c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r005c00",
            scope: null,
            trust: 0.9,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r008c00spc500",
         },
         {
            model: "s7700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r008c00spc500",
         },
         {
            model: "s9300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r008c00spc500",
         },
         {
            model: "s9700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r008c00spc500",
         },
         {
            model: "s6700 v200r005c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r003c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r005c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r003c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r005c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r003c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r005c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r003c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s3700 v100r006c05",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s3300 v100r006c05",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r005c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r003c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v100r006c05",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v200r005c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v200r003c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v100r006c05",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r008c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 v200r008c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r008c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r005sph012",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r005c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r005sph012",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300 v200r005c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r005sph012",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r005c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r005sph012",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300 v200r005c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s3700 v100r006sph028",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s3300 v100r006sph028",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r005sph012",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r005c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v100r006sph028",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v200r005sph012",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v200r005c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v100r006sph028",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r008c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r005c00spc500",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-06343",
         },
         {
            db: "BID",
            id: "92438",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-004560",
         },
         {
            db: "NVD",
            id: "CVE-2016-6670",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201608-286",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei_firmware:s12700:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2016-6670",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Nadia Heninger, Joshua Fried and Marcella Hastings from the University of Pennsylvania, Frank Gifford from FactorMyNumber.com.",
      sources: [
         {
            db: "BID",
            id: "92438",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201608-286",
         },
      ],
      trust: 0.9,
   },
   cve: "CVE-2016-6670",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 5,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2016-6670",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  id: "CNVD-2016-06343",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.6,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  id: "VHN-95490",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 5.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitabilityScore: 3.9,
                  impactScore: 1.4,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
                  version: "3.0",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 5.3,
                  baseSeverity: "Medium",
                  confidentialityImpact: "Low",
                  exploitabilityScore: null,
                  id: "CVE-2016-6670",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2016-6670",
                  trust: 1.8,
                  value: "MEDIUM",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2016-06343",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201608-286",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-95490",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-06343",
         },
         {
            db: "VULHUB",
            id: "VHN-95490",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-004560",
         },
         {
            db: "NVD",
            id: "CVE-2016-6670",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201608-286",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Huawei S7700, S9300, S9700, and S12700 devices with software before V200R008C00SPC500 use random numbers with insufficient entropy to generate self-signed certificates, which makes it easier for remote attackers to discover private keys by leveraging knowledge of a certificate. HuaweiS7700 is an intelligent routing switch of China Huawei. An insecure random number generation vulnerability exists in several Huawei products. The following products and versions are affected: Huawei S7700, S9300, S9700, and versions earlier than S12700 V200R008C00SPC500",
      sources: [
         {
            db: "NVD",
            id: "CVE-2016-6670",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-004560",
         },
         {
            db: "CNVD",
            id: "CNVD-2016-06343",
         },
         {
            db: "BID",
            id: "92438",
         },
         {
            db: "VULHUB",
            id: "VHN-95490",
         },
      ],
      trust: 2.52,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2016-6670",
            trust: 3.4,
         },
         {
            db: "BID",
            id: "92438",
            trust: 2.6,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-004560",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201608-286",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2016-06343",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-95490",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-06343",
         },
         {
            db: "VULHUB",
            id: "VHN-95490",
         },
         {
            db: "BID",
            id: "92438",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-004560",
         },
         {
            db: "NVD",
            id: "CVE-2016-6670",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201608-286",
         },
      ],
   },
   id: "VAR-201609-0171",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-06343",
         },
         {
            db: "VULHUB",
            id: "VHN-95490",
         },
      ],
      trust: 1.4345950231999998,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-06343",
         },
      ],
   },
   last_update_date: "2023-12-18T14:05:56.573000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "huawei-sa-20160810-01-certificate",
            trust: 0.8,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160810-01-certificate-en",
         },
         {
            title: "Patches for multiple Huawei product insecure random number generation vulnerabilities",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/80446",
         },
         {
            title: "Multiple Huawei Repair measures for product insecure random number generation vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=63658",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-06343",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-004560",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201608-286",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-200",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-95490",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-004560",
         },
         {
            db: "NVD",
            id: "CVE-2016-6670",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.3,
            url: "http://www.securityfocus.com/bid/92438",
         },
         {
            trust: 2,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160810-01-certificate-en",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-6670",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-6670",
         },
         {
            trust: 0.3,
            url: "http://www.huawei.com",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-06343",
         },
         {
            db: "VULHUB",
            id: "VHN-95490",
         },
         {
            db: "BID",
            id: "92438",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-004560",
         },
         {
            db: "NVD",
            id: "CVE-2016-6670",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201608-286",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2016-06343",
         },
         {
            db: "VULHUB",
            id: "VHN-95490",
         },
         {
            db: "BID",
            id: "92438",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-004560",
         },
         {
            db: "NVD",
            id: "CVE-2016-6670",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201608-286",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2016-08-17T00:00:00",
            db: "CNVD",
            id: "CNVD-2016-06343",
         },
         {
            date: "2016-09-07T00:00:00",
            db: "VULHUB",
            id: "VHN-95490",
         },
         {
            date: "2016-08-10T00:00:00",
            db: "BID",
            id: "92438",
         },
         {
            date: "2016-09-09T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2016-004560",
         },
         {
            date: "2016-09-07T19:28:13.380000",
            db: "NVD",
            id: "CVE-2016-6670",
         },
         {
            date: "2016-08-15T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201608-286",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2016-08-16T00:00:00",
            db: "CNVD",
            id: "CNVD-2016-06343",
         },
         {
            date: "2016-09-08T00:00:00",
            db: "VULHUB",
            id: "VHN-95490",
         },
         {
            date: "2016-11-24T09:05:00",
            db: "BID",
            id: "92438",
         },
         {
            date: "2016-09-09T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2016-004560",
         },
         {
            date: "2016-09-08T19:14:47.683000",
            db: "NVD",
            id: "CVE-2016-6670",
         },
         {
            date: "2016-09-08T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201608-286",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201608-286",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei Vulnerability of obtaining private key in device software",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2016-004560",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "information disclosure",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201608-286",
         },
      ],
      trust: 0.6,
   },
}

var-201803-1049
Vulnerability from variot

Huawei AR120-S V200R005C32; AR1200 V200R005C32; AR1200-S V200R005C32; AR150 V200R005C32; AR150-S V200R005C32; AR160 V200R005C32; AR200 V200R005C32; AR200-S V200R005C32; AR2200-S V200R005C32; AR3200 V200R005C32; V200R007C00; AR510 V200R005C32; NetEngine16EX V200R005C32; SRG1300 V200R005C32; SRG2300 V200R005C32; SRG3300 V200R005C32 have an out-of-bounds write vulnerability. When a user executes a query command after the device received an abnormal OSPF message, the software writes data past the end of the intended buffer due to the insufficient verification of the input data. An unauthenticated, remote attacker could exploit this vulnerability by sending abnormal OSPF messages to the device. A successful exploit could cause the system to crash. plural Huawei The product contains an out-of-bounds vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Huawei AR120-S is a router product of China Huawei. A security vulnerability exists in several Huawei products due to the failure of the program to properly validate user-submitted data. There are security vulnerabilities in several Huawei products. The following products and versions are affected: Huawei AR120-S V200R005C32 Version; AR1200 V200R005C32 Version; AR1200-S V200R005C32 Version; AR150 V200R005C32 Version; AR150-S V200R005C32 Version; AR160 V200R005C32 Version; AR200 V200R005C32 Version; AR200-S V200R005C32 Version; AR2200- S V200R005C32 version; AR3200 V200R005C32 version; V200R007C00 version; AR510 V200R005C32 version; NetEngine16EX V200R005C32 version;

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201803-1049",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "srg1300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r005c32",
         },
         {
            model: "srg2300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r005c32",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "srg3300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r005c32",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r007c01",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "ar150",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c32",
         },
         {
            model: "ar510",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c32",
         },
         {
            model: "ar3200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "ar2200-s",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c32",
         },
         {
            model: "ar3200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c32",
         },
         {
            model: "ar120-s",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c32",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "ar200-s",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c32",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "ar150-s",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c32",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c10",
         },
         {
            model: "ar160",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c32",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "ar1200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c32",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c01",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "netengine16ex",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c32",
         },
         {
            model: "ar200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c32",
         },
         {
            model: "ar1200-s",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c32",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "ar120-s",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar1200",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar1200-s",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar150",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar150-s",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar160",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar200",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar200-s",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar2200-s",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar3200",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar510",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "netengine16ex",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "srg1300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "srg2300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "srg3300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar3200 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar3200 v200r005c32",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar1200 v200r005c32",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar1200-s v200r005c32",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar160 v200r005c32",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar200 v200r005c32",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar200-s v200r005c32",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar2200-s v200r005c32",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar510 v200r005c32",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "srg1300 v200r005c32",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "srg2300 v200r005c32",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "srg3300 v200r005c32",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar120-s v200r005c32",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar150 v200r005c32",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar150-s v200r005c32",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "netengine16ex v200r005c32",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-05550",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012879",
         },
         {
            db: "NVD",
            id: "CVE-2017-17250",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201803-298",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar120-s_firmware:v200r005c32:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r005c32:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r005c32:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r005c32:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r005c32:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r005c32:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar200-s_firmware:v200r005c32:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar150-s_firmware:v200r005c32:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r005c32:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r005c32:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r005c32:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r005c32:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r007c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r006c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r007c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r005c32:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r005c32:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:srg3300_firmware:v200r005c32:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2017-17250",
         },
      ],
   },
   cve: "CVE-2017-17250",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.1,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 8.6,
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  userInteractionRequired: true,
                  vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Medium",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 7.1,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2017-17250",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "High",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 9.4,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "CNVD-2018-05550",
                  impactScore: 9.2,
                  integrityImpact: "COMPLETE",
                  severity: "HIGH",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:C/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.1,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 8.6,
                  id: "VHN-108254",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "HIGH",
                  trust: 0.1,
                  vectorString: "AV:N/AC:M/AU:N/C:N/I:N/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 6.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 2.8,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 6.5,
                  baseSeverity: "Medium",
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2017-17250",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "Required",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2017-17250",
                  trust: 1.8,
                  value: "MEDIUM",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2018-05550",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201803-298",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULHUB",
                  id: "VHN-108254",
                  trust: 0.1,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-05550",
         },
         {
            db: "VULHUB",
            id: "VHN-108254",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012879",
         },
         {
            db: "NVD",
            id: "CVE-2017-17250",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201803-298",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Huawei AR120-S V200R005C32; AR1200 V200R005C32; AR1200-S V200R005C32; AR150 V200R005C32; AR150-S V200R005C32; AR160 V200R005C32; AR200 V200R005C32; AR200-S V200R005C32; AR2200-S V200R005C32; AR3200 V200R005C32; V200R007C00; AR510 V200R005C32; NetEngine16EX V200R005C32; SRG1300 V200R005C32; SRG2300 V200R005C32; SRG3300 V200R005C32 have an out-of-bounds write vulnerability. When a user executes a query command after the device received an abnormal OSPF message, the software writes data past the end of the intended buffer due to the insufficient verification of the input data. An unauthenticated, remote attacker could exploit this vulnerability by sending abnormal OSPF messages to the device. A successful exploit could cause the system to crash. plural Huawei The product contains an out-of-bounds vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Huawei AR120-S is a router product of China Huawei. A security vulnerability exists in several Huawei products due to the failure of the program to properly validate user-submitted data. There are security vulnerabilities in several Huawei products. The following products and versions are affected: Huawei AR120-S V200R005C32 Version; AR1200 V200R005C32 Version; AR1200-S V200R005C32 Version; AR150 V200R005C32 Version; AR150-S V200R005C32 Version; AR160 V200R005C32 Version; AR200 V200R005C32 Version; AR200-S V200R005C32 Version; AR2200- S V200R005C32 version; AR3200 V200R005C32 version; V200R007C00 version; AR510 V200R005C32 version; NetEngine16EX V200R005C32 version;",
      sources: [
         {
            db: "NVD",
            id: "CVE-2017-17250",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012879",
         },
         {
            db: "CNVD",
            id: "CNVD-2018-05550",
         },
         {
            db: "VULHUB",
            id: "VHN-108254",
         },
      ],
      trust: 2.25,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2017-17250",
            trust: 3.1,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012879",
            trust: 0.8,
         },
         {
            db: "CNVD",
            id: "CNVD-2018-05550",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201803-298",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-108254",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-05550",
         },
         {
            db: "VULHUB",
            id: "VHN-108254",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012879",
         },
         {
            db: "NVD",
            id: "CVE-2017-17250",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201803-298",
         },
      ],
   },
   id: "VAR-201803-1049",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-05550",
         },
         {
            db: "VULHUB",
            id: "VHN-108254",
         },
      ],
      trust: 1.5658588095238095,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-05550",
         },
      ],
   },
   last_update_date: "2023-12-18T13:24:09.690000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "huawei-sa-20180214-01-ospf",
            trust: 0.8,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180214-01-ospf-en",
         },
         {
            title: "Huawei's multiple products cross-border write vulnerability patches",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/121889",
         },
         {
            title: "Multiple Huawei Product security vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=79020",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-05550",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012879",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201803-298",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-787",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-108254",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012879",
         },
         {
            db: "NVD",
            id: "CVE-2017-17250",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180214-01-ospf-en",
         },
         {
            trust: 0.8,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-17250",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-17250",
         },
         {
            trust: 0.6,
            url: "http://www.huawei.com/cn/psirt/security-advisories/2018/huawei-sa-20180214-01-ospf-cn",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-05550",
         },
         {
            db: "VULHUB",
            id: "VHN-108254",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012879",
         },
         {
            db: "NVD",
            id: "CVE-2017-17250",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201803-298",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2018-05550",
         },
         {
            db: "VULHUB",
            id: "VHN-108254",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012879",
         },
         {
            db: "NVD",
            id: "CVE-2017-17250",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201803-298",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2018-03-19T00:00:00",
            db: "CNVD",
            id: "CNVD-2018-05550",
         },
         {
            date: "2018-03-09T00:00:00",
            db: "VULHUB",
            id: "VHN-108254",
         },
         {
            date: "2018-04-26T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2017-012879",
         },
         {
            date: "2018-03-09T17:29:01.547000",
            db: "NVD",
            id: "CVE-2017-17250",
         },
         {
            date: "2018-03-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201803-298",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2018-03-19T00:00:00",
            db: "CNVD",
            id: "CNVD-2018-05550",
         },
         {
            date: "2018-03-29T00:00:00",
            db: "VULHUB",
            id: "VHN-108254",
         },
         {
            date: "2018-04-26T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2017-012879",
         },
         {
            date: "2018-03-29T13:10:25.087000",
            db: "NVD",
            id: "CVE-2017-17250",
         },
         {
            date: "2018-03-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201803-298",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201803-298",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei Vulnerability related to out-of-bounds writing in products",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2017-012879",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "lack of information",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201803-298",
         },
      ],
      trust: 0.6,
   },
}

var-201906-0055
Vulnerability from variot

Some Huawei S series switches have a DoS vulnerability. An unauthenticated remote attacker can send crafted packets to the affected device to exploit this vulnerability. Due to insufficient verification of the packets, successful exploitation may cause the device reboot and denial of service (DoS) condition. (Vulnerability ID: HWPSIRT-2019-03109). Vendors have confirmed this vulnerability HWPSIRT-2019-03109 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state. HuaweiS12700 is an enterprise-class switch product from China's Huawei company. The vulnerability stems from the program's insufficient verification of specific parameters of Http messages. The following products and versions are affected: Huawei S12700 V200R005C00 Version, V200R006C00 Version, V200R007C00 Version, V200R008C00 Version, V200R010C00 Version, V200R012C00 Version, V200R013C00 Version, V200R011C10 Version; S1700 V200R008C00 Version, V200R009C00 Version, V200R010C00 Version, V200R011C10 Version, V200R012C00 Version, V200R013C00 version; S2300 V200R003C00 version, etc

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201906-0055",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r012c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r012c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r013c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r012c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r012c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s9300x",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r012c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r012c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s7900",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r013c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s600-e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r013c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r013c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r013c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s600-e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r012c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r012c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r013c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s600-e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r013c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s600-e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r012c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r013c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s9300x",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r013c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r013c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r013c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r012c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r012c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s600-e",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r013c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s9300x",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r013c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s7900",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r012c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c10",
         },
         {
            model: "s9300x",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r012c00",
         },
         {
            model: "s7900",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r013c00",
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r012c00",
         },
         {
            model: "s12700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s600-e",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 v200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r012c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r013c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r011c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700 v200r011c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700 v200r012c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2019-25515",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-005143",
         },
         {
            db: "NVD",
            id: "CVE-2019-5285",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r012c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r013c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r013c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r012c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v200r013c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:v200r012c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r012c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r013c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r012c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r013c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r013c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r012c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s600-e_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s600-e_firmware:v200r013c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s600-e_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s600-e_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s600-e_firmware:v200r012c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s600-e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r013c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r012c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r012c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r013c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6700:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r013c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r012c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7900_firmware:v200r012c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7900_firmware:v200r013c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7900_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7900:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r013c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r008c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r012c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300x_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300x_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300x_firmware:v200r012c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300x_firmware:v200r013c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9300x:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r012c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r013c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r011c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2019-5285",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "This vulnerability is by Chi Anxin  Codesafe Team of Legendsec of eack Report to Huawei PSIRT .",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201905-947",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2019-5285",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 7.8,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2019-5285",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "High",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "CNVD-2019-25515",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "HIGH",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "VHN-156720",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "HIGH",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.9,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.5,
                  baseSeverity: "High",
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2019-5285",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2019-5285",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2019-25515",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201905-947",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULHUB",
                  id: "VHN-156720",
                  trust: 0.1,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2019-25515",
         },
         {
            db: "VULHUB",
            id: "VHN-156720",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-005143",
         },
         {
            db: "NVD",
            id: "CVE-2019-5285",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201905-947",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Some Huawei S series switches have a DoS vulnerability. An unauthenticated remote attacker can send crafted packets to the affected device to exploit this vulnerability. Due to insufficient verification of the packets, successful exploitation may cause the device reboot and denial of service (DoS) condition. (Vulnerability ID: HWPSIRT-2019-03109). Vendors have confirmed this vulnerability HWPSIRT-2019-03109 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state. HuaweiS12700 is an enterprise-class switch product from China's Huawei company. The vulnerability stems from the program's insufficient verification of specific parameters of Http messages. The following products and versions are affected: Huawei S12700 V200R005C00 Version, V200R006C00 Version, V200R007C00 Version, V200R008C00 Version, V200R010C00 Version, V200R012C00 Version, V200R013C00 Version, V200R011C10 Version; S1700 V200R008C00 Version, V200R009C00 Version, V200R010C00 Version, V200R011C10 Version, V200R012C00 Version, V200R013C00 version; S2300 V200R003C00 version, etc",
      sources: [
         {
            db: "NVD",
            id: "CVE-2019-5285",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-005143",
         },
         {
            db: "CNVD",
            id: "CNVD-2019-25515",
         },
         {
            db: "VULHUB",
            id: "VHN-156720",
         },
      ],
      trust: 2.25,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2019-5285",
            trust: 3.1,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-005143",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201905-947",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2019-25515",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-156720",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2019-25515",
         },
         {
            db: "VULHUB",
            id: "VHN-156720",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-005143",
         },
         {
            db: "NVD",
            id: "CVE-2019-5285",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201905-947",
         },
      ],
   },
   id: "VAR-201906-0055",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2019-25515",
         },
         {
            db: "VULHUB",
            id: "VHN-156720",
         },
      ],
      trust: 1.49839577625,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2019-25515",
         },
      ],
   },
   last_update_date: "2023-12-18T13:02:13.082000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "huawei-sa-20190522-01-switch",
            trust: 0.8,
            url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190522-01-switch-en",
         },
         {
            title: "Multiple HuaweiS series switches enter patches for verification error vulnerabilities",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/172831",
         },
         {
            title: "Multiple Huawei S Repair measures for series switch security vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=92902",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2019-25515",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-005143",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201905-947",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-20",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-156720",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-005143",
         },
         {
            db: "NVD",
            id: "CVE-2019-5285",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 3.4,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190522-01-switch-en",
         },
         {
            trust: 1.8,
            url: "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20190522-01-switch-cn",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-5285",
         },
         {
            trust: 0.8,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-5285",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2019-25515",
         },
         {
            db: "VULHUB",
            id: "VHN-156720",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-005143",
         },
         {
            db: "NVD",
            id: "CVE-2019-5285",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201905-947",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2019-25515",
         },
         {
            db: "VULHUB",
            id: "VHN-156720",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-005143",
         },
         {
            db: "NVD",
            id: "CVE-2019-5285",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201905-947",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2019-08-02T00:00:00",
            db: "CNVD",
            id: "CNVD-2019-25515",
         },
         {
            date: "2019-06-04T00:00:00",
            db: "VULHUB",
            id: "VHN-156720",
         },
         {
            date: "2019-06-17T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2019-005143",
         },
         {
            date: "2019-06-04T19:29:00.477000",
            db: "NVD",
            id: "CVE-2019-5285",
         },
         {
            date: "2019-05-22T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201905-947",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2019-08-02T00:00:00",
            db: "CNVD",
            id: "CNVD-2019-25515",
         },
         {
            date: "2019-07-26T00:00:00",
            db: "VULHUB",
            id: "VHN-156720",
         },
         {
            date: "2019-06-17T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2019-005143",
         },
         {
            date: "2019-07-26T11:15:11.877000",
            db: "NVD",
            id: "CVE-2019-5285",
         },
         {
            date: "2019-07-29T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201905-947",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201905-947",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei S Series switch vulnerability in input confirmation",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2019-005143",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "input validation error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201905-947",
         },
      ],
      trust: 0.6,
   },
}

var-202110-1287
Vulnerability from variot

There is an out of bounds write vulnerability in some Huawei products. The vulnerability is caused by a function of a module that does not properly verify input parameter. Successful exploit could cause out of bounds write leading to a denial of service condition.Affected product versions include:IPS Module V500R005C00,V500R005C20;NGFW Module V500R005C00;NIP6600 V500R005C00,V500R005C20;S12700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600,V200R013C00SPC500,V200R019C00SPC200,V200R019C00SPC500,V200R019C10SPC200,V200R020C00,V200R020C10;S1700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S2700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S5700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600,V200R019C00SPC500;S6700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S7700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600;S9700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;USG9500 V500R005C00,V500R005C20. plural Huawei The product contains a vulnerability related to out-of-bounds writes.Service operation interruption (DoS) It may be in a state. Huawei Ngfw Module is a firewall module of China's Huawei (Huawei) company. Huawei IPS Module is an intrusion prevention system (IPS) module of China's Huawei (Huawei) company. Huawei S5700, Huawei S12700, Huawei S2700 and Huawei S6700 are all enterprise-class switch products of China's Huawei (Huawei)

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1287",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10spc600",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r020c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00spc600",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00spc700",
         },
         {
            model: "nip6600",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r005c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r019c10spc200",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10spc500",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r020c10",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10spc600",
         },
         {
            model: "ngfw module",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r005c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r013c00spc500",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10spc500",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10spc600",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r019c00spc500",
         },
         {
            model: "ips module",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r005c20",
         },
         {
            model: "usg9500",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r005c20",
         },
         {
            model: "usg9500",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r005c00",
         },
         {
            model: "ips module",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r005c00",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10spc500",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10spc600",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10spc500",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10spc600",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r019c00spc500",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00spc600",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10spc500",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r019c00spc200",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10spc600",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10spc500",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10spc600",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00spc600",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00spc600",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00spc600",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r011c10spc500",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00spc600",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00spc700",
         },
         {
            model: "nip6600",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r005c20",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00spc600",
         },
         {
            model: "ngfw module",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ips module",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "nip6600",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "usg9500",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r010c00spc600",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "nip6600 v500r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "usg9500 v500r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ngfw module v500r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ips module v500r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ips module v500r005c20",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "nip6600 v500r005c20",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r010c00spc600",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r011c10spc500",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r011c10spc600",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r013c00spc500",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r019c00spc200",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r019c00spc500",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r019c10spc200",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r020c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r020c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700 v200r010c00spc600",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700 v200r011c10spc500",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700 v200r011c10spc600",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r010c00spc600",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r011c10spc500",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r011c10spc600",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r010c00spc600",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r010c00spc700",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r011c10spc500",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r011c10spc600",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r011c10spc500",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r011c10spc600",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r010c00spc600",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r010c00spc700",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r011c10spc500",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r011c10spc600",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r010c00spc600",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r011c10spc500",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r011c10spc600",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "usg9500 v500r005c20",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2021-83543",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-014145",
         },
         {
            db: "NVD",
            id: "CVE-2021-37129",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ips_module_firmware:v500r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ips_module_firmware:v500r005c20:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:nip6600_firmware:v500r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:nip6600_firmware:v500r005c20:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r010c00spc600:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r011c10spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r011c10spc600:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r013c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r019c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r019c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r019c10spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r020c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r020c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r010c00spc600:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r011c10spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r011c10spc600:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r010c00spc600:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r011c10spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r011c10spc600:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r010c00spc600:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r010c00spc700:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r011c10spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r011c10spc600:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r019c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r010c00spc600:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r011c10spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r011c10spc600:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r010c00spc600:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r010c00spc700:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r011c10spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r011c10spc600:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r010c00spc600:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r011c10spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r011c10spc600:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c20:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-37129",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The vulnerability was discovered by Huawei's internal testing",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202110-1063",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2021-37129",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 5,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2021-37129",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "CNVD-2021-83543",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.9,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.5,
                  baseSeverity: "High",
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2021-37129",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2021-37129",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2021-83543",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202110-1063",
                  trust: 0.6,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2021-83543",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-014145",
         },
         {
            db: "NVD",
            id: "CVE-2021-37129",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202110-1063",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "There is an out of bounds write vulnerability in some Huawei products. The vulnerability is caused by a function of a module that does not properly verify input parameter. Successful exploit could cause out of bounds write leading to a denial of service condition.Affected product versions include:IPS Module V500R005C00,V500R005C20;NGFW Module V500R005C00;NIP6600 V500R005C00,V500R005C20;S12700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600,V200R013C00SPC500,V200R019C00SPC200,V200R019C00SPC500,V200R019C10SPC200,V200R020C00,V200R020C10;S1700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S2700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S5700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600,V200R019C00SPC500;S6700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S7700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600;S9700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;USG9500 V500R005C00,V500R005C20. plural Huawei The product contains a vulnerability related to out-of-bounds writes.Service operation interruption (DoS) It may be in a state. Huawei Ngfw Module is a firewall module of China's Huawei (Huawei) company. Huawei IPS Module is an intrusion prevention system (IPS) module of China's Huawei (Huawei) company. Huawei S5700, Huawei S12700, Huawei S2700 and Huawei S6700 are all enterprise-class switch products of China's Huawei (Huawei)",
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-37129",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-014145",
         },
         {
            db: "CNVD",
            id: "CNVD-2021-83543",
         },
      ],
      trust: 2.16,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2021-37129",
            trust: 3.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-014145",
            trust: 0.8,
         },
         {
            db: "CNVD",
            id: "CNVD-2021-83543",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021102123",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202110-1063",
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2021-83543",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-014145",
         },
         {
            db: "NVD",
            id: "CVE-2021-37129",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202110-1063",
         },
      ],
   },
   id: "VAR-202110-1287",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2021-83543",
         },
      ],
      trust: 1.4034704078260871,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2021-83543",
         },
      ],
   },
   last_update_date: "2023-12-18T12:42:17.185000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "huawei-sa-20211020-01-outofwrite",
            trust: 0.8,
            url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-outofwrite-en",
         },
         {
            title: "Patch for Multiple Huawei products out-of-bounds writing vulnerabilities",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/296301",
         },
         {
            title: "Huawei Ngfw Module Buffer error vulnerability fix",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=167816",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2021-83543",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-014145",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202110-1063",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-787",
            trust: 1,
         },
         {
            problemtype: "Out-of-bounds writing (CWE-787) [NVD evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-014145",
         },
         {
            db: "NVD",
            id: "CVE-2021-37129",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.6,
            url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-outofwrite-en",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2021-37129",
         },
         {
            trust: 1.2,
            url: "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20211020-01-outofwrite-cn",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021102123",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2021-83543",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-014145",
         },
         {
            db: "NVD",
            id: "CVE-2021-37129",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202110-1063",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2021-83543",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-014145",
         },
         {
            db: "NVD",
            id: "CVE-2021-37129",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202110-1063",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-10-18T00:00:00",
            db: "CNVD",
            id: "CNVD-2021-83543",
         },
         {
            date: "2022-10-06T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2021-014145",
         },
         {
            date: "2021-10-27T01:15:07.763000",
            db: "NVD",
            id: "CVE-2021-37129",
         },
         {
            date: "2021-10-15T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202110-1063",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-11-03T00:00:00",
            db: "CNVD",
            id: "CNVD-2021-83543",
         },
         {
            date: "2022-10-06T04:50:00",
            db: "JVNDB",
            id: "JVNDB-2021-014145",
         },
         {
            date: "2021-10-28T17:04:45.680000",
            db: "NVD",
            id: "CVE-2021-37129",
         },
         {
            date: "2021-11-02T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202110-1063",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202110-1063",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei  Out-of-bounds write vulnerabilities in the product",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-014145",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202110-1063",
         },
      ],
      trust: 0.6,
   },
}

var-201803-1332
Vulnerability from variot

PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has an Out-of-Bounds memory access vulnerability due to insufficient verification. An authenticated local attacker can make processing crash by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service. plural Huawei The product contains an out-of-bounds vulnerability and an out-of-bounds vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Huawei DP300, IPSModule, and NGFWModule are all products of China Huawei. DP300 is a video conferencing terminal. RP200 is a video conferencing all-in-one device. PEM module is one of the security modules. There are security vulnerabilities in the PEM modules in several Huawei products. The vulnerability is caused by insufficient verification of the program. The following products and versions are affected: Huawei DP300 V500R002C00 Version; IPS Module V500R001C00 Version, V500R001C30 Version; NGFW Module V500R001C00 Version, V500R002C00 Version; NIP6300 V500R001C00 Version, V500R001C30 Version; NIP6600 V500R001C00 Version, V500R001C30 Version; RP200 V500R002C00 Version, V600R006C00 Version; S12700 V200R007C00 Version, V200R007C01 Version, V200R008C00 Version, V200R009C00 Version, V200R010C00 Version; S1700 V200R006C10 Version, V200R009C00 Version, V200R010C00 Version; S2700 V200R006C10 Version, V200R007C00 Version, V200R008C00 Version, V200R009C00 Version, V200R010C00 Version; S5700 V200R006C00 Version, V200R007C00 Version, V200R008C00 Version, V200R009C00 Version, V200R010C00 Version; S6700 V200R008C00 Version, V200R009C00 Version, V200R010C00 Version; S7700 V200R007C00 Version, V200R008C00 Version, V200R009C00 Version, V200R010C00 Version; S9700 V200R007C00 Version, V200R007C01 Version, V200R008C00 Version, V200R009C00 Version, V200R010C00 Version; Secospace

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201803-1332",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "secospace usg6300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v500r001c30",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r007c01",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "secospace usg6300",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v500r001c00",
         },
         {
            model: "te40",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v600r006c00",
         },
         {
            model: "secospace usg6500",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c00",
         },
         {
            model: "te30",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r002c00",
         },
         {
            model: "tp3206",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r002c10",
         },
         {
            model: "ngfw module",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c00",
         },
         {
            model: "rp200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v600r006c00",
         },
         {
            model: "secospace usg6600",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c00",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "te60",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v600r006c00",
         },
         {
            model: "te40",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r002c00",
         },
         {
            model: "usg9500",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c00",
         },
         {
            model: "tp3106",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r002c00",
         },
         {
            model: "ngfw module",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r002c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "secospace usg6600",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c30s",
         },
         {
            model: "rp200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r002c00",
         },
         {
            model: "te60",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r001c02",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "nip6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "te60",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r002c00",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "secospace usg6500",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c30",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c10",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "nip6600",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "usg9500",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c30",
         },
         {
            model: "te30",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r001c10",
         },
         {
            model: "nip6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c30",
         },
         {
            model: "ips module",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c00",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "te60",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r001c10",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00",
         },
         {
            model: "nip6600",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c30",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "dp300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r002c00",
         },
         {
            model: "s1700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c10",
         },
         {
            model: "te50",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v600r006c00",
         },
         {
            model: "s2700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r009c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "tp3206",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r002c00",
         },
         {
            model: "viewpoint 9030",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r011c03",
         },
         {
            model: "viewpoint 9030",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r011c02",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r010c00",
         },
         {
            model: "te30",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v600r006c00",
         },
         {
            model: "te50",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r002c00",
         },
         {
            model: "s12700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c01",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r008c00",
         },
         {
            model: "ips module",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v500r001c30",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r007c00",
         },
         {
            model: "te30",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v100r001c02",
         },
         {
            model: "dp300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ips module",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ngfw module",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "nip6300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "nip6600",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "rp200",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "secospace usg6300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "secospace usg6500",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "secospace usg6600",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te30",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te40",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te50",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te60",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "tp3106",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "tp3206",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "usg9500",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "viewpoint 9030",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ips module v500r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ngfw module v500r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "nip6300 v500r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "nip6600 v500r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "secospace usg6300 v500r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "secospace usg6500 v500r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "secospace usg6600 v500r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r007c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "dp300 v500r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te60 v100r001c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te60 v100r001c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te60 v500r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te60 v600r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "viewpoint v100r011c03",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "9030",
         },
         {
            model: "viewpoint v100r011c02",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "9030",
         },
         {
            model: "tp3206 v100r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "tp3106 v100r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "rp200 v500r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "rp200 v600r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te30 v100r001c02",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te30 v100r001c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te30 v500r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te30 v600r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te40 v500r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te40 v600r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te50 v500r002c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "te50 v600r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ips module v500r001c30",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "nip6300 v500r001c30",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "nip6600 v500r001c30",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "secospace usg6300 v500r001c30",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "secospace usg6500 v500r001c30",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "usg9500 v500r001c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "usg9500 v500r001c30",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "tp3206 v100r002c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "secospace usg6600 v500r001c30",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r007c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r008c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700 v200r006c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s1700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r006c10",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r007c01",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r010c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 v200r009c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ngfw module v500r001c30",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-38290",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012866",
         },
         {
            db: "NVD",
            id: "CVE-2017-17137",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-306",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r007c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s1700_firmware:v200r006c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r006c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r010c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r007c01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r009c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30s:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v100r001c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2017-17137",
         },
      ],
   },
   cve: "CVE-2017-17137",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 2.1,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.9,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "LOW",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Local",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 2.1,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2017-17137",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Low",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "SINGLE",
                  author: "CNVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 4.6,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.1,
                  id: "CNVD-2017-38290",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.6,
                  vectorString: "AV:L/AC:L/Au:S/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "PARTIAL",
                  baseScore: 2.1,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.9,
                  id: "VHN-108129",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "LOW",
                  trust: 0.1,
                  vectorString: "AV:L/AC:L/AU:N/C:N/I:N/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 1.8,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 5.5,
                  baseSeverity: "Medium",
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2017-17137",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "Low",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2017-17137",
                  trust: 1.8,
                  value: "MEDIUM",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2017-38290",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201712-306",
                  trust: 0.6,
                  value: "LOW",
               },
               {
                  author: "VULHUB",
                  id: "VHN-108129",
                  trust: 0.1,
                  value: "LOW",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-38290",
         },
         {
            db: "VULHUB",
            id: "VHN-108129",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012866",
         },
         {
            db: "NVD",
            id: "CVE-2017-17137",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-306",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has an Out-of-Bounds memory access vulnerability due to insufficient verification. An authenticated local attacker can make processing crash by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service. plural Huawei The product contains an out-of-bounds vulnerability and an out-of-bounds vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Huawei DP300, IPSModule, and NGFWModule are all products of China Huawei. DP300 is a video conferencing terminal. RP200 is a video conferencing all-in-one device. PEM module is one of the security modules. There are security vulnerabilities in the PEM modules in several Huawei products. The vulnerability is caused by insufficient verification of the program. The following products and versions are affected: Huawei DP300 V500R002C00 Version; IPS Module V500R001C00 Version, V500R001C30 Version; NGFW Module V500R001C00 Version, V500R002C00 Version; NIP6300 V500R001C00 Version, V500R001C30 Version; NIP6600 V500R001C00 Version, V500R001C30 Version; RP200 V500R002C00 Version, V600R006C00 Version; S12700 V200R007C00 Version, V200R007C01 Version, V200R008C00 Version, V200R009C00 Version, V200R010C00 Version; S1700 V200R006C10 Version, V200R009C00 Version, V200R010C00 Version; S2700 V200R006C10 Version, V200R007C00 Version, V200R008C00 Version, V200R009C00 Version, V200R010C00 Version; S5700 V200R006C00 Version, V200R007C00 Version, V200R008C00 Version, V200R009C00 Version, V200R010C00 Version; S6700 V200R008C00 Version, V200R009C00 Version, V200R010C00 Version; S7700 V200R007C00 Version, V200R008C00 Version, V200R009C00 Version, V200R010C00 Version; S9700 V200R007C00 Version, V200R007C01 Version, V200R008C00 Version, V200R009C00 Version, V200R010C00 Version; Secospace",
      sources: [
         {
            db: "NVD",
            id: "CVE-2017-17137",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012866",
         },
         {
            db: "CNVD",
            id: "CNVD-2017-38290",
         },
         {
            db: "VULHUB",
            id: "VHN-108129",
         },
      ],
      trust: 2.25,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2017-17137",
            trust: 3.1,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012866",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-306",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2017-38290",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-108129",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-38290",
         },
         {
            db: "VULHUB",
            id: "VHN-108129",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012866",
         },
         {
            db: "NVD",
            id: "CVE-2017-17137",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-306",
         },
      ],
   },
   id: "VAR-201803-1332",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-38290",
         },
         {
            db: "VULHUB",
            id: "VHN-108129",
         },
      ],
      trust: 1.5710059250847457,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-38290",
         },
      ],
   },
   last_update_date: "2023-12-18T13:57:05.994000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "huawei-sa-20171206-01-pem",
            trust: 0.8,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
         },
         {
            title: "Patches for multiple Huawei product PEM module memory out-of-bounds access vulnerabilities",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/111829",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-38290",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012866",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-125",
            trust: 1.9,
         },
         {
            problemtype: "CWE-787",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-108129",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012866",
         },
         {
            db: "NVD",
            id: "CVE-2017-17137",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
         },
         {
            trust: 0.8,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-17137",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-17137",
         },
         {
            trust: 0.6,
            url: "http://www.huawei.com/cn/psirt/security-advisories/2017/huawei-sa-20171206-01-pem-cn",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-38290",
         },
         {
            db: "VULHUB",
            id: "VHN-108129",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012866",
         },
         {
            db: "NVD",
            id: "CVE-2017-17137",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-306",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2017-38290",
         },
         {
            db: "VULHUB",
            id: "VHN-108129",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-012866",
         },
         {
            db: "NVD",
            id: "CVE-2017-17137",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201712-306",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-12-27T00:00:00",
            db: "CNVD",
            id: "CNVD-2017-38290",
         },
         {
            date: "2018-03-05T00:00:00",
            db: "VULHUB",
            id: "VHN-108129",
         },
         {
            date: "2018-04-25T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2017-012866",
         },
         {
            date: "2018-03-05T19:29:00.533000",
            db: "NVD",
            id: "CVE-2017-17137",
         },
         {
            date: "2017-12-07T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201712-306",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-12-27T00:00:00",
            db: "CNVD",
            id: "CNVD-2017-38290",
         },
         {
            date: "2018-03-27T00:00:00",
            db: "VULHUB",
            id: "VHN-108129",
         },
         {
            date: "2018-04-25T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2017-012866",
         },
         {
            date: "2018-03-27T17:13:23.177000",
            db: "NVD",
            id: "CVE-2017-17137",
         },
         {
            date: "2018-03-06T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201712-306",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201712-306",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei Product out-of-bounds vulnerability",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2017-012866",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "lack of information",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201712-306",
         },
      ],
      trust: 0.6,
   },
}

var-201709-0089
Vulnerability from variot

Huawei S7700, S9700, S9300 before V200R07C00SPC500, and AR200, AR1200, AR2200, AR3200 before V200R005C20SPC200 allows attackers with physical access to the CF card to obtain sensitive information. plural Huawei The product contains an information disclosure vulnerability.Information may be obtained. Huawei S7700 is a product of China Huawei. The Huawei S7700, S9700, and S9300 are intelligent routing switches. Huawei AR200, AR1200, AR2200, and AR3200 are multi-service routers for enterprises. Multiple Huawei products are prone to a local information-disclosure vulnerability. Several Huawei products have security vulnerabilities. The following products and versions are affected: Huawei S7700 V200R005C20SPC200 previous version; S9700 V200R005C20SPC200 previous version; S9300 V200R005C20SPC200 previous version; AR200 V200R005C20SPC200 Version; AR1200 V200R005C20SPC200 Version; AR2200 V200R005C20SPC200 Version; AR3200 V200R005C20SPC200 Version

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201709-0089",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "ar3200",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c01spc900",
         },
         {
            model: "ar3200",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c01spc500",
         },
         {
            model: "ar3200",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c01spc200",
         },
         {
            model: "ar200",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c01spc800",
         },
         {
            model: "ar3200",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c01spc300",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00spc500",
         },
         {
            model: "ar3200",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c01spc600",
         },
         {
            model: "ar3200",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c01spc100",
         },
         {
            model: "ar3200",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00spc200",
         },
         {
            model: "ar3200",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c01spc800",
         },
         {
            model: "s9300",
            scope: null,
            trust: 1.4,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700",
            scope: null,
            trust: 1.4,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700",
            scope: null,
            trust: 1.4,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc500",
         },
         {
            model: "ar3200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc100",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00spc300",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc300",
         },
         {
            model: "ar2200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc500",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00spc500",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc100",
         },
         {
            model: "ar200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc600",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "ar2200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc200",
         },
         {
            model: "ar1200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc500",
         },
         {
            model: "ar2200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc300",
         },
         {
            model: "ar200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc100",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc500",
         },
         {
            model: "ar1200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc200",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00spc300",
         },
         {
            model: "ar200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc200",
         },
         {
            model: "ar1200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc300",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc100",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00spc500",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "ar2200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc600",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc300",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00spc300",
         },
         {
            model: "ar200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc900",
         },
         {
            model: "ar200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc100",
         },
         {
            model: "ar1200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc600",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc100",
         },
         {
            model: "ar2200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc100",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "ar2200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc800",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r006c00spc500",
         },
         {
            model: "ar2200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc200",
         },
         {
            model: "ar200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc500",
         },
         {
            model: "ar1200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc100",
         },
         {
            model: "ar1200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc800",
         },
         {
            model: "ar2200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc100",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc300",
         },
         {
            model: "ar1200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc200",
         },
         {
            model: "ar2200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc900",
         },
         {
            model: "ar200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc200",
         },
         {
            model: "ar200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc300",
         },
         {
            model: "ar1200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc900",
         },
         {
            model: "ar1200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc100",
         },
         {
            model: "ar1200",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar200",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar2200",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar3200",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "200",
         },
         {
            model: "ar",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "1200",
         },
         {
            model: "ar",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "2200",
         },
         {
            model: "ar",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "3200",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2015-07754",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007987",
         },
         {
            db: "NVD",
            id: "CVE-2015-7846",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201511-303",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r006c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r006c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r006c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r003c01spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r003c01spc600:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r003c01spc800:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r003c01spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r003c01spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r003c01spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r003c01spc800:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r003c01spc600:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r003c01spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r003c01spc600:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r003c01spc800:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r003c01spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r003c01spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r003c01spc600:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r003c01spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r003c01spc800:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2015-7846",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Mickey Shkatov from Intel Advanced Threat Research Team and Jesse Michael from Intel.",
      sources: [
         {
            db: "BID",
            id: "76173",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201511-303",
         },
      ],
      trust: 0.9,
   },
   cve: "CVE-2015-7846",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 2.1,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 3.9,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "LOW",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Local",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 2.1,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2015-7846",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Low",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "NONE",
                  baseScore: 2.1,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 3.9,
                  id: "CNVD-2015-07754",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "LOW",
                  trust: 0.6,
                  vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 2.1,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 3.9,
                  id: "VHN-85807",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "LOW",
                  trust: 0.1,
                  vectorString: "AV:L/AC:L/AU:N/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "PHYSICAL",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 4.6,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 0.9,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.0",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Physical",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 4.6,
                  baseSeverity: "Medium",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2015-7846",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2015-7846",
                  trust: 1.8,
                  value: "MEDIUM",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2015-07754",
                  trust: 0.6,
                  value: "LOW",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201511-303",
                  trust: 0.6,
                  value: "LOW",
               },
               {
                  author: "VULHUB",
                  id: "VHN-85807",
                  trust: 0.1,
                  value: "LOW",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2015-07754",
         },
         {
            db: "VULHUB",
            id: "VHN-85807",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007987",
         },
         {
            db: "NVD",
            id: "CVE-2015-7846",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201511-303",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Huawei S7700, S9700, S9300 before V200R07C00SPC500, and AR200, AR1200, AR2200, AR3200 before V200R005C20SPC200 allows attackers with physical access to the CF card to obtain sensitive information. plural Huawei The product contains an information disclosure vulnerability.Information may be obtained. Huawei S7700 is a product of China Huawei. The Huawei S7700, S9700, and S9300 are intelligent routing switches. Huawei AR200, AR1200, AR2200, and AR3200 are multi-service routers for enterprises. Multiple Huawei products are prone to a local information-disclosure vulnerability. Several Huawei products have security vulnerabilities. The following products and versions are affected: Huawei S7700 V200R005C20SPC200 previous version; S9700 V200R005C20SPC200 previous version; S9300 V200R005C20SPC200 previous version; AR200 V200R005C20SPC200 Version; AR1200 V200R005C20SPC200 Version; AR2200 V200R005C20SPC200 Version; AR3200 V200R005C20SPC200 Version",
      sources: [
         {
            db: "NVD",
            id: "CVE-2015-7846",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007987",
         },
         {
            db: "CNVD",
            id: "CNVD-2015-07754",
         },
         {
            db: "BID",
            id: "76173",
         },
         {
            db: "VULHUB",
            id: "VHN-85807",
         },
      ],
      trust: 2.52,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2015-7846",
            trust: 3.4,
         },
         {
            db: "BID",
            id: "76173",
            trust: 2.6,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007987",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201511-303",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2015-07754",
            trust: 0.6,
         },
         {
            db: "SEEBUG",
            id: "SSVID-89913",
            trust: 0.1,
         },
         {
            db: "VULHUB",
            id: "VHN-85807",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2015-07754",
         },
         {
            db: "VULHUB",
            id: "VHN-85807",
         },
         {
            db: "BID",
            id: "76173",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007987",
         },
         {
            db: "NVD",
            id: "CVE-2015-7846",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201511-303",
         },
      ],
   },
   id: "VAR-201709-0089",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2015-07754",
         },
         {
            db: "VULHUB",
            id: "VHN-85807",
         },
      ],
      trust: 1.2961073074999998,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2015-07754",
         },
      ],
   },
   last_update_date: "2023-12-18T12:29:28.973000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Huawei-SA-20150805-01-VRP",
            trust: 0.8,
            url: "http://www.huawei.com/en/psirt/security-advisories/hw-446634",
         },
         {
            title: "Patches for multiple Huawei router information disclosure vulnerabilities",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/67061",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2015-07754",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007987",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-200",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-85807",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007987",
         },
         {
            db: "NVD",
            id: "CVE-2015-7846",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.3,
            url: "http://www.securityfocus.com/bid/76173",
         },
         {
            trust: 1.7,
            url: "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-446634.htm",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7846",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-7846",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2015-07754",
         },
         {
            db: "VULHUB",
            id: "VHN-85807",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007987",
         },
         {
            db: "NVD",
            id: "CVE-2015-7846",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201511-303",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2015-07754",
         },
         {
            db: "VULHUB",
            id: "VHN-85807",
         },
         {
            db: "BID",
            id: "76173",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007987",
         },
         {
            db: "NVD",
            id: "CVE-2015-7846",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201511-303",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2015-11-24T00:00:00",
            db: "CNVD",
            id: "CNVD-2015-07754",
         },
         {
            date: "2017-09-25T00:00:00",
            db: "VULHUB",
            id: "VHN-85807",
         },
         {
            date: "2015-08-05T00:00:00",
            db: "BID",
            id: "76173",
         },
         {
            date: "2017-10-23T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2015-007987",
         },
         {
            date: "2017-09-25T21:29:00.867000",
            db: "NVD",
            id: "CVE-2015-7846",
         },
         {
            date: "2015-08-05T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201511-303",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2015-11-24T00:00:00",
            db: "CNVD",
            id: "CNVD-2015-07754",
         },
         {
            date: "2017-10-10T00:00:00",
            db: "VULHUB",
            id: "VHN-85807",
         },
         {
            date: "2015-12-07T22:16:00",
            db: "BID",
            id: "76173",
         },
         {
            date: "2017-10-23T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2015-007987",
         },
         {
            date: "2017-10-10T12:26:22.227000",
            db: "NVD",
            id: "CVE-2015-7846",
         },
         {
            date: "2015-11-19T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201511-303",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "BID",
            id: "76173",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201511-303",
         },
      ],
      trust: 0.9,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei Information disclosure vulnerability in products",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2015-007987",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "information disclosure",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201511-303",
         },
      ],
      trust: 0.6,
   },
}

var-201801-0045
Vulnerability from variot

Multiple heap-based buffer overflows in the eSap software platform in Huawei Campus S9300, S7700, S9700, S5300, S5700, S6300, and S6700 series switches; AR150, AR160, AR200, AR1200, AR2200, AR3200, AR530, NetEngine16EX, SRG1300, SRG2300, and SRG3300 series routers; and WLAN AC6005, AC6605, and ACU2 access controllers allow remote attackers to cause a denial of service (device restart) via a crafted length field in a packet. plural Huawei The product contains a buffer error vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. HuaweiCampusS9300 and other products are all products of China Huawei. CampusS9300 and other devices are all switch devices. WLAN AC6005 and so on are all access controller devices. eSapsoftwareplatform is a set of ESAP software platforms running on it. A heap buffer overflow vulnerability exists in eSapsoftwareplatform in several Huawei products. The Campus S9300 and others are switches. The following products and versions are affected: Huawei Campus S9300/ S7700/ S9700 Series switch V200R001C00SPC300 Version, V200R002C00SPC100 Version, V200R003C00SPC500 Version; Campus S5300/ S5700/ S6300/ S6700 Series switch V200R001C00SPC300 Version, V200R002C00SPC100 Version, V200R003C00SPC300 Version; AR150/ AR160/ AR200/ AR1200/ AR2200/ AR3200/ AR530/ NetEngine16EX/ SRG1300/ SRG2300/ SRG3300 series router V200R003C01SPC900 Version, V200R003C01SPC300 Version, V200R003C01SPC100 Version, V200R003C00SPC200 Version, V200R003C00SPC100 Version, V200R005C00SPC100 Version, V200R005C00SPC200 Version; WLAN AC6005/6605 V200R003C00SPC100 Version, V200R003C00SPC200 Version, V200R003C00SPC300 Version , V200R003C00SPC500 version, V200R005C00SPC100 version; WLAN ACU2 V200R005C00SPC100 version

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201801-0045",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "wlan ac6605",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00spc200",
         },
         {
            model: "wlan ac6005",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00spc200",
         },
         {
            model: "wlan ac6605",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "wlan ac6605",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r005c00spc100",
         },
         {
            model: "wlan ac6005",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "wlan acu2",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r005c00spc100",
         },
         {
            model: "wlan ac6005",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r005c00spc100",
         },
         {
            model: "wlan ac6605",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00spc100",
         },
         {
            model: "wlan ac6605",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00spc500",
         },
         {
            model: "wlan ac6005",
            scope: "eq",
            trust: 1.6,
            vendor: "huawei",
            version: "v200r003c00spc500",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "ar160",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc900",
         },
         {
            model: "ar2200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc200",
         },
         {
            model: "srg1300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc300",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc100",
         },
         {
            model: "ar160",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc200",
         },
         {
            model: "ar160",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc300",
         },
         {
            model: "ar3200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc100",
         },
         {
            model: "srg2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc100",
         },
         {
            model: "ar1200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc200",
         },
         {
            model: "ar2200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc100",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc500",
         },
         {
            model: "ar160",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc100",
         },
         {
            model: "netengine16ex",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc200",
         },
         {
            model: "srg1300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc100",
         },
         {
            model: "ar530",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc900",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "srg2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc900",
         },
         {
            model: "ar530",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc200",
         },
         {
            model: "srg2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc300",
         },
         {
            model: "srg3300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc100",
         },
         {
            model: "ar1200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc100",
         },
         {
            model: "ar200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc100",
         },
         {
            model: "ar530",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc100",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "netengine16ex",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc100",
         },
         {
            model: "srg2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc100",
         },
         {
            model: "s6700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "ar150",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc100",
         },
         {
            model: "srg3300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc200",
         },
         {
            model: "ar1200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc100",
         },
         {
            model: "ar2200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc200",
         },
         {
            model: "ar1200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc900",
         },
         {
            model: "ar200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc100",
         },
         {
            model: "ar1200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc300",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc500",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc100",
         },
         {
            model: "netengine16ex",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc900",
         },
         {
            model: "ar200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc300",
         },
         {
            model: "srg1300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc200",
         },
         {
            model: "ar150",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc100",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc100",
         },
         {
            model: "netengine16ex",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc200",
         },
         {
            model: "netengine16ex",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc300",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc100",
         },
         {
            model: "ar150",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc300",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc100",
         },
         {
            model: "ar2200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc100",
         },
         {
            model: "netengine16ex",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc100",
         },
         {
            model: "ar3200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc100",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc100",
         },
         {
            model: "ar2200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc900",
         },
         {
            model: "ar160",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc100",
         },
         {
            model: "ar2200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc300",
         },
         {
            model: "srg3300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc200",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00spc100",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "srg1300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc900",
         },
         {
            model: "ar530",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc100",
         },
         {
            model: "srg1300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc200",
         },
         {
            model: "s5300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc500",
         },
         {
            model: "ar530",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc100",
         },
         {
            model: "s5700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "srg1300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc100",
         },
         {
            model: "srg2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc100",
         },
         {
            model: "ar200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc200",
         },
         {
            model: "srg3300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc100",
         },
         {
            model: "ar530",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc300",
         },
         {
            model: "ar150",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc200",
         },
         {
            model: "s6300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc300",
         },
         {
            model: "srg2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc200",
         },
         {
            model: "srg3300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc900",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00spc300",
         },
         {
            model: "srg3300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc300",
         },
         {
            model: "ar3200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc200",
         },
         {
            model: "netengine16ex",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc100",
         },
         {
            model: "srg3300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc100",
         },
         {
            model: "ar160",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc200",
         },
         {
            model: "ar200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc900",
         },
         {
            model: "ar1200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc200",
         },
         {
            model: "ar200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc200",
         },
         {
            model: "ar150",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc900",
         },
         {
            model: "wlan ac6005",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc100",
         },
         {
            model: "ar3200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc100",
         },
         {
            model: "ar150",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc200",
         },
         {
            model: "ar1200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc100",
         },
         {
            model: "ar200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc100",
         },
         {
            model: "srg1300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc100",
         },
         {
            model: "ar160",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc100",
         },
         {
            model: "ar530",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc200",
         },
         {
            model: "ar2200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc100",
         },
         {
            model: "srg2300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00spc200",
         },
         {
            model: "ar150",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc100",
         },
         {
            model: "ar3200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc900",
         },
         {
            model: "ar3200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r005c00spc200",
         },
         {
            model: "ar3200",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c01spc300",
         },
         {
            model: "ar1200",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar150",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar160",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar200",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar2200",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar3200",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ar530",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s5300",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "firmware",
         },
         {
            model: "campus s5700",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "firmware",
         },
         {
            model: "campus s6300",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "firmware",
         },
         {
            model: "campus s6700",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "firmware",
         },
         {
            model: "campus s7700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s9300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s9700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "netengine16ex",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "srg1300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "srg2300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "srg3300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "wlan ac 6005",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "wlan ac 6605",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "firmware",
         },
         {
            model: "wlan acu2",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s7700 v200r002c00spc100",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s7700 v200r003c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s9300 v200r001c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s9300 v200r002c00spc100",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s9300 v200r003c00spc500",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s7700 v200r003c00spc500",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s9700 v200r001c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s9700 v200r002c00spc100",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s9700 v200r003c00spc500",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s5300 v200r001c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s5300 v200r002c00spc100",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s5300 v200r003c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s5700 v200r001c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s5700 v200r002c00spc100",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s5700 v200r003c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s6300 v200r001c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s6300 v200r002c00spc100",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s6300 v200r003c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s6700 v200r001c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s6700 v200r002c00spc100",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "campus s6700 v200r003c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "wlan v200r003c00spc100",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "6605",
         },
         {
            model: "wlan v200r003c00spc200",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "6605",
         },
         {
            model: "wlan v200r003c00spc300",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "6605",
         },
         {
            model: "wlan v200r003c00spc500",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "6605",
         },
         {
            model: "wlan v200r005c00spc100",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: "6605",
         },
         {
            model: "wlan ac6005 v200r003c00spc100",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "wlan ac6005 v200r003c00spc200",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "wlan ac6005 v200r003c00spc300",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "wlan ac6005 v200r003c00spc500",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "wlan ac6005 v200r005c00spc100",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "wlan acu2 v200r005c00spc100",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-03422",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008513",
         },
         {
            db: "NVD",
            id: "CVE-2014-4705",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201801-1088",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5700_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar530_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar530_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar530_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar530_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar530_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar530_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ar530_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ar530:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:srg3300_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:srg3300_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:srg3300_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:srg3300_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:srg3300_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:srg3300_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:srg3300_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:wlan_ac6005_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:wlan_ac6005_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:wlan_ac6005_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:wlan_ac6005_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:wlan_ac6005_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:wlan_ac6005:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:wlan_ac6605_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:wlan_ac6605_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:wlan_ac6605_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:wlan_ac6605_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:wlan_ac6605_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:wlan_ac6605:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:wlan_acu2_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:wlan_acu2:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2014-4705",
         },
      ],
   },
   cve: "CVE-2014-4705",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 7.8,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2014-4705",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "High",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "CNVD-2018-03422",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "HIGH",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "VHN-72646",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "HIGH",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.9,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.5,
                  baseSeverity: "High",
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2014-4705",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2014-4705",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2018-03422",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201801-1088",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULHUB",
                  id: "VHN-72646",
                  trust: 0.1,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-03422",
         },
         {
            db: "VULHUB",
            id: "VHN-72646",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008513",
         },
         {
            db: "NVD",
            id: "CVE-2014-4705",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201801-1088",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Multiple heap-based buffer overflows in the eSap software platform in Huawei Campus S9300, S7700, S9700, S5300, S5700, S6300, and S6700 series switches; AR150, AR160, AR200, AR1200, AR2200, AR3200, AR530, NetEngine16EX, SRG1300, SRG2300, and SRG3300 series routers; and WLAN AC6005, AC6605, and ACU2 access controllers allow remote attackers to cause a denial of service (device restart) via a crafted length field in a packet. plural Huawei The product contains a buffer error vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. HuaweiCampusS9300 and other products are all products of China Huawei. CampusS9300 and other devices are all switch devices. WLAN AC6005 and so on are all access controller devices. eSapsoftwareplatform is a set of ESAP software platforms running on it. A heap buffer overflow vulnerability exists in eSapsoftwareplatform in several Huawei products. The Campus S9300 and others are switches. The following products and versions are affected: Huawei Campus S9300/ S7700/ S9700 Series switch V200R001C00SPC300 Version, V200R002C00SPC100 Version, V200R003C00SPC500 Version; Campus S5300/ S5700/ S6300/ S6700 Series switch V200R001C00SPC300 Version, V200R002C00SPC100 Version, V200R003C00SPC300 Version; AR150/ AR160/ AR200/ AR1200/ AR2200/ AR3200/ AR530/ NetEngine16EX/ SRG1300/ SRG2300/ SRG3300 series router V200R003C01SPC900 Version, V200R003C01SPC300 Version, V200R003C01SPC100 Version, V200R003C00SPC200 Version, V200R003C00SPC100 Version, V200R005C00SPC100 Version, V200R005C00SPC200 Version; WLAN AC6005/6605 V200R003C00SPC100 Version, V200R003C00SPC200 Version, V200R003C00SPC300 Version , V200R003C00SPC500 version, V200R005C00SPC100 version; WLAN ACU2 V200R005C00SPC100 version",
      sources: [
         {
            db: "NVD",
            id: "CVE-2014-4705",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008513",
         },
         {
            db: "CNVD",
            id: "CNVD-2018-03422",
         },
         {
            db: "VULHUB",
            id: "VHN-72646",
         },
      ],
      trust: 2.25,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2014-4705",
            trust: 3.1,
         },
         {
            db: "SECUNIA",
            id: "59349",
            trust: 2.3,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008513",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201801-1088",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2018-03422",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-72646",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-03422",
         },
         {
            db: "VULHUB",
            id: "VHN-72646",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008513",
         },
         {
            db: "NVD",
            id: "CVE-2014-4705",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201801-1088",
         },
      ],
   },
   id: "VAR-201801-0045",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-03422",
         },
         {
            db: "VULHUB",
            id: "VHN-72646",
         },
      ],
      trust: 1.5067365069565217,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-03422",
         },
      ],
   },
   last_update_date: "2023-12-18T13:24:12.576000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Huawei-SA-20140616-01-eSap",
            trust: 0.8,
            url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345171.htm",
         },
         {
            title: "Patch of various Huawei products eSapsoftwareplatform heap buffer overflow vulnerability",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/116581",
         },
         {
            title: "Multiple Huawei product eSap software platform Buffer error vulnerability fix",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=78164",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-03422",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008513",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201801-1088",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-119",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-72646",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008513",
         },
         {
            db: "NVD",
            id: "CVE-2014-4705",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.3,
            url: "http://secunia.com/advisories/59349",
         },
         {
            trust: 2.3,
            url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345171.htm",
         },
         {
            trust: 0.8,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-4705",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4705",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-03422",
         },
         {
            db: "VULHUB",
            id: "VHN-72646",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008513",
         },
         {
            db: "NVD",
            id: "CVE-2014-4705",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201801-1088",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2018-03422",
         },
         {
            db: "VULHUB",
            id: "VHN-72646",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008513",
         },
         {
            db: "NVD",
            id: "CVE-2014-4705",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201801-1088",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2018-02-23T00:00:00",
            db: "CNVD",
            id: "CNVD-2018-03422",
         },
         {
            date: "2018-01-30T00:00:00",
            db: "VULHUB",
            id: "VHN-72646",
         },
         {
            date: "2018-03-09T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2014-008513",
         },
         {
            date: "2018-01-30T17:29:00.227000",
            db: "NVD",
            id: "CVE-2014-4705",
         },
         {
            date: "2018-01-31T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201801-1088",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2018-02-23T00:00:00",
            db: "CNVD",
            id: "CNVD-2018-03422",
         },
         {
            date: "2018-02-26T00:00:00",
            db: "VULHUB",
            id: "VHN-72646",
         },
         {
            date: "2018-03-09T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2014-008513",
         },
         {
            date: "2018-02-26T19:31:25.060000",
            db: "NVD",
            id: "CVE-2014-4705",
         },
         {
            date: "2018-01-31T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201801-1088",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201801-1088",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei Product buffer error vulnerability",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2014-008513",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer overflow",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201801-1088",
         },
      ],
      trust: 0.6,
   },
}

var-201604-0327
Vulnerability from variot

Memory leak in Huawei S5300EI, S5300SI, S5310HI, S6300EI/ S2350EI, and S5300LI Campus series switches with software V200R001C00 before V200R001SPH018, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; S9300, S7700, and S9700 Campus series switches with software V200R001C00 before V200R001SPH023, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote attackers to cause a denial of service (memory consumption and reboot) via a large number of ICMPv6 packets. HuaweiS5300EI is a Huawei S series switch product. The HuaweiS5300EI handles memory leaks in ICMPv6 packets, allowing remote attackers to exploit vulnerabilities to submit special requests for denial of service attacks. Multiple Huawei Switches are prone to a remote denial-of-service vulnerability. The Huawei S5300EI and others are all S-series switch products of China's Huawei (Huawei). Memory leak vulnerabilities exist in several Huawei products. The following products and versions are affected: Huawei S5300EI, S5300SI, S5310HI, S6300EI, S2350EI, S5300LI, S9300, S7700, and S9700 using software V200R001C00, V200R002C00, and V200R003C00;

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201604-0327",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "s9300",
            scope: "lt",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s9700",
            scope: "lt",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s7700",
            scope: "lt",
            trust: 1.8,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s9300",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "v200r001sph023",
         },
         {
            model: "s5300ei",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "v200r001sph018",
         },
         {
            model: "s5300ei",
            scope: "gte",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s5300li",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "v200r003sph011",
         },
         {
            model: "s9300",
            scope: "gte",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s7700",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "v200r001sph023",
         },
         {
            model: "s7700",
            scope: "gte",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s9300",
            scope: "gte",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s5300si",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "v200r003sph011",
         },
         {
            model: "s3300",
            scope: "gte",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c05",
         },
         {
            model: "s5300li",
            scope: "gte",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s5300li",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "v200r001sph018",
         },
         {
            model: "s2350ei",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "v200r003sph011",
         },
         {
            model: "s2350ei",
            scope: "gte",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s7700",
            scope: "gte",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s6300ei",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "v200r003sph011",
         },
         {
            model: "s6300ei",
            scope: "gte",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s2300",
            scope: "gte",
            trust: 1,
            vendor: "huawei",
            version: "v100r006c05",
         },
         {
            model: "s5300si",
            scope: "gte",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s5310hi",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "v200r003sph011",
         },
         {
            model: "s5310hi",
            scope: "gte",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s9700",
            scope: "gte",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s5300li",
            scope: "gte",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s5300ei",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "v200r003sph011",
         },
         {
            model: "s2350ei",
            scope: "gte",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s9700",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "v200r001sph023",
         },
         {
            model: "s5300si",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "v200r001sph018",
         },
         {
            model: "s6300ei",
            scope: "gte",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s3300",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "v100r006sph022",
         },
         {
            model: "s5310hi",
            scope: "gte",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s5300si",
            scope: "gte",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s2350ei",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "v200r001sph018",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s9700",
            scope: "gte",
            trust: 1,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s5300ei",
            scope: "gte",
            trust: 1,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s6300ei",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "v200r001sph018",
         },
         {
            model: "s2300",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "v100r006sph022",
         },
         {
            model: "s5310hi",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "v200r001sph018",
         },
         {
            model: "s5300si",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s5310hi",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s2350ei",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5310hi",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r003sph011",
         },
         {
            model: "s2300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s5300si",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r003sph011",
         },
         {
            model: "s9700",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s2350ei",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s5300si",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s5300si",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s5300li",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5310hi",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s5310hi",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r001sph023",
         },
         {
            model: "s2350ei",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r003sph011",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r003sph011",
         },
         {
            model: "s6300ei",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s2350ei",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s2350ei",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r003sph011",
         },
         {
            model: "s5300ei",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300ei",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r001sph018",
         },
         {
            model: "s6300ei",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s3300",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v100r006sph022",
         },
         {
            model: "s5300ei",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r001sph018",
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r001sph023",
         },
         {
            model: "s3300",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v100r006c05",
         },
         {
            model: "s6300ei",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s6300ei",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s7700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300ei",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r003sph011",
         },
         {
            model: "s5300li",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r001sph018",
         },
         {
            model: "s3300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300li",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s5310hi",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300ei",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r001sph023",
         },
         {
            model: "s9300",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v100r006sph022",
         },
         {
            model: "s5300ei",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r003sph011",
         },
         {
            model: "s5300li",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s5300li",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s5300ei",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s5300ei",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r003c00",
         },
         {
            model: "s2300",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v100r006c05",
         },
         {
            model: "s7700",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s5300li",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r003sph011",
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r003sph011",
         },
         {
            model: "s9700",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300si",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r001sph018",
         },
         {
            model: "s5310hi",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r001sph018",
         },
         {
            model: "s7700",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r002c00",
         },
         {
            model: "s5300si",
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300",
            scope: "lt",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r001c00",
         },
         {
            model: "s2350ei",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "v200r001sph018",
         },
         {
            model: "s5300ei v200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300ei v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300si v200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300si v200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5310hi 200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5310hi 200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300ei 200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300ei 200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2350ei 200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2350ei 200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2350ei 200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300li 200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300li 200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300li 200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300 200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700 200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 200r003c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 200r005c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700 200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5720hi 200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5720ei 200r006c00",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2300 100r006c05",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s3300 100r006c05",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9700",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s9300",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2350ei",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s7700",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300li",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300ei",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5310hi",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s3300",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6300ei",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5300si",
            scope: "eq",
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-02290",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007104",
         },
         {
            db: "NVD",
            id: "CVE-2015-8676",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201604-313",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2350ei_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "v200r001sph018",
                              versionStartIncluding: "v200r001c00",
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2350ei_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "v200r003sph011",
                              versionStartIncluding: "v200r002c00",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s2350ei:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300ei_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "v200r003sph011",
                              versionStartIncluding: "v200r002c00",
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300ei_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "v200r001sph018",
                              versionStartIncluding: "v200r001c00",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5300ei:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300si_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "v200r001sph018",
                              versionStartIncluding: "v200r001c00",
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300si_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "v200r003sph011",
                              versionStartIncluding: "v200r002c00",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5300si:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5310hi_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "v200r001sph018",
                              versionStartIncluding: "v200r001c00",
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5310hi_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "v200r003sph011",
                              versionStartIncluding: "v200r002c00",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5310hi:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300ei_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "v200r003sph011",
                              versionStartIncluding: "v200r002c00",
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s6300ei_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "v200r001sph018",
                              versionStartIncluding: "v200r001c00",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s6300ei:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300li_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "v200r001sph018",
                              versionStartIncluding: "v200r001c00",
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s5300li_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "v200r003sph011",
                              versionStartIncluding: "v200r002c00",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s5300li:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "v200r001sph023",
                              versionStartIncluding: "v200r001c00",
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "v200r003c00",
                              versionStartIncluding: "v200r002c00",
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9300_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "v200r001sph023",
                              versionStartIncluding: "v200r001c00",
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "v200r003c00",
                              versionStartIncluding: "v200r002c00",
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "v200r003c00",
                              versionStartIncluding: "v200r002c00",
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:v200r003c00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s9700_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "v200r001sph023",
                              versionStartIncluding: "v200r001c00",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s2300_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "v100r006sph022",
                              versionStartIncluding: "v100r006c05",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:s3300_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "v100r006sph022",
                              versionStartIncluding: "v100r006c05",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:s3300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2015-8676",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The vendor reported the issue.",
      sources: [
         {
            db: "BID",
            id: "90893",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2015-8676",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 7.8,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2015-8676",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "High",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "CNVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 4,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 8,
                  id: "CNVD-2016-02290",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:S/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "VHN-86637",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "HIGH",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.9,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.5,
                  baseSeverity: "High",
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2015-8676",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2015-8676",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2016-02290",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201604-313",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULHUB",
                  id: "VHN-86637",
                  trust: 0.1,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-02290",
         },
         {
            db: "VULHUB",
            id: "VHN-86637",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007104",
         },
         {
            db: "NVD",
            id: "CVE-2015-8676",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201604-313",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Memory leak in Huawei S5300EI, S5300SI, S5310HI, S6300EI/ S2350EI, and S5300LI Campus series switches with software V200R001C00 before V200R001SPH018, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; S9300, S7700, and S9700 Campus series switches with software V200R001C00 before V200R001SPH023, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote attackers to cause a denial of service (memory consumption and reboot) via a large number of ICMPv6 packets. HuaweiS5300EI is a Huawei S series switch product. The HuaweiS5300EI handles memory leaks in ICMPv6 packets, allowing remote attackers to exploit vulnerabilities to submit special requests for denial of service attacks. Multiple Huawei Switches are prone to a remote denial-of-service vulnerability. The Huawei S5300EI and others are all S-series switch products of China's Huawei (Huawei). Memory leak vulnerabilities exist in several Huawei products. The following products and versions are affected: Huawei S5300EI, S5300SI, S5310HI, S6300EI, S2350EI, S5300LI, S9300, S7700, and S9700 using software V200R001C00, V200R002C00, and V200R003C00;",
      sources: [
         {
            db: "NVD",
            id: "CVE-2015-8676",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007104",
         },
         {
            db: "CNVD",
            id: "CNVD-2016-02290",
         },
         {
            db: "BID",
            id: "90893",
         },
         {
            db: "VULHUB",
            id: "VHN-86637",
         },
      ],
      trust: 2.52,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2015-8676",
            trust: 3.4,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007104",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201604-313",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2016-02290",
            trust: 0.6,
         },
         {
            db: "BID",
            id: "90893",
            trust: 0.4,
         },
         {
            db: "VULHUB",
            id: "VHN-86637",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-02290",
         },
         {
            db: "VULHUB",
            id: "VHN-86637",
         },
         {
            db: "BID",
            id: "90893",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007104",
         },
         {
            db: "NVD",
            id: "CVE-2015-8676",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201604-313",
         },
      ],
   },
   id: "VAR-201604-0327",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-02290",
         },
         {
            db: "VULHUB",
            id: "VHN-86637",
         },
      ],
      trust: 1.6153170325,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-02290",
         },
      ],
   },
   last_update_date: "2023-12-18T13:44:13.781000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Huawei-SA-20160113-02-Switch",
            trust: 0.8,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-02-switch-en",
         },
         {
            title: "Patches for various Huawei product switches ICMPv6 packet memory leak vulnerability",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/74357",
         },
         {
            title: "Multiple Huawei Product memory leak vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=60968",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-02290",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007104",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201604-313",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-119",
            trust: 1.9,
         },
         {
            problemtype: "CWE-399",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-86637",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007104",
         },
         {
            db: "NVD",
            id: "CVE-2015-8676",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-02-switch-en",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8676",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-8676",
         },
         {
            trust: 0.6,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-03-switch-en",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-02290",
         },
         {
            db: "VULHUB",
            id: "VHN-86637",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007104",
         },
         {
            db: "NVD",
            id: "CVE-2015-8676",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201604-313",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2016-02290",
         },
         {
            db: "VULHUB",
            id: "VHN-86637",
         },
         {
            db: "BID",
            id: "90893",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007104",
         },
         {
            db: "NVD",
            id: "CVE-2015-8676",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201604-313",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2016-04-19T00:00:00",
            db: "CNVD",
            id: "CNVD-2016-02290",
         },
         {
            date: "2016-04-14T00:00:00",
            db: "VULHUB",
            id: "VHN-86637",
         },
         {
            date: "2016-01-13T00:00:00",
            db: "BID",
            id: "90893",
         },
         {
            date: "2016-04-28T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2015-007104",
         },
         {
            date: "2016-04-14T15:59:02.980000",
            db: "NVD",
            id: "CVE-2015-8676",
         },
         {
            date: "2016-04-15T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201604-313",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2016-04-19T00:00:00",
            db: "CNVD",
            id: "CNVD-2016-02290",
         },
         {
            date: "2019-06-20T00:00:00",
            db: "VULHUB",
            id: "VHN-86637",
         },
         {
            date: "2016-07-06T14:51:00",
            db: "BID",
            id: "90893",
         },
         {
            date: "2016-04-28T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2015-007104",
         },
         {
            date: "2019-06-20T13:54:56.177000",
            db: "NVD",
            id: "CVE-2015-8676",
         },
         {
            date: "2016-04-15T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201604-313",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201604-313",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei Service disruption in products  (DoS) Vulnerabilities",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2015-007104",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "resource management error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201604-313",
         },
      ],
      trust: 0.6,
   },
}

cve-2019-5285
Vulnerability from cvelistv5
Published
2019-06-04 18:47
Modified
2024-08-04 19:54
Severity ?
Summary
Some Huawei S series switches have a DoS vulnerability. An unauthenticated remote attacker can send crafted packets to the affected device to exploit this vulnerability. Due to insufficient verification of the packets, successful exploitation may cause the device reboot and denial of service (DoS) condition. (Vulnerability ID: HWPSIRT-2019-03109)
Impacted products
Vendor Product Version
Huawei S12700, S12700, S12700, S12700, S12700, S12700, S12700, S12700, S1700, S1700, S1700, S1700, S1700, S1700, S2300, S2300, S2300, S2300, S2300, S2300, S2300, S2700, S2700, S2700, S2700, S2700, S2700, S2700, S2700, S5300, S5300, S5300, S5300, S5300, S5300, S5300, S5700, S5700, S5700, S5700, S5700, S5700, S5700, S5700, S5700, S600-E, S600-E, S600-E, S600-E, S600-E, S6300, S6300, S6300, S6300, S6300, S6300, S6300, S6300, S6700, S6700, S6700, S6700, S6700, S6700, S6700, S6700, S7700, S7700, S7700, S7700, S7700, S7700, S7700, S7700, S7700, S7900, S7900, S7900, S9300, S9300, S9300, S9300, S9300, S9300, S9300, S9300X, S9300X, S9300X, S9300X, S9700, S9700, S9700, S9700, S9700, S9700, S9700, S9700, S9700 Version: S12700 V200R008C00
Version: S12700 V200R010C00
Version: S12700 V200R012C00
Version: S12700 V200R013C00
Version: S12700 V200R011C10
Version: S1700 V200R008C00
Version: S1700 V200R009C00
Version: S1700 V200R010C00
Version: S1700 V200R011C10
Version: S2300 V200R003C00
Version: S2300 V200R005C00
Version: S2300 V200R008C00
Version: S2300 V200R010C00
Version: S2300 V200R011C10
Version: S2300 V200R012C00
Version: S2300 V200R013C00
Version: S2700 V200R005C00
Version: S2700 V200R006C00
Version: S2700 V200R007C00
Version: S2700 V200R008C00
Version: S2700 V200R010C00
Version: S2700 V200R011C10
Version: S2700 V200R012C00
Version: S2700 V200R013C00
Version: S5300 V200R003C00
Version: S5300 V200R005C00
Version: S5300 V200R008C00
Version: S5300 V200R010C00
Version: S5300 V200R011C10
Version: S5300 V200R012C00
Version: S5700 V200R006C00
Version: S5700 V200R007C00
Version: S5700 V200R008C00
Version: S5700 V200R010C00
Version: S5700 V200R011C10
Version: S5700 V200R012C00
Version: S5700 V200R013C00
Version: S600-E V200R008C00
Version: S600-E V200R010C00
Version: S600-E V200R011C10
Version: S600-E V200R012C00
Version: S600-E V200R013C00
Version: S6300 V200R003C00
Version: S6300 V200R005C00
Version: S6300 V200R007C00
Version: S6300 V200R008C00
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T19:54:52.359Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190522-01-switch-en",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190522-01-switch-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "S12700, S12700, S12700, S12700, S12700, S12700, S12700, S12700, S1700, S1700, S1700, S1700, S1700, S1700, S2300, S2300, S2300, S2300, S2300, S2300, S2300, S2700, S2700, S2700, S2700, S2700, S2700, S2700, S2700, S5300, S5300, S5300, S5300, S5300, S5300, S5300, S5700, S5700, S5700, S5700, S5700, S5700, S5700, S5700, S5700, S600-E, S600-E, S600-E, S600-E, S600-E, S6300, S6300, S6300, S6300, S6300, S6300, S6300, S6300, S6700, S6700, S6700, S6700, S6700, S6700, S6700, S6700, S7700, S7700, S7700, S7700, S7700, S7700, S7700, S7700, S7700, S7900, S7900, S7900, S9300, S9300, S9300, S9300, S9300, S9300, S9300, S9300X, S9300X, S9300X, S9300X, S9700, S9700, S9700, S9700, S9700, S9700, S9700, S9700, S9700",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "S12700 V200R008C00",
                  },
                  {
                     status: "affected",
                     version: "S12700 V200R010C00",
                  },
                  {
                     status: "affected",
                     version: "S12700 V200R012C00",
                  },
                  {
                     status: "affected",
                     version: "S12700 V200R013C00",
                  },
                  {
                     status: "affected",
                     version: "S12700 V200R011C10",
                  },
                  {
                     status: "affected",
                     version: "S1700 V200R008C00",
                  },
                  {
                     status: "affected",
                     version: "S1700 V200R009C00",
                  },
                  {
                     status: "affected",
                     version: "S1700 V200R010C00",
                  },
                  {
                     status: "affected",
                     version: "S1700 V200R011C10",
                  },
                  {
                     status: "affected",
                     version: "S2300 V200R003C00",
                  },
                  {
                     status: "affected",
                     version: "S2300 V200R005C00",
                  },
                  {
                     status: "affected",
                     version: "S2300 V200R008C00",
                  },
                  {
                     status: "affected",
                     version: "S2300 V200R010C00",
                  },
                  {
                     status: "affected",
                     version: "S2300 V200R011C10",
                  },
                  {
                     status: "affected",
                     version: "S2300 V200R012C00",
                  },
                  {
                     status: "affected",
                     version: "S2300 V200R013C00",
                  },
                  {
                     status: "affected",
                     version: "S2700 V200R005C00",
                  },
                  {
                     status: "affected",
                     version: "S2700 V200R006C00",
                  },
                  {
                     status: "affected",
                     version: "S2700 V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "S2700 V200R008C00",
                  },
                  {
                     status: "affected",
                     version: "S2700 V200R010C00",
                  },
                  {
                     status: "affected",
                     version: "S2700 V200R011C10",
                  },
                  {
                     status: "affected",
                     version: "S2700 V200R012C00",
                  },
                  {
                     status: "affected",
                     version: "S2700 V200R013C00",
                  },
                  {
                     status: "affected",
                     version: "S5300 V200R003C00",
                  },
                  {
                     status: "affected",
                     version: "S5300 V200R005C00",
                  },
                  {
                     status: "affected",
                     version: "S5300 V200R008C00",
                  },
                  {
                     status: "affected",
                     version: "S5300 V200R010C00",
                  },
                  {
                     status: "affected",
                     version: "S5300 V200R011C10",
                  },
                  {
                     status: "affected",
                     version: "S5300 V200R012C00",
                  },
                  {
                     status: "affected",
                     version: "S5700 V200R006C00",
                  },
                  {
                     status: "affected",
                     version: "S5700 V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "S5700 V200R008C00",
                  },
                  {
                     status: "affected",
                     version: "S5700 V200R010C00",
                  },
                  {
                     status: "affected",
                     version: "S5700 V200R011C10",
                  },
                  {
                     status: "affected",
                     version: "S5700 V200R012C00",
                  },
                  {
                     status: "affected",
                     version: "S5700 V200R013C00",
                  },
                  {
                     status: "affected",
                     version: "S600-E V200R008C00",
                  },
                  {
                     status: "affected",
                     version: "S600-E V200R010C00",
                  },
                  {
                     status: "affected",
                     version: "S600-E V200R011C10",
                  },
                  {
                     status: "affected",
                     version: "S600-E V200R012C00",
                  },
                  {
                     status: "affected",
                     version: "S600-E V200R013C00",
                  },
                  {
                     status: "affected",
                     version: "S6300 V200R003C00",
                  },
                  {
                     status: "affected",
                     version: "S6300 V200R005C00",
                  },
                  {
                     status: "affected",
                     version: "S6300 V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "S6300 V200R008C00",
                  },
               ],
            },
         ],
         datePublic: "2019-05-22T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Some Huawei S series switches have a DoS vulnerability. An unauthenticated remote attacker can send crafted packets to the affected device to exploit this vulnerability. Due to insufficient verification of the packets, successful exploitation may cause the device reboot and denial of service (DoS) condition. (Vulnerability ID: HWPSIRT-2019-03109)",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "DoS",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-07-26T10:06:01",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190522-01-switch-en",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190522-01-switch-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2019-5285",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "S12700, S12700, S12700, S12700, S12700, S12700, S12700, S12700, S1700, S1700, S1700, S1700, S1700, S1700, S2300, S2300, S2300, S2300, S2300, S2300, S2300, S2700, S2700, S2700, S2700, S2700, S2700, S2700, S2700, S5300, S5300, S5300, S5300, S5300, S5300, S5300, S5700, S5700, S5700, S5700, S5700, S5700, S5700, S5700, S5700, S600-E, S600-E, S600-E, S600-E, S600-E, S6300, S6300, S6300, S6300, S6300, S6300, S6300, S6300, S6700, S6700, S6700, S6700, S6700, S6700, S6700, S6700, S7700, S7700, S7700, S7700, S7700, S7700, S7700, S7700, S7700, S7900, S7900, S7900, S9300, S9300, S9300, S9300, S9300, S9300, S9300, S9300X, S9300X, S9300X, S9300X, S9700, S9700, S9700, S9700, S9700, S9700, S9700, S9700, S9700",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "S12700 V200R008C00",
                                       },
                                       {
                                          version_value: "S12700 V200R010C00",
                                       },
                                       {
                                          version_value: "S12700 V200R012C00",
                                       },
                                       {
                                          version_value: "S12700 V200R013C00",
                                       },
                                       {
                                          version_value: "S12700 V200R011C10",
                                       },
                                       {
                                          version_value: "S1700 V200R008C00",
                                       },
                                       {
                                          version_value: "S1700 V200R009C00",
                                       },
                                       {
                                          version_value: "S1700 V200R010C00",
                                       },
                                       {
                                          version_value: "S1700 V200R011C10",
                                       },
                                       {
                                          version_value: "S2300 V200R003C00",
                                       },
                                       {
                                          version_value: "S2300 V200R005C00",
                                       },
                                       {
                                          version_value: "S2300 V200R008C00",
                                       },
                                       {
                                          version_value: "S2300 V200R010C00",
                                       },
                                       {
                                          version_value: "S2300 V200R011C10",
                                       },
                                       {
                                          version_value: "S2300 V200R012C00",
                                       },
                                       {
                                          version_value: "S2300 V200R013C00",
                                       },
                                       {
                                          version_value: "S2700 V200R005C00",
                                       },
                                       {
                                          version_value: "S2700 V200R006C00",
                                       },
                                       {
                                          version_value: "S2700 V200R007C00",
                                       },
                                       {
                                          version_value: "S2700 V200R008C00",
                                       },
                                       {
                                          version_value: "S2700 V200R010C00",
                                       },
                                       {
                                          version_value: "S2700 V200R011C10",
                                       },
                                       {
                                          version_value: "S2700 V200R012C00",
                                       },
                                       {
                                          version_value: "S2700 V200R013C00",
                                       },
                                       {
                                          version_value: "S5300 V200R003C00",
                                       },
                                       {
                                          version_value: "S5300 V200R005C00",
                                       },
                                       {
                                          version_value: "S5300 V200R008C00",
                                       },
                                       {
                                          version_value: "S5300 V200R010C00",
                                       },
                                       {
                                          version_value: "S5300 V200R011C10",
                                       },
                                       {
                                          version_value: "S5300 V200R012C00",
                                       },
                                       {
                                          version_value: "S5700 V200R006C00",
                                       },
                                       {
                                          version_value: "S5700 V200R007C00",
                                       },
                                       {
                                          version_value: "S5700 V200R008C00",
                                       },
                                       {
                                          version_value: "S5700 V200R010C00",
                                       },
                                       {
                                          version_value: "S5700 V200R011C10",
                                       },
                                       {
                                          version_value: "S5700 V200R012C00",
                                       },
                                       {
                                          version_value: "S5700 V200R013C00",
                                       },
                                       {
                                          version_value: "S600-E V200R008C00",
                                       },
                                       {
                                          version_value: "S600-E V200R010C00",
                                       },
                                       {
                                          version_value: "S600-E V200R011C10",
                                       },
                                       {
                                          version_value: "S600-E V200R012C00",
                                       },
                                       {
                                          version_value: "S600-E V200R013C00",
                                       },
                                       {
                                          version_value: "S6300 V200R003C00",
                                       },
                                       {
                                          version_value: "S6300 V200R005C00",
                                       },
                                       {
                                          version_value: "S6300 V200R007C00",
                                       },
                                       {
                                          version_value: "S6300 V200R008C00",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Some Huawei S series switches have a DoS vulnerability. An unauthenticated remote attacker can send crafted packets to the affected device to exploit this vulnerability. Due to insufficient verification of the packets, successful exploitation may cause the device reboot and denial of service (DoS) condition. (Vulnerability ID: HWPSIRT-2019-03109)",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "DoS",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190522-01-switch-en",
                     refsource: "CONFIRM",
                     url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190522-01-switch-en",
                  },
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190522-01-switch-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190522-01-switch-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2019-5285",
      datePublished: "2019-06-04T18:47:35",
      dateReserved: "2019-01-04T00:00:00",
      dateUpdated: "2024-08-04T19:54:52.359Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2017-17135
Vulnerability from cvelistv5
Published
2018-03-05 19:00
Modified
2024-09-17 00:31
Severity ?
Summary
PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a null pointer reference vulnerability due to insufficient verification. An authenticated local attacker calls PEM decoder with special parameter which could cause a denial of service.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. DP300; IPS Module; NGFW Module; NIP6300; NIP6600; RP200; S12700; S1700; S2700; S5700; S6700; S7700; S9700; Secospace USG6300; Secospace USG6500; Secospace USG6600; TE30; TE40; TE50; TE60; TP3106; TP3206; USG9500; ViewPoint 9030 Version: DP300 V500R002C00
Version: IPS Module V500R001C00
Version: V500R001C30
Version: NGFW Module V500R001C00
Version: V500R002C00
Version: NIP6300 V500R001C00
Version: NIP6600 V500R001C00
Version: RP200 V500R002C00
Version: V600R006C00
Version: S12700 V200R007C00
Version: V200R007C01
Version: V200R008C00
Version: V200R009C00
Version: V200R010C00
Version: S1700 V200R006C10
Version: S2700 V200R006C10
Version: V200R007C00
Version: S5700 V200R006C00
Version: S6700 V200R008C00
Version: S7700 V200R007C00
Version: S9700 V200R007C00
Version: Secospace USG6300 V500R001C00
Version: Secospace USG6500 V500R001C00
Version: Secospace USG6600 V500R001C00
Version: V500R001C30S
Version: TE30 V100R001C02
Version: V100R001C10
Version: TE40 V500R002C00
Version: TE50 V500R002C00
Version: TE60 V100R001C01
Version: TP3106 V100R002C00
Version: TP3206 V100R002C00
Version: V100R002C10
Version: USG9500 V500R001C00
Version: ViewPoint 9030 V100R011C02
Version: V100R011C03
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T20:43:59.923Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "DP300; IPS Module; NGFW Module; NIP6300; NIP6600; RP200; S12700; S1700; S2700; S5700; S6700; S7700; S9700; Secospace USG6300; Secospace USG6500; Secospace USG6600; TE30; TE40; TE50; TE60; TP3106; TP3206; USG9500; ViewPoint 9030",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "DP300 V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "IPS Module V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "NGFW Module V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "NIP6300 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "NIP6600 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "RP200 V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "V600R006C00",
                  },
                  {
                     status: "affected",
                     version: "S12700 V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R007C01",
                  },
                  {
                     status: "affected",
                     version: "V200R008C00",
                  },
                  {
                     status: "affected",
                     version: "V200R009C00",
                  },
                  {
                     status: "affected",
                     version: "V200R010C00",
                  },
                  {
                     status: "affected",
                     version: "S1700 V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "S2700 V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "S5700 V200R006C00",
                  },
                  {
                     status: "affected",
                     version: "S6700 V200R008C00",
                  },
                  {
                     status: "affected",
                     version: "S7700 V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "S9700 V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "Secospace USG6300 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "Secospace USG6500 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "Secospace USG6600 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30S",
                  },
                  {
                     status: "affected",
                     version: "TE30 V100R001C02",
                  },
                  {
                     status: "affected",
                     version: "V100R001C10",
                  },
                  {
                     status: "affected",
                     version: "TE40 V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "TE50 V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "TE60 V100R001C01",
                  },
                  {
                     status: "affected",
                     version: "TP3106 V100R002C00",
                  },
                  {
                     status: "affected",
                     version: "TP3206 V100R002C00",
                  },
                  {
                     status: "affected",
                     version: "V100R002C10",
                  },
                  {
                     status: "affected",
                     version: "USG9500 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "ViewPoint 9030 V100R011C02",
                  },
                  {
                     status: "affected",
                     version: "V100R011C03",
                  },
               ],
            },
         ],
         datePublic: "2017-12-06T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a null pointer reference vulnerability due to insufficient verification. An authenticated local attacker calls PEM decoder with special parameter which could cause a denial of service.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "null pointer reference",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-03-05T18:57:02",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               DATE_PUBLIC: "2017-12-06T00:00:00",
               ID: "CVE-2017-17135",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "DP300; IPS Module; NGFW Module; NIP6300; NIP6600; RP200; S12700; S1700; S2700; S5700; S6700; S7700; S9700; Secospace USG6300; Secospace USG6500; Secospace USG6600; TE30; TE40; TE50; TE60; TP3106; TP3206; USG9500; ViewPoint 9030",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "DP300 V500R002C00",
                                       },
                                       {
                                          version_value: "IPS Module V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "NGFW Module V500R001C00",
                                       },
                                       {
                                          version_value: "V500R002C00",
                                       },
                                       {
                                          version_value: "NIP6300 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "NIP6600 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "RP200 V500R002C00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                       {
                                          version_value: "S12700 V200R007C00",
                                       },
                                       {
                                          version_value: "V200R007C01",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S1700 V200R006C10",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S2700 V200R006C10",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S5700 V200R006C00",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S6700 V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S7700 V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S9700 V200R007C00",
                                       },
                                       {
                                          version_value: "V200R007C01",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "Secospace USG6300 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "Secospace USG6500 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "Secospace USG6600 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30S",
                                       },
                                       {
                                          version_value: "TE30 V100R001C02",
                                       },
                                       {
                                          version_value: "V100R001C10",
                                       },
                                       {
                                          version_value: "V500R002C00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                       {
                                          version_value: "TE40 V500R002C00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                       {
                                          version_value: "TE50 V500R002C00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                       {
                                          version_value: "TE60 V100R001C01",
                                       },
                                       {
                                          version_value: "V100R001C10",
                                       },
                                       {
                                          version_value: "V500R002C00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                       {
                                          version_value: "TP3106 V100R002C00",
                                       },
                                       {
                                          version_value: "TP3206 V100R002C00",
                                       },
                                       {
                                          version_value: "V100R002C10",
                                       },
                                       {
                                          version_value: "USG9500 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "ViewPoint 9030 V100R011C02",
                                       },
                                       {
                                          version_value: "V100R011C03",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a null pointer reference vulnerability due to insufficient verification. An authenticated local attacker calls PEM decoder with special parameter which could cause a denial of service.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "null pointer reference",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2017-17135",
      datePublished: "2018-03-05T19:00:00Z",
      dateReserved: "2017-12-04T00:00:00",
      dateUpdated: "2024-09-17T00:31:13.342Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2017-8147
Vulnerability from cvelistv5
Published
2017-11-22 19:00
Modified
2024-09-16 17:03
Severity ?
Summary
AC6005 V200R006C10SPC200,AC6605 V200R006C10SPC200,AR1200 with software V200R005C10CP0582T, V200R005C10HP0581T, V200R005C20SPC026T,AR200 with software V200R005C20SPC026T,AR3200 V200R005C20SPC026T,CloudEngine 12800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 5800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 6800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 7800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 8800 with software V100R006C00, V200R001C00,E600 V200R008C00,S12700 with software V200R005C00, V200R006C00, V200R007C00, V200R008C00,S1700 with software V100R006C00, V100R007C00, V200R006C00,S2300 with software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S2700 with software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S5300 with software V100R005C00, V100R006C00, V100R006C01, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S5700 with software V100R005C00, V100R006C00, V100R006C01, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S6300 with software V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R008C00,S6700 with software V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S7700 with software V100R003C00, V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S9300 with software V100R001C00, V100R002C00, V100R003C00, V100R006C00, V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R008C10,S9700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00,Secospace USG6600 V500R001C00SPC050 have a MaxAge LSA vulnerability due to improper OSPF implementation. When the device receives special LSA packets, the LS (Link Status) age would be set to MaxAge, 3600 seconds. An attacker can exploit this vulnerability to poison the route table and launch a DoS attack.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. AC6005,AC6605,AR1200,AR200,AR3200,CloudEngine 12800,CloudEngine 5800,CloudEngine 6800,CloudEngine 7800,CloudEngine 8800,E600,S12700,S1700,S2300,S2700,S5300,S5700,S6300,S6700,S7700,S9300,S9700,Secospace USG6600, Version: AC6005 V200R006C10SPC200,AC6605 V200R006C10SPC200,AR1200 with software V200R005C10CP0582T, V200R005C10HP0581T, V200R005C20SPC026T,AR200 with software V200R005C20SPC026T,AR3200 V200R005C20SPC026T,CloudEngine 12800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 5800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 6800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 7800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 8800 with software V100R006C00, V200R001C00,E600 V200R008C00,S12700 with software V200R005C00, V200R006C00, V200R007C00, V200R008C00,S1700 with software V100R006C00, V100R007C00, V200R006C00,S2300 with software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S2700 with software V100R005 ...[truncated*]
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T16:27:22.909Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170720-01-ospf-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AC6005,AC6605,AR1200,AR200,AR3200,CloudEngine 12800,CloudEngine 5800,CloudEngine 6800,CloudEngine 7800,CloudEngine 8800,E600,S12700,S1700,S2300,S2700,S5300,S5700,S6300,S6700,S7700,S9300,S9700,Secospace USG6600,",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "AC6005 V200R006C10SPC200,AC6605 V200R006C10SPC200,AR1200 with software V200R005C10CP0582T, V200R005C10HP0581T, V200R005C20SPC026T,AR200 with software V200R005C20SPC026T,AR3200 V200R005C20SPC026T,CloudEngine 12800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 5800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 6800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 7800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 8800 with software V100R006C00, V200R001C00,E600 V200R008C00,S12700 with software V200R005C00, V200R006C00, V200R007C00, V200R008C00,S1700 with software V100R006C00, V100R007C00, V200R006C00,S2300 with software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S2700 with software V100R005 ...[truncated*]",
                  },
               ],
            },
         ],
         datePublic: "2017-11-15T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "AC6005 V200R006C10SPC200,AC6605 V200R006C10SPC200,AR1200 with software V200R005C10CP0582T, V200R005C10HP0581T, V200R005C20SPC026T,AR200 with software V200R005C20SPC026T,AR3200 V200R005C20SPC026T,CloudEngine 12800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 5800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 6800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 7800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 8800 with software V100R006C00, V200R001C00,E600 V200R008C00,S12700 with software V200R005C00, V200R006C00, V200R007C00, V200R008C00,S1700 with software V100R006C00, V100R007C00, V200R006C00,S2300 with software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S2700 with software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S5300 with software V100R005C00, V100R006C00, V100R006C01, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S5700 with software V100R005C00, V100R006C00, V100R006C01, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S6300 with software V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R008C00,S6700 with software V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S7700 with software V100R003C00, V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S9300 with software V100R001C00, V100R002C00, V100R003C00, V100R006C00, V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R008C10,S9700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00,Secospace USG6600 V500R001C00SPC050 have a MaxAge LSA vulnerability due to improper OSPF implementation. When the device receives special LSA packets, the LS (Link Status) age would be set to MaxAge, 3600 seconds. An attacker can exploit this vulnerability to poison the route table and launch a DoS attack.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "MaxAge LSA",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-11-22T18:57:01",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170720-01-ospf-en",
            },
         ],
         x_ConverterErrors: {
            version_name: {
               error: "version_name too long. Use array of versions to record more than one version.",
               message: "Truncated!",
            },
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               DATE_PUBLIC: "2017-11-15T00:00:00",
               ID: "CVE-2017-8147",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AC6005,AC6605,AR1200,AR200,AR3200,CloudEngine 12800,CloudEngine 5800,CloudEngine 6800,CloudEngine 7800,CloudEngine 8800,E600,S12700,S1700,S2300,S2700,S5300,S5700,S6300,S6700,S7700,S9300,S9700,Secospace USG6600,",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "AC6005 V200R006C10SPC200,AC6605 V200R006C10SPC200,AR1200 with software V200R005C10CP0582T, V200R005C10HP0581T, V200R005C20SPC026T,AR200 with software V200R005C20SPC026T,AR3200 V200R005C20SPC026T,CloudEngine 12800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 5800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 6800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 7800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 8800 with software V100R006C00, V200R001C00,E600 V200R008C00,S12700 with software V200R005C00, V200R006C00, V200R007C00, V200R008C00,S1700 with software V100R006C00, V100R007C00, V200R006C00,S2300 with software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S2700 with software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S5300 with software V100R005C00, V100R006C00, V100R006C01, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S5700 with software V100R005C00, V100R006C00, V100R006C01, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S6300 with software V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R008C00,S6700 with software V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S7700 with software V100R003C00, V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S9300 with software V100R001C00, V100R002C00, V100R003C00, V100R006C00, V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R008C10,S9700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00,Secospace USG6600 V500R001C00SPC050",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "AC6005 V200R006C10SPC200,AC6605 V200R006C10SPC200,AR1200 with software V200R005C10CP0582T, V200R005C10HP0581T, V200R005C20SPC026T,AR200 with software V200R005C20SPC026T,AR3200 V200R005C20SPC026T,CloudEngine 12800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 5800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 6800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 7800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 8800 with software V100R006C00, V200R001C00,E600 V200R008C00,S12700 with software V200R005C00, V200R006C00, V200R007C00, V200R008C00,S1700 with software V100R006C00, V100R007C00, V200R006C00,S2300 with software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S2700 with software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S5300 with software V100R005C00, V100R006C00, V100R006C01, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S5700 with software V100R005C00, V100R006C00, V100R006C01, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S6300 with software V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R008C00,S6700 with software V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S7700 with software V100R003C00, V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S9300 with software V100R001C00, V100R002C00, V100R003C00, V100R006C00, V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R008C10,S9700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00,Secospace USG6600 V500R001C00SPC050 have a MaxAge LSA vulnerability due to improper OSPF implementation. When the device receives special LSA packets, the LS (Link Status) age would be set to MaxAge, 3600 seconds. An attacker can exploit this vulnerability to poison the route table and launch a DoS attack.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "MaxAge LSA",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170720-01-ospf-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170720-01-ospf-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2017-8147",
      datePublished: "2017-11-22T19:00:00Z",
      dateReserved: "2017-04-25T00:00:00",
      dateUpdated: "2024-09-16T17:03:05.616Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-37129
Vulnerability from cvelistv5
Published
2021-10-27 00:41
Modified
2024-08-04 01:16
Severity ?
Summary
There is an out of bounds write vulnerability in some Huawei products. The vulnerability is caused by a function of a module that does not properly verify input parameter. Successful exploit could cause out of bounds write leading to a denial of service condition.Affected product versions include:IPS Module V500R005C00,V500R005C20;NGFW Module V500R005C00;NIP6600 V500R005C00,V500R005C20;S12700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600,V200R013C00SPC500,V200R019C00SPC200,V200R019C00SPC500,V200R019C10SPC200,V200R020C00,V200R020C10;S1700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S2700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S5700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600,V200R019C00SPC500;S6700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S7700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600;S9700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;USG9500 V500R005C00,V500R005C20.
Impacted products
Vendor Product Version
n/a IIPS Module;NGFW Module;NIP6600;S12700;S1700;S2700;S5700;S6700;S7700;S9700;USG9500 Version: V500R005C00,V500R005C20
Version: V500R005C00
Version: V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600,V200R013C00SPC500,V200R019C00SPC200,V200R019C00SPC500,V200R019C10SPC200,V200R020C00,V200R020C10
Version: V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600
Version: V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600,V200R019C00SPC500
Version: V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T01:16:03.167Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-outofwrite-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "IIPS Module;NGFW Module;NIP6600;S12700;S1700;S2700;S5700;S6700;S7700;S9700;USG9500",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "V500R005C00,V500R005C20",
                  },
                  {
                     status: "affected",
                     version: "V500R005C00",
                  },
                  {
                     status: "affected",
                     version: "V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600,V200R013C00SPC500,V200R019C00SPC200,V200R019C00SPC500,V200R019C10SPC200,V200R020C00,V200R020C10",
                  },
                  {
                     status: "affected",
                     version: "V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600",
                  },
                  {
                     status: "affected",
                     version: "V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600,V200R019C00SPC500",
                  },
                  {
                     status: "affected",
                     version: "V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "There is an out of bounds write vulnerability in some Huawei products. The vulnerability is caused by a function of a module that does not properly verify input parameter. Successful exploit could cause out of bounds write leading to a denial of service condition.Affected product versions include:IPS Module V500R005C00,V500R005C20;NGFW Module V500R005C00;NIP6600 V500R005C00,V500R005C20;S12700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600,V200R013C00SPC500,V200R019C00SPC200,V200R019C00SPC500,V200R019C10SPC200,V200R020C00,V200R020C10;S1700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S2700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S5700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600,V200R019C00SPC500;S6700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S7700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600;S9700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;USG9500 V500R005C00,V500R005C20.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Out of Bounds Write",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-10-27T00:41:44",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-outofwrite-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2021-37129",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "IIPS Module;NGFW Module;NIP6600;S12700;S1700;S2700;S5700;S6700;S7700;S9700;USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R005C00,V500R005C20",
                                       },
                                       {
                                          version_value: "V500R005C00",
                                       },
                                       {
                                          version_value: "V500R005C00,V500R005C20",
                                       },
                                       {
                                          version_value: "V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600,V200R013C00SPC500,V200R019C00SPC200,V200R019C00SPC500,V200R019C10SPC200,V200R020C00,V200R020C10",
                                       },
                                       {
                                          version_value: "V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600",
                                       },
                                       {
                                          version_value: "V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600",
                                       },
                                       {
                                          version_value: "V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600,V200R019C00SPC500",
                                       },
                                       {
                                          version_value: "V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600",
                                       },
                                       {
                                          version_value: "V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600",
                                       },
                                       {
                                          version_value: "V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600",
                                       },
                                       {
                                          version_value: "V500R005C00,V500R005C20",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "There is an out of bounds write vulnerability in some Huawei products. The vulnerability is caused by a function of a module that does not properly verify input parameter. Successful exploit could cause out of bounds write leading to a denial of service condition.Affected product versions include:IPS Module V500R005C00,V500R005C20;NGFW Module V500R005C00;NIP6600 V500R005C00,V500R005C20;S12700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600,V200R013C00SPC500,V200R019C00SPC200,V200R019C00SPC500,V200R019C10SPC200,V200R020C00,V200R020C10;S1700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S2700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S5700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600,V200R019C00SPC500;S6700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S7700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600;S9700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;USG9500 V500R005C00,V500R005C20.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Out of Bounds Write",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-outofwrite-en",
                     refsource: "MISC",
                     url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-outofwrite-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2021-37129",
      datePublished: "2021-10-27T00:41:44",
      dateReserved: "2021-07-20T00:00:00",
      dateUpdated: "2024-08-04T01:16:03.167Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2015-3913
Vulnerability from cvelistv5
Published
2017-06-08 21:00
Modified
2024-08-06 05:56
Severity ?
Summary
The IP stack in multiple Huawei Campus series switch models allows remote attackers to cause a denial of service (reboot) via a crafted ICMP request message.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T05:56:16.330Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-427449.htm",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2015-05-06T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The IP stack in multiple Huawei Campus series switch models allows remote attackers to cause a denial of service (reboot) via a crafted ICMP request message.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-06-08T20:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-427449.htm",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2015-3913",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The IP stack in multiple Huawei Campus series switch models allows remote attackers to cause a denial of service (reboot) via a crafted ICMP request message.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-427449.htm",
                     refsource: "CONFIRM",
                     url: "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-427449.htm",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2015-3913",
      datePublished: "2017-06-08T21:00:00",
      dateReserved: "2015-05-12T00:00:00",
      dateUpdated: "2024-08-06T05:56:16.330Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-22329
Vulnerability from cvelistv5
Published
2021-06-29 19:05
Modified
2024-08-03 18:37
Severity ?
Summary
There has a license management vulnerability in some Huawei products. An attacker with high privilege needs to perform specific operations to exploit the vulnerability on the affected device. Due to improper license management of the device, as a result, the license file can be applied and affect integrity of the device. Affected product versions include:S12700 V200R007C01,V200R007C01B102,V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S1700 V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S2700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S5700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100;S6700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100;S7700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S9700 V200R007C01,V200R007C01B102,V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10.
Impacted products
Vendor Product Version
n/a S12700;S1700;S2700;S5700;S6700;S7700;S9700 Version: V200R007C01,V200R007C01B102,V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10
Version: V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10
Version: V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10
Version: V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T18:37:18.594Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210407-01-resourcemanagement-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "S12700;S1700;S2700;S5700;S6700;S7700;S9700",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "V200R007C01,V200R007C01B102,V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10",
                  },
                  {
                     status: "affected",
                     version: "V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10",
                  },
                  {
                     status: "affected",
                     version: "V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10",
                  },
                  {
                     status: "affected",
                     version: "V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "There has a license management vulnerability in some Huawei products. An attacker with high privilege needs to perform specific operations to exploit the vulnerability on the affected device. Due to improper license management of the device, as a result, the license file can be applied and affect integrity of the device. Affected product versions include:S12700 V200R007C01,V200R007C01B102,V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S1700 V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S2700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S5700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100;S6700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100;S7700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S9700 V200R007C01,V200R007C01B102,V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Improper Licenses Management",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-06-29T19:05:31",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210407-01-resourcemanagement-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2021-22329",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "S12700;S1700;S2700;S5700;S6700;S7700;S9700",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R007C01,V200R007C01B102,V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10",
                                       },
                                       {
                                          version_value: "V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10",
                                       },
                                       {
                                          version_value: "V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10",
                                       },
                                       {
                                          version_value: "V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100",
                                       },
                                       {
                                          version_value: "V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100",
                                       },
                                       {
                                          version_value: "V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10",
                                       },
                                       {
                                          version_value: "V200R007C01,V200R007C01B102,V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "There has a license management vulnerability in some Huawei products. An attacker with high privilege needs to perform specific operations to exploit the vulnerability on the affected device. Due to improper license management of the device, as a result, the license file can be applied and affect integrity of the device. Affected product versions include:S12700 V200R007C01,V200R007C01B102,V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S1700 V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S2700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S5700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100;S6700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100;S7700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S9700 V200R007C01,V200R007C01B102,V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Improper Licenses Management",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210407-01-resourcemanagement-en",
                     refsource: "MISC",
                     url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210407-01-resourcemanagement-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2021-22329",
      datePublished: "2021-06-29T19:05:31",
      dateReserved: "2021-01-05T00:00:00",
      dateUpdated: "2024-08-03T18:37:18.594Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2017-17141
Vulnerability from cvelistv5
Published
2018-03-05 19:00
Modified
2024-09-17 03:23
Severity ?
Summary
Huawei S12700 V200R005C00; V200R006C00; V200R007C00; V200R007C01; V200R007C20; V200R008C00; V200R009C00;S1700 V200R006C10; V200R009C00;S2700 V100R006C03; V200R003C00; V200R005C00; V200R006C00; V200R006C10; V200R007C00; V200R007C00B050; V200R007C00SPC009T; V200R007C00SPC019T; V200R008C00; V200R009C00;S3700 V100R006C03;S5700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R003C02; V200R005C00; V200R005C01; V200R005C02; V200R005C03; V200R006C00; V200R007C00; V200R008C00; V200R009C00;S6700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R005C01; V200R005C02; V200R008C00; V200R009C00;S7700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R006C00; V200R006C01; V200R007C00; V200R007C01; V200R008C00; V200R008C06; V200R009C00;S9700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R006C00; V200R007C00; V200R007C01; V200R008C00; V200R009C00 have a memory leak vulnerability. In some specific conditions, if attackers send specific malformed MPLS Service PING messages to the affected products, products do not release the memory when handling the packets. So successful exploit will result in memory leak of the affected products.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. S12700; S1700; S2700; S3700; S5700; S6700; S7700; S9700 Version: S12700 V200R005C00
Version: V200R006C00
Version: V200R007C00
Version: V200R007C01
Version: V200R007C20
Version: V200R008C00
Version: V200R009C00
Version: S1700 V200R006C10
Version: S2700 V100R006C03
Version: V200R003C00
Version: V200R005C00
Version: V200R006C10
Version: V200R007C00B050
Version: V200R007C00SPC009T
Version: V200R007C00SPC019T
Version: S3700 V100R006C03
Version: S5700 V200R001C00
Version: V200R001C01
Version: V200R002C00
Version: V200R003C02
Version: V200R005C01
Version: V200R005C02
Version: V200R005C03
Version: S6700 V200R001C00
Version: S7700 V200R001C00
Version: V200R006C01
Version: V200R008C06
Version: S9700 V200R001C00
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T20:43:59.910Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-mpls-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "S12700; S1700; S2700; S3700; S5700; S6700; S7700; S9700",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "S12700 V200R005C00",
                  },
                  {
                     status: "affected",
                     version: "V200R006C00",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R007C01",
                  },
                  {
                     status: "affected",
                     version: "V200R007C20",
                  },
                  {
                     status: "affected",
                     version: "V200R008C00",
                  },
                  {
                     status: "affected",
                     version: "V200R009C00",
                  },
                  {
                     status: "affected",
                     version: "S1700 V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "S2700 V100R006C03",
                  },
                  {
                     status: "affected",
                     version: "V200R003C00",
                  },
                  {
                     status: "affected",
                     version: "V200R005C00",
                  },
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00B050",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00SPC009T",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00SPC019T",
                  },
                  {
                     status: "affected",
                     version: "S3700 V100R006C03",
                  },
                  {
                     status: "affected",
                     version: "S5700 V200R001C00",
                  },
                  {
                     status: "affected",
                     version: "V200R001C01",
                  },
                  {
                     status: "affected",
                     version: "V200R002C00",
                  },
                  {
                     status: "affected",
                     version: "V200R003C02",
                  },
                  {
                     status: "affected",
                     version: "V200R005C01",
                  },
                  {
                     status: "affected",
                     version: "V200R005C02",
                  },
                  {
                     status: "affected",
                     version: "V200R005C03",
                  },
                  {
                     status: "affected",
                     version: "S6700 V200R001C00",
                  },
                  {
                     status: "affected",
                     version: "S7700 V200R001C00",
                  },
                  {
                     status: "affected",
                     version: "V200R006C01",
                  },
                  {
                     status: "affected",
                     version: "V200R008C06",
                  },
                  {
                     status: "affected",
                     version: "S9700 V200R001C00",
                  },
               ],
            },
         ],
         datePublic: "2017-12-06T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Huawei S12700 V200R005C00; V200R006C00; V200R007C00; V200R007C01; V200R007C20; V200R008C00; V200R009C00;S1700 V200R006C10; V200R009C00;S2700 V100R006C03; V200R003C00; V200R005C00; V200R006C00; V200R006C10; V200R007C00; V200R007C00B050; V200R007C00SPC009T; V200R007C00SPC019T; V200R008C00; V200R009C00;S3700 V100R006C03;S5700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R003C02; V200R005C00; V200R005C01; V200R005C02; V200R005C03; V200R006C00; V200R007C00; V200R008C00; V200R009C00;S6700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R005C01; V200R005C02; V200R008C00; V200R009C00;S7700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R006C00; V200R006C01; V200R007C00; V200R007C01; V200R008C00; V200R008C06; V200R009C00;S9700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R006C00; V200R007C00; V200R007C01; V200R008C00; V200R009C00 have a memory leak vulnerability. In some specific conditions, if attackers send specific malformed MPLS Service PING messages to the affected products, products do not release the memory when handling the packets. So successful exploit will result in memory leak of the affected products.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "memory leak",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-03-05T18:57:02",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-mpls-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               DATE_PUBLIC: "2017-12-06T00:00:00",
               ID: "CVE-2017-17141",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "S12700; S1700; S2700; S3700; S5700; S6700; S7700; S9700",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "S12700 V200R005C00",
                                       },
                                       {
                                          version_value: "V200R006C00",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R007C01",
                                       },
                                       {
                                          version_value: "V200R007C20",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "S1700 V200R006C10",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "S2700 V100R006C03",
                                       },
                                       {
                                          version_value: "V200R003C00",
                                       },
                                       {
                                          version_value: "V200R005C00",
                                       },
                                       {
                                          version_value: "V200R006C00",
                                       },
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R007C00B050",
                                       },
                                       {
                                          version_value: "V200R007C00SPC009T",
                                       },
                                       {
                                          version_value: "V200R007C00SPC019T",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "S3700 V100R006C03",
                                       },
                                       {
                                          version_value: "S5700 V200R001C00",
                                       },
                                       {
                                          version_value: "V200R001C01",
                                       },
                                       {
                                          version_value: "V200R002C00",
                                       },
                                       {
                                          version_value: "V200R003C00",
                                       },
                                       {
                                          version_value: "V200R003C02",
                                       },
                                       {
                                          version_value: "V200R005C00",
                                       },
                                       {
                                          version_value: "V200R005C01",
                                       },
                                       {
                                          version_value: "V200R005C02",
                                       },
                                       {
                                          version_value: "V200R005C03",
                                       },
                                       {
                                          version_value: "V200R006C00",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "S6700 V200R001C00",
                                       },
                                       {
                                          version_value: "V200R001C01",
                                       },
                                       {
                                          version_value: "V200R002C00",
                                       },
                                       {
                                          version_value: "V200R003C00",
                                       },
                                       {
                                          version_value: "V200R005C00",
                                       },
                                       {
                                          version_value: "V200R005C01",
                                       },
                                       {
                                          version_value: "V200R005C02",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "S7700 V200R001C00",
                                       },
                                       {
                                          version_value: "V200R001C01",
                                       },
                                       {
                                          version_value: "V200R002C00",
                                       },
                                       {
                                          version_value: "V200R003C00",
                                       },
                                       {
                                          version_value: "V200R005C00",
                                       },
                                       {
                                          version_value: "V200R006C00",
                                       },
                                       {
                                          version_value: "V200R006C01",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R007C01",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R008C06",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "S9700 V200R001C00",
                                       },
                                       {
                                          version_value: "V200R001C01",
                                       },
                                       {
                                          version_value: "V200R002C00",
                                       },
                                       {
                                          version_value: "V200R003C00",
                                       },
                                       {
                                          version_value: "V200R005C00",
                                       },
                                       {
                                          version_value: "V200R006C00",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R007C01",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei S12700 V200R005C00; V200R006C00; V200R007C00; V200R007C01; V200R007C20; V200R008C00; V200R009C00;S1700 V200R006C10; V200R009C00;S2700 V100R006C03; V200R003C00; V200R005C00; V200R006C00; V200R006C10; V200R007C00; V200R007C00B050; V200R007C00SPC009T; V200R007C00SPC019T; V200R008C00; V200R009C00;S3700 V100R006C03;S5700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R003C02; V200R005C00; V200R005C01; V200R005C02; V200R005C03; V200R006C00; V200R007C00; V200R008C00; V200R009C00;S6700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R005C01; V200R005C02; V200R008C00; V200R009C00;S7700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R006C00; V200R006C01; V200R007C00; V200R007C01; V200R008C00; V200R008C06; V200R009C00;S9700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R006C00; V200R007C00; V200R007C01; V200R008C00; V200R009C00 have a memory leak vulnerability. In some specific conditions, if attackers send specific malformed MPLS Service PING messages to the affected products, products do not release the memory when handling the packets. So successful exploit will result in memory leak of the affected products.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "memory leak",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-mpls-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-mpls-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2017-17141",
      datePublished: "2018-03-05T19:00:00Z",
      dateReserved: "2017-12-04T00:00:00",
      dateUpdated: "2024-09-17T03:23:15.098Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2016-8785
Vulnerability from cvelistv5
Published
2018-03-09 21:00
Modified
2024-08-06 02:35
Severity ?
Summary
Huawei S12700 V200R007C00, V200R008C00, S5700 V200R007C00, S7700 V200R002C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, S9700 V200R007C00 have an input validation vulnerability. Due to the lack of input validation, an attacker may craft a malformed packet and send it to the device using VRP, causing the device to display additional memory data and possibly leading to sensitive information leakage.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. S12700, S5700, S7700, S9700 Version: S12700 V200R007C00, V200R008C00, S5700 V200R007C00, S7700 V200R002C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, S9700 V200R007C00
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T02:35:01.055Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "95149",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/95149",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161228-04-vrp-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "S12700, S5700, S7700, S9700",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "S12700 V200R007C00, V200R008C00, S5700 V200R007C00, S7700 V200R002C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, S9700 V200R007C00",
                  },
               ],
            },
         ],
         datePublic: "2016-12-28T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Huawei S12700 V200R007C00, V200R008C00, S5700 V200R007C00, S7700 V200R002C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, S9700 V200R007C00 have an input validation vulnerability. Due to the lack of input validation, an attacker may craft a malformed packet and send it to the device using VRP, causing the device to display additional memory data and possibly leading to sensitive information leakage.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "input validation",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-03-10T10:57:01",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               name: "95149",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/95149",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161228-04-vrp-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2016-8785",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "S12700, S5700, S7700, S9700",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "S12700 V200R007C00, V200R008C00, S5700 V200R007C00, S7700 V200R002C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, S9700 V200R007C00",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei S12700 V200R007C00, V200R008C00, S5700 V200R007C00, S7700 V200R002C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, S9700 V200R007C00 have an input validation vulnerability. Due to the lack of input validation, an attacker may craft a malformed packet and send it to the device using VRP, causing the device to display additional memory data and possibly leading to sensitive information leakage.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "input validation",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "95149",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/95149",
                  },
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161228-04-vrp-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161228-04-vrp-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2016-8785",
      datePublished: "2018-03-09T21:00:00",
      dateReserved: "2016-10-18T00:00:00",
      dateUpdated: "2024-08-06T02:35:01.055Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-22321
Vulnerability from cvelistv5
Published
2021-03-22 19:03
Modified
2024-08-03 18:37
Severity ?
Summary
There is a use-after-free vulnerability in a Huawei product. A module cannot deal with specific operations in special scenarios. Attackers can exploit this vulnerability by performing malicious operations. This can cause memory use-after-free, compromising normal service. Affected product include some versions of NIP6300, NIP6600, NIP6800, S1700, S2700, S5700, S6700 , S7700, S9700, Secospace USG6300, Secospace USG6500, Secospace USG6600 and USG9500.
Impacted products
Vendor Product Version
n/a NIP6600;NIP6800;S12700;S1700;S2700;S5700;S6700;S7700;S9700;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500 Version: V500R001C30,V500R001C60
Version: V500R001C30
Version: V500R001C60
Version: V200R007C01,V200R007C01B102,V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10
Version: V200R009C00SPC200,V200R009C00SPC500,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10
Version: V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10
Version: V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T18:37:18.499Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-01-uaf-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "NIP6600;NIP6800;S12700;S1700;S2700;S5700;S6700;S7700;S9700;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30,V500R001C60",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C60",
                  },
                  {
                     status: "affected",
                     version: "V200R007C01,V200R007C01B102,V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10",
                  },
                  {
                     status: "affected",
                     version: "V200R009C00SPC200,V200R009C00SPC500,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10",
                  },
                  {
                     status: "affected",
                     version: "V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10",
                  },
                  {
                     status: "affected",
                     version: "V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "There is a use-after-free vulnerability in a Huawei product. A module cannot deal with specific operations in special scenarios. Attackers can exploit this vulnerability by performing malicious operations. This can cause memory use-after-free, compromising normal service. Affected product include some versions of NIP6300, NIP6600, NIP6800, S1700, S2700, S5700, S6700 , S7700, S9700, Secospace USG6300, Secospace USG6500, Secospace USG6600 and USG9500.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Use After Free",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-03-22T19:03:52",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-01-uaf-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2021-22321",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "NIP6600;NIP6800;S12700;S1700;S2700;S5700;S6700;S7700;S9700;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30,V500R001C60",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C60",
                                       },
                                       {
                                          version_value: "V200R007C01,V200R007C01B102,V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10",
                                       },
                                       {
                                          version_value: "V200R009C00SPC200,V200R009C00SPC500,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10",
                                       },
                                       {
                                          version_value: "V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10",
                                       },
                                       {
                                          version_value: "V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100",
                                       },
                                       {
                                          version_value: "V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100",
                                       },
                                       {
                                          version_value: "V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10",
                                       },
                                       {
                                          version_value: "V200R007C01,V200R007C01B102,V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10",
                                       },
                                       {
                                          version_value: "V500R001C30,V500R001C60",
                                       },
                                       {
                                          version_value: "V500R001C30,V500R001C60",
                                       },
                                       {
                                          version_value: "V500R001C30,V500R001C60",
                                       },
                                       {
                                          version_value: "V500R001C30,V500R001C60",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "There is a use-after-free vulnerability in a Huawei product. A module cannot deal with specific operations in special scenarios. Attackers can exploit this vulnerability by performing malicious operations. This can cause memory use-after-free, compromising normal service. Affected product include some versions of NIP6300, NIP6600, NIP6800, S1700, S2700, S5700, S6700 , S7700, S9700, Secospace USG6300, Secospace USG6500, Secospace USG6600 and USG9500.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Use After Free",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-01-uaf-en",
                     refsource: "MISC",
                     url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-01-uaf-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2021-22321",
      datePublished: "2021-03-22T19:03:52",
      dateReserved: "2021-01-05T00:00:00",
      dateUpdated: "2024-08-03T18:37:18.499Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2014-8572
Vulnerability from cvelistv5
Published
2017-04-02 20:00
Modified
2024-08-06 13:18
Severity ?
Summary
Huawei AC6605 with software V200R001C00; AC6605 with software V200R002C00; ACU with software V200R001C00; ACU with software V200R002C00; S2300, S3300, S2700, S3700 with software V100R006C05 and earlier versions; S5300, S5700, S6300, S6700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions; S7700, S9300, S9300E, S9700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions could allow remote attackers to send a special SSH packet to the VRP device to cause a denial of service.
References
Impacted products
Vendor Product Version
n/a AC6605,AC6605,ACU,S2300, S3300,S2700, S3700,S5300, S5700,S6300, S6700,S7700, S9300,S9300E, S9700, AC6605 AC6605 V200R001C00, AC6605 V200R002C00,ACU ACU V200R001C00, ACU V200R002C00,S2300, S3300, V100R006C05 and earlier versions,S2700, S3700,S5300, S5700, V100R006,?S6300, S6700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions,S7700, S9300, V100R006,S9300E, S9700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions, Version: AC6605,AC6605,ACU,S2300, S3300,S2700, S3700,S5300, S5700,S6300, S6700,S7700, S9300,S9300E, S9700, AC6605 AC6605 V200R001C00, AC6605 V200R002C00,ACU ACU V200R001C00, ACU V200R002C00,S2300, S3300, V100R006C05 and earlier versions,S2700, S3700,S5300, S5700, V100R006,?S6300, S6700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions,S7700, S9300, V100R006,S9300E, S9700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions,
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T13:18:48.644Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/hw-373182",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AC6605,AC6605,ACU,S2300, S3300,S2700, S3700,S5300, S5700,S6300, S6700,S7700, S9300,S9300E, S9700, AC6605 AC6605 V200R001C00, AC6605 V200R002C00,ACU ACU V200R001C00, ACU V200R002C00,S2300, S3300, V100R006C05 and earlier versions,S2700, S3700,S5300, S5700, V100R006,?S6300, S6700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions,S7700, S9300, V100R006,S9300E, S9700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions,",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "AC6605,AC6605,ACU,S2300, S3300,S2700, S3700,S5300, S5700,S6300, S6700,S7700, S9300,S9300E, S9700, AC6605 AC6605 V200R001C00, AC6605 V200R002C00,ACU ACU V200R001C00, ACU V200R002C00,S2300, S3300, V100R006C05 and earlier versions,S2700, S3700,S5300, S5700, V100R006,?S6300, S6700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions,S7700, S9300, V100R006,S9300E, S9700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions,",
                  },
               ],
            },
         ],
         datePublic: "2017-03-27T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Huawei AC6605 with software V200R001C00; AC6605 with software V200R002C00; ACU with software V200R001C00; ACU with software V200R002C00; S2300, S3300, S2700, S3700 with software V100R006C05 and earlier versions; S5300, S5700, S6300, S6700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions; S7700, S9300, S9300E, S9700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions could allow remote attackers to send a special SSH packet to the VRP device to cause a denial of service.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "SSH Denial of Service",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-04-02T19:57:01",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/hw-373182",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2014-8572",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AC6605,AC6605,ACU,S2300, S3300,S2700, S3700,S5300, S5700,S6300, S6700,S7700, S9300,S9300E, S9700, AC6605 AC6605 V200R001C00, AC6605 V200R002C00,ACU ACU V200R001C00, ACU V200R002C00,S2300, S3300, V100R006C05 and earlier versions,S2700, S3700,S5300, S5700, V100R006,?S6300, S6700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions,S7700, S9300, V100R006,S9300E, S9700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions,",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "AC6605,AC6605,ACU,S2300, S3300,S2700, S3700,S5300, S5700,S6300, S6700,S7700, S9300,S9300E, S9700, AC6605 AC6605 V200R001C00, AC6605 V200R002C00,ACU ACU V200R001C00, ACU V200R002C00,S2300, S3300, V100R006C05 and earlier versions,S2700, S3700,S5300, S5700, V100R006,?S6300, S6700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions,S7700, S9300, V100R006,S9300E, S9700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions,",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei AC6605 with software V200R001C00; AC6605 with software V200R002C00; ACU with software V200R001C00; ACU with software V200R002C00; S2300, S3300, S2700, S3700 with software V100R006C05 and earlier versions; S5300, S5700, S6300, S6700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions; S7700, S9300, S9300E, S9700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions could allow remote attackers to send a special SSH packet to the VRP device to cause a denial of service.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "SSH Denial of Service",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/hw-373182",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/hw-373182",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2014-8572",
      datePublished: "2017-04-02T20:00:00",
      dateReserved: "2014-10-31T00:00:00",
      dateUpdated: "2024-08-06T13:18:48.644Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2016-8773
Vulnerability from cvelistv5
Published
2017-04-02 20:00
Modified
2024-08-06 02:35
Severity ?
Summary
Huawei S5300 with software V200R003C00, V200R007C00, V200R008C00, V200R009C00; S5700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C03, V200R007C00, V200R008C00, V200R009C00; S6300 with software V200R003C00, V200R005C00, V200R008C00, V200R009C00; S6700 with software V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R008C00, V200R009C00; S7700 with software V200R007C00, V200R008C00, V200R009C00; S9300 with software V200R007C00, V200R008C00, V200R009C00; S9700 with software V200R007C00, V200R008C00, V200R009C00; and S12700 with software V200R007C00, V200R007C01, V200R008C00, V200R009C00 allow the attacker to cause a denial of service condition by sending malformed MPLS packets.
Impacted products
Vendor Product Version
n/a S5300,S5700,S6300,S6700,S7700,9300,9700,S12700 S5300 with software V200R003C00, V200R007C00, V200R008C00, V200R009C00,S5700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C03, V200R007C00, V200R008C00, V200R009C00,S6300 with software V200R003C00, V200R005C00, V200R008C00, V200R009C00,S6700 with software V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R008C00, V200R009C00,S7700 with software V200R007C00, V200R008C00, V200R009C00,S9300 with software V200R007C00, V200R008C00, V200R009C00,S9700 with software V200R007C00, V200R008C00, V200R009C00 and S12700 with software V200R007C00, V200R007C01, V200R008C00, V200R009C00 Version: S5300,S5700,S6300,S6700,S7700,9300,9700,S12700 S5300 with software V200R003C00, V200R007C00, V200R008C00, V200R009C00,S5700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C03, V200R007C00, V200R008C00, V200R009C00,S6300 with software V200R003C00, V200R005C00, V200R008C00, V200R009C00,S6700 with software V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R008C00, V200R009C00,S7700 with software V200R007C00, V200R008C00, V200R009C00,S9300 with software V200R007C00, V200R008C00, V200R009C00,S9700 with software V200R007C00, V200R008C00, V200R009C00 and S12700 with software V200R007C00, V200R007C01, V200R008C00, V200R009C00
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T02:35:00.177Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161111-01-mpls-en",
               },
               {
                  name: "94285",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/94285",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "S5300,S5700,S6300,S6700,S7700,9300,9700,S12700 S5300 with software V200R003C00, V200R007C00, V200R008C00, V200R009C00,S5700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C03, V200R007C00, V200R008C00, V200R009C00,S6300 with software V200R003C00, V200R005C00, V200R008C00, V200R009C00,S6700 with software V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R008C00, V200R009C00,S7700 with software V200R007C00, V200R008C00, V200R009C00,S9300 with software V200R007C00, V200R008C00, V200R009C00,S9700 with software V200R007C00, V200R008C00, V200R009C00 and S12700 with software V200R007C00, V200R007C01, V200R008C00, V200R009C00",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "S5300,S5700,S6300,S6700,S7700,9300,9700,S12700 S5300 with software V200R003C00, V200R007C00, V200R008C00, V200R009C00,S5700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C03, V200R007C00, V200R008C00, V200R009C00,S6300 with software V200R003C00, V200R005C00, V200R008C00, V200R009C00,S6700 with software V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R008C00, V200R009C00,S7700 with software V200R007C00, V200R008C00, V200R009C00,S9300 with software V200R007C00, V200R008C00, V200R009C00,S9700 with software V200R007C00, V200R008C00, V200R009C00 and S12700 with software V200R007C00, V200R007C01, V200R008C00, V200R009C00",
                  },
               ],
            },
         ],
         datePublic: "2017-03-27T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Huawei S5300 with software V200R003C00, V200R007C00, V200R008C00, V200R009C00; S5700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C03, V200R007C00, V200R008C00, V200R009C00; S6300 with software V200R003C00, V200R005C00, V200R008C00, V200R009C00; S6700 with software V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R008C00, V200R009C00; S7700 with software V200R007C00, V200R008C00, V200R009C00; S9300 with software V200R007C00, V200R008C00, V200R009C00; S9700 with software V200R007C00, V200R008C00, V200R009C00; and S12700 with software V200R007C00, V200R007C01, V200R008C00, V200R009C00 allow the attacker to cause a denial of service condition by sending malformed MPLS packets.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "input validation",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-04-03T09:57:01",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161111-01-mpls-en",
            },
            {
               name: "94285",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/94285",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2016-8773",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "S5300,S5700,S6300,S6700,S7700,9300,9700,S12700 S5300 with software V200R003C00, V200R007C00, V200R008C00, V200R009C00,S5700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C03, V200R007C00, V200R008C00, V200R009C00,S6300 with software V200R003C00, V200R005C00, V200R008C00, V200R009C00,S6700 with software V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R008C00, V200R009C00,S7700 with software V200R007C00, V200R008C00, V200R009C00,S9300 with software V200R007C00, V200R008C00, V200R009C00,S9700 with software V200R007C00, V200R008C00, V200R009C00 and S12700 with software V200R007C00, V200R007C01, V200R008C00, V200R009C00",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "S5300,S5700,S6300,S6700,S7700,9300,9700,S12700 S5300 with software V200R003C00, V200R007C00, V200R008C00, V200R009C00,S5700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C03, V200R007C00, V200R008C00, V200R009C00,S6300 with software V200R003C00, V200R005C00, V200R008C00, V200R009C00,S6700 with software V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R008C00, V200R009C00,S7700 with software V200R007C00, V200R008C00, V200R009C00,S9300 with software V200R007C00, V200R008C00, V200R009C00,S9700 with software V200R007C00, V200R008C00, V200R009C00 and S12700 with software V200R007C00, V200R007C01, V200R008C00, V200R009C00",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei S5300 with software V200R003C00, V200R007C00, V200R008C00, V200R009C00; S5700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C03, V200R007C00, V200R008C00, V200R009C00; S6300 with software V200R003C00, V200R005C00, V200R008C00, V200R009C00; S6700 with software V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R008C00, V200R009C00; S7700 with software V200R007C00, V200R008C00, V200R009C00; S9300 with software V200R007C00, V200R008C00, V200R009C00; S9700 with software V200R007C00, V200R008C00, V200R009C00; and S12700 with software V200R007C00, V200R007C01, V200R008C00, V200R009C00 allow the attacker to cause a denial of service condition by sending malformed MPLS packets.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "input validation",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161111-01-mpls-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161111-01-mpls-en",
                  },
                  {
                     name: "94285",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/94285",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2016-8773",
      datePublished: "2017-04-02T20:00:00",
      dateReserved: "2016-10-18T00:00:00",
      dateUpdated: "2024-08-06T02:35:00.177Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-19397
Vulnerability from cvelistv5
Published
2019-12-13 14:19
Modified
2024-08-05 02:16
Severity ?
Summary
There is a weak algorithm vulnerability in some Huawei products. The affected products use weak algorithms by default. Attackers may exploit the vulnerability to cause information leaks.
Impacted products
Vendor Product Version
n/a S12700;S1700;S2700;S5700;S6700;S7700;S9700 Version: V200R007C00
Version: V200R007C01
Version: V200R007C20
Version: V200R008C00
Version: V200R010C00
Version: V200R011C10
Version: V200R012C00
Version: V200R006C10
Version: V200R012C20
Version: V200R006C00
Version: V200R011C00
Version: V200R005C00
Version: V200R005C02
Version: V200R005C03
Version: V200R005C01
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T02:16:47.108Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-01-vrp-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "S12700;S1700;S2700;S5700;S6700;S7700;S9700",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R007C01",
                  },
                  {
                     status: "affected",
                     version: "V200R007C20",
                  },
                  {
                     status: "affected",
                     version: "V200R008C00",
                  },
                  {
                     status: "affected",
                     version: "V200R010C00",
                  },
                  {
                     status: "affected",
                     version: "V200R011C10",
                  },
                  {
                     status: "affected",
                     version: "V200R012C00",
                  },
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R012C20",
                  },
                  {
                     status: "affected",
                     version: "V200R006C00",
                  },
                  {
                     status: "affected",
                     version: "V200R011C00",
                  },
                  {
                     status: "affected",
                     version: "V200R005C00",
                  },
                  {
                     status: "affected",
                     version: "V200R005C02",
                  },
                  {
                     status: "affected",
                     version: "V200R005C03",
                  },
                  {
                     status: "affected",
                     version: "V200R005C01",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "There is a weak algorithm vulnerability in some Huawei products. The affected products use weak algorithms by default. Attackers may exploit the vulnerability to cause information leaks.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Weak Algorithm",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-12-13T14:19:12",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-01-vrp-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2019-19397",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "S12700;S1700;S2700;S5700;S6700;S7700;S9700",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R007C01",
                                       },
                                       {
                                          version_value: "V200R007C20",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "V200R011C10",
                                       },
                                       {
                                          version_value: "V200R012C00",
                                       },
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R012C20",
                                       },
                                       {
                                          version_value: "V200R006C00",
                                       },
                                       {
                                          version_value: "V200R011C00",
                                       },
                                       {
                                          version_value: "V200R005C00",
                                       },
                                       {
                                          version_value: "V200R005C02",
                                       },
                                       {
                                          version_value: "V200R005C03",
                                       },
                                       {
                                          version_value: "V200R005C01",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "There is a weak algorithm vulnerability in some Huawei products. The affected products use weak algorithms by default. Attackers may exploit the vulnerability to cause information leaks.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Weak Algorithm",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-01-vrp-en",
                     refsource: "MISC",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-01-vrp-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2019-19397",
      datePublished: "2019-12-13T14:19:12",
      dateReserved: "2019-11-29T00:00:00",
      dateUpdated: "2024-08-05T02:16:47.108Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2016-8786
Vulnerability from cvelistv5
Published
2018-03-09 21:00
Modified
2024-08-06 02:35
Severity ?
Summary
Huawei S12700 V200R005C00, V200R006C00, V200R007C00, V200R008C00, S5700 V200R006C00, V200R007C00, V200R008C00, S6700 V200R008C00, S7700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, S9700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00 have a denial of service (DoS) vulnerability. Due to the lack of input validation, a remote attacker may craft a malformed Resource Reservation Protocol (RSVP) packet and send it to the device, causing a few buffer overflows and occasional device restart.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. S12700, S5700, S6700, S7700, S9700 Version: S12700 V200R005C00, V200R006C00, V200R007C00, V200R008C00, S5700 V200R006C00, V200R007C00, V200R008C00, S6700 V200R008C00, S7700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, S9700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T02:35:00.922Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "95139",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/95139",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161228-01-rsvp-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "S12700, S5700, S6700, S7700, S9700",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "S12700 V200R005C00, V200R006C00, V200R007C00, V200R008C00, S5700 V200R006C00, V200R007C00, V200R008C00, S6700 V200R008C00, S7700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, S9700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00",
                  },
               ],
            },
         ],
         datePublic: "2016-12-28T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Huawei S12700 V200R005C00, V200R006C00, V200R007C00, V200R008C00, S5700 V200R006C00, V200R007C00, V200R008C00, S6700 V200R008C00, S7700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, S9700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00 have a denial of service (DoS) vulnerability. Due to the lack of input validation, a remote attacker may craft a malformed Resource Reservation Protocol (RSVP) packet and send it to the device, causing a few buffer overflows and occasional device restart.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "DoS",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-03-10T10:57:01",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               name: "95139",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/95139",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161228-01-rsvp-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2016-8786",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "S12700, S5700, S6700, S7700, S9700",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "S12700 V200R005C00, V200R006C00, V200R007C00, V200R008C00, S5700 V200R006C00, V200R007C00, V200R008C00, S6700 V200R008C00, S7700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, S9700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei S12700 V200R005C00, V200R006C00, V200R007C00, V200R008C00, S5700 V200R006C00, V200R007C00, V200R008C00, S6700 V200R008C00, S7700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, S9700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00 have a denial of service (DoS) vulnerability. Due to the lack of input validation, a remote attacker may craft a malformed Resource Reservation Protocol (RSVP) packet and send it to the device, causing a few buffer overflows and occasional device restart.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "DoS",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "95139",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/95139",
                  },
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161228-01-rsvp-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161228-01-rsvp-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2016-8786",
      datePublished: "2018-03-09T21:00:00",
      dateReserved: "2016-10-18T00:00:00",
      dateUpdated: "2024-08-06T02:35:00.922Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2014-5394
Vulnerability from cvelistv5
Published
2018-01-08 19:00
Modified
2024-08-06 11:41
Severity ?
Summary
Multiple Huawei Campus switches allow remote attackers to enumerate usernames via vectors involving use of SSH by the maintenance terminal.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T11:41:49.182Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "69302",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/69302",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/us/psirt/security-advisories/2014/hw-362701",
               },
               {
                  name: "campusswitch-cve20145394-info-disc(97763)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/97763",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2014-08-20T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Multiple Huawei Campus switches allow remote attackers to enumerate usernames via vectors involving use of SSH by the maintenance terminal.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-01-08T18:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "69302",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/69302",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/us/psirt/security-advisories/2014/hw-362701",
            },
            {
               name: "campusswitch-cve20145394-info-disc(97763)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/97763",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2014-5394",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Multiple Huawei Campus switches allow remote attackers to enumerate usernames via vectors involving use of SSH by the maintenance terminal.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "69302",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/69302",
                  },
                  {
                     name: "http://www.huawei.com/us/psirt/security-advisories/2014/hw-362701",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/us/psirt/security-advisories/2014/hw-362701",
                  },
                  {
                     name: "campusswitch-cve20145394-info-disc(97763)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/97763",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2014-5394",
      datePublished: "2018-01-08T19:00:00",
      dateReserved: "2014-08-22T00:00:00",
      dateUpdated: "2024-08-06T11:41:49.182Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2014-8570
Vulnerability from cvelistv5
Published
2017-04-02 20:00
Modified
2024-08-06 13:18
Severity ?
Summary
Huawei S9300, S9303, S9306, S9312 with software V100R002; S7700, S7703, S7706, S7712 with software V100R003, V100R006, V200R001, V200R002, V200R003, V200R005; S9300E, S9303E, S9306E, S9312E with software V200R001; S9700, S9703, S9706, S9712 with software V200R002, V200R003, V200R005; S12708, S12712 with software V200R005; 5700HI, 5300HI with software V100R006, V200R001, V200R002, V200R003, V200R005; 5710EI, 5310EI with software V200R002, V200R003, V200R005; 5710HI, 5310HI with software V200R003, V200R005; 6700EI, 6300EI with software V200R005 could cause a leak of IP addresses of devices, related to unintended interface support for VRP MPLS LSP Ping.
References
Impacted products
Vendor Product Version
n/a S9300, S9303, S9306, S9312, S7700, S7703, S7706, S7712, S9300E, S9303E, S9306E, S9312E, S9700, S9703, S9706, S9712,S12708, S12712,5700HI,5300HI, 5710EI,5310EI, 5710HI,5310HI, 6700EI,6300EI S9300, S9303, S9306, S9312 with software V100R002,S7700, S7703, S7706, S7712 with software V100R003, V100R006, V200R001, V200R002, V200R003, V200R005,S9300E, S9303E, S9306E, S9312E with software V200R001,S9700, S9703, S9706, S9712 with software V200R002, V200R003, V200R005,S12708, S12712 with software V200R005,5700HI,5300HI with software V100R006, V200R001, V200R002, V200R003, V200R005,5710EI,5310EI with software V200R002, V200R003, V200R005,5710HI,5310HI with software V200R003, V200R005,6700EI,6300EI with software V200R00 Version: S9300, S9303, S9306, S9312, S7700, S7703, S7706, S7712, S9300E, S9303E, S9306E, S9312E, S9700, S9703, S9706, S9712,S12708, S12712,5700HI,5300HI, 5710EI,5310EI, 5710HI,5310HI, 6700EI,6300EI S9300, S9303, S9306, S9312 with software V100R002,S7700, S7703, S7706, S7712 with software V100R003, V100R006, V200R001, V200R002, V200R003, V200R005,S9300E, S9303E, S9306E, S9312E with software V200R001,S9700, S9703, S9706, S9712 with software V200R002, V200R003, V200R005,S12708, S12712 with software V200R005,5700HI,5300HI with software V100R006, V200R001, V200R002, V200R003, V200R005,5710EI,5310EI with software V200R002, V200R003, V200R005,5710HI,5310HI with software V200R003, V200R005,6700EI,6300EI with software V200R00
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T13:18:48.496Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/hw-372145",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "S9300, S9303, S9306, S9312, S7700, S7703, S7706, S7712, S9300E, S9303E, S9306E, S9312E, S9700, S9703, S9706, S9712,S12708, S12712,5700HI,5300HI, 5710EI,5310EI, 5710HI,5310HI, 6700EI,6300EI S9300, S9303, S9306, S9312 with software V100R002,S7700, S7703, S7706, S7712 with software V100R003, V100R006, V200R001, V200R002, V200R003, V200R005,S9300E, S9303E, S9306E, S9312E with software V200R001,S9700, S9703, S9706, S9712 with software V200R002, V200R003, V200R005,S12708, S12712 with software V200R005,5700HI,5300HI with software V100R006, V200R001, V200R002, V200R003, V200R005,5710EI,5310EI with software V200R002, V200R003, V200R005,5710HI,5310HI with software V200R003, V200R005,6700EI,6300EI with software V200R00",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "S9300, S9303, S9306, S9312, S7700, S7703, S7706, S7712, S9300E, S9303E, S9306E, S9312E, S9700, S9703, S9706, S9712,S12708, S12712,5700HI,5300HI, 5710EI,5310EI, 5710HI,5310HI, 6700EI,6300EI S9300, S9303, S9306, S9312 with software V100R002,S7700, S7703, S7706, S7712 with software V100R003, V100R006, V200R001, V200R002, V200R003, V200R005,S9300E, S9303E, S9306E, S9312E with software V200R001,S9700, S9703, S9706, S9712 with software V200R002, V200R003, V200R005,S12708, S12712 with software V200R005,5700HI,5300HI with software V100R006, V200R001, V200R002, V200R003, V200R005,5710EI,5310EI with software V200R002, V200R003, V200R005,5710HI,5310HI with software V200R003, V200R005,6700EI,6300EI with software V200R00",
                  },
               ],
            },
         ],
         datePublic: "2017-03-27T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Huawei S9300, S9303, S9306, S9312 with software V100R002; S7700, S7703, S7706, S7712 with software V100R003, V100R006, V200R001, V200R002, V200R003, V200R005; S9300E, S9303E, S9306E, S9312E with software V200R001; S9700, S9703, S9706, S9712 with software V200R002, V200R003, V200R005; S12708, S12712 with software V200R005; 5700HI, 5300HI with software V100R006, V200R001, V200R002, V200R003, V200R005; 5710EI, 5310EI with software V200R002, V200R003, V200R005; 5710HI, 5310HI with software V200R003, V200R005; 6700EI, 6300EI with software V200R005 could cause a leak of IP addresses of devices, related to unintended interface support for VRP MPLS LSP Ping.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Leakage",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-04-02T19:57:01",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/hw-372145",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2014-8570",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "S9300, S9303, S9306, S9312, S7700, S7703, S7706, S7712, S9300E, S9303E, S9306E, S9312E, S9700, S9703, S9706, S9712,S12708, S12712,5700HI,5300HI, 5710EI,5310EI, 5710HI,5310HI, 6700EI,6300EI S9300, S9303, S9306, S9312 with software V100R002,S7700, S7703, S7706, S7712 with software V100R003, V100R006, V200R001, V200R002, V200R003, V200R005,S9300E, S9303E, S9306E, S9312E with software V200R001,S9700, S9703, S9706, S9712 with software V200R002, V200R003, V200R005,S12708, S12712 with software V200R005,5700HI,5300HI with software V100R006, V200R001, V200R002, V200R003, V200R005,5710EI,5310EI with software V200R002, V200R003, V200R005,5710HI,5310HI with software V200R003, V200R005,6700EI,6300EI with software V200R00",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "S9300, S9303, S9306, S9312, S7700, S7703, S7706, S7712, S9300E, S9303E, S9306E, S9312E, S9700, S9703, S9706, S9712,S12708, S12712,5700HI,5300HI, 5710EI,5310EI, 5710HI,5310HI, 6700EI,6300EI S9300, S9303, S9306, S9312 with software V100R002,S7700, S7703, S7706, S7712 with software V100R003, V100R006, V200R001, V200R002, V200R003, V200R005,S9300E, S9303E, S9306E, S9312E with software V200R001,S9700, S9703, S9706, S9712 with software V200R002, V200R003, V200R005,S12708, S12712 with software V200R005,5700HI,5300HI with software V100R006, V200R001, V200R002, V200R003, V200R005,5710EI,5310EI with software V200R002, V200R003, V200R005,5710HI,5310HI with software V200R003, V200R005,6700EI,6300EI with software V200R00",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei S9300, S9303, S9306, S9312 with software V100R002; S7700, S7703, S7706, S7712 with software V100R003, V100R006, V200R001, V200R002, V200R003, V200R005; S9300E, S9303E, S9306E, S9312E with software V200R001; S9700, S9703, S9706, S9712 with software V200R002, V200R003, V200R005; S12708, S12712 with software V200R005; 5700HI, 5300HI with software V100R006, V200R001, V200R002, V200R003, V200R005; 5710EI, 5310EI with software V200R002, V200R003, V200R005; 5710HI, 5310HI with software V200R003, V200R005; 6700EI, 6300EI with software V200R005 could cause a leak of IP addresses of devices, related to unintended interface support for VRP MPLS LSP Ping.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information Leakage",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/hw-372145",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/hw-372145",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2014-8570",
      datePublished: "2017-04-02T20:00:00",
      dateReserved: "2014-10-31T00:00:00",
      dateUpdated: "2024-08-06T13:18:48.496Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2015-7846
Vulnerability from cvelistv5
Published
2017-09-25 21:00
Modified
2024-08-06 07:59
Severity ?
Summary
Huawei S7700, S9700, S9300 before V200R07C00SPC500, and AR200, AR1200, AR2200, AR3200 before V200R005C20SPC200 allows attackers with physical access to the CF card to obtain sensitive information.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T07:59:00.468Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-446634.htm",
               },
               {
                  name: "76173",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/76173",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2015-08-05T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Huawei S7700, S9700, S9300 before V200R07C00SPC500, and AR200, AR1200, AR2200, AR3200 before V200R005C20SPC200 allows attackers with physical access to the CF card to obtain sensitive information.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-09-25T20:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-446634.htm",
            },
            {
               name: "76173",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/76173",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2015-7846",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei S7700, S9700, S9300 before V200R07C00SPC500, and AR200, AR1200, AR2200, AR3200 before V200R005C20SPC200 allows attackers with physical access to the CF card to obtain sensitive information.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-446634.htm",
                     refsource: "CONFIRM",
                     url: "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-446634.htm",
                  },
                  {
                     name: "76173",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/76173",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2015-7846",
      datePublished: "2017-09-25T21:00:00",
      dateReserved: "2015-10-16T00:00:00",
      dateUpdated: "2024-08-06T07:59:00.468Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2017-15346
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 19:50
Severity ?
Summary
XML parser in Huawei S12700 V200R005C00,S1700 V200R009C00, V200R010C00,S3700 V100R006C03, V100R006C05,S5700 V200R001C00, V200R002C00, V200R003C00, V200R003C02, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S6700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C02, V200R008C00, V200R009C00, V200R010C00,S7700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S9700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,eCNS210_TD V100R004C10, V100R004C10SPC003, V100R004C10SPC100, V100R004C10SPC101, V100R004C10SPC102, V100R004C10SPC200, V100R004C10SPC221, V100R004C10SPC400 has a DOS vulnerability. An attacker may craft specific XML files to the affected products. Due to not check the specially XML file and to parse this file, successful exploit will result in DOS attacks.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. S12700, S1700,S3700,S5700,S6700,S7700, S9700, eCNS210_TD Version: S12700 V200R005C00,S1700 V200R009C00, V200R010C00,S3700 V100R006C03, V100R006C05,S5700 V200R001C00, V200R002C00, V200R003C00, V200R003C02, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S6700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C02, V200R008C00, V200R009C00, V200R010C00,S7700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S9700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,eCNS210_TD V100R004C10, V100R004C10SPC003, V100R004C10SPC100, V100R004C10SPC101, V100R004C10SPC102, V100R004C10SPC200, V100R004C10SPC221, V100R004C10SPC400,
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T19:50:16.560Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-xml-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "S12700, S1700,S3700,S5700,S6700,S7700, S9700, eCNS210_TD",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "S12700 V200R005C00,S1700 V200R009C00, V200R010C00,S3700 V100R006C03, V100R006C05,S5700 V200R001C00, V200R002C00, V200R003C00, V200R003C02, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S6700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C02, V200R008C00, V200R009C00, V200R010C00,S7700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S9700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,eCNS210_TD V100R004C10, V100R004C10SPC003, V100R004C10SPC100, V100R004C10SPC101, V100R004C10SPC102, V100R004C10SPC200, V100R004C10SPC221, V100R004C10SPC400,",
                  },
               ],
            },
         ],
         datePublic: "2017-12-01T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "XML parser in Huawei S12700 V200R005C00,S1700 V200R009C00, V200R010C00,S3700 V100R006C03, V100R006C05,S5700 V200R001C00, V200R002C00, V200R003C00, V200R003C02, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S6700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C02, V200R008C00, V200R009C00, V200R010C00,S7700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S9700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,eCNS210_TD V100R004C10, V100R004C10SPC003, V100R004C10SPC100, V100R004C10SPC101, V100R004C10SPC102, V100R004C10SPC200, V100R004C10SPC221, V100R004C10SPC400 has a DOS vulnerability. An attacker may craft specific XML files to the affected products. Due to not check the specially XML file and to parse this file, successful exploit will result in DOS attacks.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "DoS",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-02-15T15:57:02",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-xml-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2017-15346",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "S12700, S1700,S3700,S5700,S6700,S7700, S9700, eCNS210_TD",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "S12700 V200R005C00,S1700 V200R009C00, V200R010C00,S3700 V100R006C03, V100R006C05,S5700 V200R001C00, V200R002C00, V200R003C00, V200R003C02, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S6700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C02, V200R008C00, V200R009C00, V200R010C00,S7700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S9700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,eCNS210_TD V100R004C10, V100R004C10SPC003, V100R004C10SPC100, V100R004C10SPC101, V100R004C10SPC102, V100R004C10SPC200, V100R004C10SPC221, V100R004C10SPC400,",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "XML parser in Huawei S12700 V200R005C00,S1700 V200R009C00, V200R010C00,S3700 V100R006C03, V100R006C05,S5700 V200R001C00, V200R002C00, V200R003C00, V200R003C02, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S6700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C02, V200R008C00, V200R009C00, V200R010C00,S7700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S9700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,eCNS210_TD V100R004C10, V100R004C10SPC003, V100R004C10SPC100, V100R004C10SPC101, V100R004C10SPC102, V100R004C10SPC200, V100R004C10SPC221, V100R004C10SPC400 has a DOS vulnerability. An attacker may craft specific XML files to the affected products. Due to not check the specially XML file and to parse this file, successful exploit will result in DOS attacks.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "DoS",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-xml-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-xml-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2017-15346",
      datePublished: "2018-02-15T16:00:00",
      dateReserved: "2017-10-14T00:00:00",
      dateUpdated: "2024-08-05T19:50:16.560Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2016-6670
Vulnerability from cvelistv5
Published
2016-09-07 19:00
Modified
2024-08-06 01:36
Severity ?
Summary
Huawei S7700, S9300, S9700, and S12700 devices with software before V200R008C00SPC500 use random numbers with insufficient entropy to generate self-signed certificates, which makes it easier for remote attackers to discover private keys by leveraging knowledge of a certificate.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T01:36:29.483Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160810-01-certificate-en",
               },
               {
                  name: "92438",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/92438",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2016-08-10T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Huawei S7700, S9300, S9700, and S12700 devices with software before V200R008C00SPC500 use random numbers with insufficient entropy to generate self-signed certificates, which makes it easier for remote attackers to discover private keys by leveraging knowledge of a certificate.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2016-09-07T18:57:02",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160810-01-certificate-en",
            },
            {
               name: "92438",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/92438",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2016-6670",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei S7700, S9300, S9700, and S12700 devices with software before V200R008C00SPC500 use random numbers with insufficient entropy to generate self-signed certificates, which makes it easier for remote attackers to discover private keys by leveraging knowledge of a certificate.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160810-01-certificate-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160810-01-certificate-en",
                  },
                  {
                     name: "92438",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/92438",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2016-6670",
      datePublished: "2016-09-07T19:00:00",
      dateReserved: "2016-08-10T00:00:00",
      dateUpdated: "2024-08-06T01:36:29.483Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-1866
Vulnerability from cvelistv5
Published
2021-01-13 22:22
Modified
2024-08-04 06:53
Severity ?
Summary
There is an out-of-bounds read vulnerability in several products. The software reads data past the end of the intended buffer when parsing certain crafted DHCP messages. Successful exploit could cause certain service abnormal. Affected product versions include:NIP6800 versions V500R001C30,V500R001C60SPC500,V500R005C00;S12700 versions V200R008C00;S2700 versions V200R008C00;S5700 versions V200R008C00;S6700 versions V200R008C00;S7700 versions V200R008C00;S9700 versions V200R008C00;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00;USG9500 versions V500R001C30SPC300,V500R001C30SPC600,V500R001C60SPC500,V500R005C00.
Impacted products
Vendor Product Version
n/a NIP6800;S12700;S2700;S5700;S6700;S7700;S9700;Secospace USG6600;USG9500 Version: V500R001C30,V500R001C60SPC500,V500R005C00
Version: V200R008C00
Version: V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00
Version: V500R001C30SPC300,V500R001C30SPC600,V500R001C60SPC500,V500R005C00
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T06:53:59.744Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-09-eudemon-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "NIP6800;S12700;S2700;S5700;S6700;S7700;S9700;Secospace USG6600;USG9500",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30,V500R001C60SPC500,V500R005C00",
                  },
                  {
                     status: "affected",
                     version: "V200R008C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30SPC300,V500R001C30SPC600,V500R001C60SPC500,V500R005C00",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "There is an out-of-bounds read vulnerability in several products. The software reads data past the end of the intended buffer when parsing certain crafted DHCP messages. Successful exploit could cause certain service abnormal. Affected product versions include:NIP6800 versions V500R001C30,V500R001C60SPC500,V500R005C00;S12700 versions V200R008C00;S2700 versions V200R008C00;S5700 versions V200R008C00;S6700 versions V200R008C00;S7700 versions V200R008C00;S9700 versions V200R008C00;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00;USG9500 versions V500R001C30SPC300,V500R001C30SPC600,V500R001C60SPC500,V500R005C00.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Out of Bounds Read",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-01-13T22:22:04",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-09-eudemon-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2020-1866",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "NIP6800;S12700;S2700;S5700;S6700;S7700;S9700;Secospace USG6600;USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30,V500R001C60SPC500,V500R005C00",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00",
                                       },
                                       {
                                          version_value: "V500R001C30SPC300,V500R001C30SPC600,V500R001C60SPC500,V500R005C00",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "There is an out-of-bounds read vulnerability in several products. The software reads data past the end of the intended buffer when parsing certain crafted DHCP messages. Successful exploit could cause certain service abnormal. Affected product versions include:NIP6800 versions V500R001C30,V500R001C60SPC500,V500R005C00;S12700 versions V200R008C00;S2700 versions V200R008C00;S5700 versions V200R008C00;S6700 versions V200R008C00;S7700 versions V200R008C00;S9700 versions V200R008C00;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00;USG9500 versions V500R001C30SPC300,V500R001C30SPC600,V500R001C60SPC500,V500R005C00.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Out of Bounds Read",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-09-eudemon-en",
                     refsource: "MISC",
                     url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-09-eudemon-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2020-1866",
      datePublished: "2021-01-13T22:22:04",
      dateReserved: "2019-11-29T00:00:00",
      dateUpdated: "2024-08-04T06:53:59.744Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2016-6518
Vulnerability from cvelistv5
Published
2016-09-26 15:00
Modified
2024-08-06 01:29
Severity ?
Summary
Memory leak in Huawei S9300, S5300, S5700, S6700, S7700, S9700, and S12700 devices allows remote attackers to cause a denial of service (memory consumption and restart) via a large number of malformed packets.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T01:29:20.323Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "92968",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/92968",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160914-01-sep-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2016-09-14T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Memory leak in Huawei S9300, S5300, S5700, S6700, S7700, S9700, and S12700 devices allows remote attackers to cause a denial of service (memory consumption and restart) via a large number of malformed packets.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2016-09-26T14:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "92968",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/92968",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160914-01-sep-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2016-6518",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Memory leak in Huawei S9300, S5300, S5700, S6700, S7700, S9700, and S12700 devices allows remote attackers to cause a denial of service (memory consumption and restart) via a large number of malformed packets.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "92968",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/92968",
                  },
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160914-01-sep-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160914-01-sep-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2016-6518",
      datePublished: "2016-09-26T15:00:00",
      dateReserved: "2016-08-02T00:00:00",
      dateUpdated: "2024-08-06T01:29:20.323Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2014-4705
Vulnerability from cvelistv5
Published
2018-01-30 17:00
Modified
2024-08-06 11:27
Severity ?
Summary
Multiple heap-based buffer overflows in the eSap software platform in Huawei Campus S9300, S7700, S9700, S5300, S5700, S6300, and S6700 series switches; AR150, AR160, AR200, AR1200, AR2200, AR3200, AR530, NetEngine16EX, SRG1300, SRG2300, and SRG3300 series routers; and WLAN AC6005, AC6605, and ACU2 access controllers allow remote attackers to cause a denial of service (device restart) via a crafted length field in a packet.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T11:27:36.062Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "59349",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/59349",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345171.htm",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2014-06-16T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Multiple heap-based buffer overflows in the eSap software platform in Huawei Campus S9300, S7700, S9700, S5300, S5700, S6300, and S6700 series switches; AR150, AR160, AR200, AR1200, AR2200, AR3200, AR530, NetEngine16EX, SRG1300, SRG2300, and SRG3300 series routers; and WLAN AC6005, AC6605, and ACU2 access controllers allow remote attackers to cause a denial of service (device restart) via a crafted length field in a packet.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-01-30T16:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "59349",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/59349",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345171.htm",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2014-4705",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Multiple heap-based buffer overflows in the eSap software platform in Huawei Campus S9300, S7700, S9700, S5300, S5700, S6300, and S6700 series switches; AR150, AR160, AR200, AR1200, AR2200, AR3200, AR530, NetEngine16EX, SRG1300, SRG2300, and SRG3300 series routers; and WLAN AC6005, AC6605, and ACU2 access controllers allow remote attackers to cause a denial of service (device restart) via a crafted length field in a packet.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "59349",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/59349",
                  },
                  {
                     name: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345171.htm",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345171.htm",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2014-4705",
      datePublished: "2018-01-30T17:00:00",
      dateReserved: "2014-07-01T00:00:00",
      dateUpdated: "2024-08-06T11:27:36.062Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2016-8797
Vulnerability from cvelistv5
Published
2017-04-02 20:00
Modified
2024-08-06 02:35
Severity ?
Summary
Huawei AR3200 with software V200R007C00, V200R005C32, V200R005C20; S12700 with software V200R008C00, V200R007C00; S5300 with software V200R008C00, V200R007C00, V200R006C00; S5700 with software V200R008C00, V200R007C00, V200R006C00; S6300 with software V200R008C00, V200R007C00; S6700 with software V200R008C00, V200R007C00; S7700 with software V200R008C00, V200R007C00, V200R006C00; S9300 with software V200R008C00, V200R007C00, V200R006C00; and S9700 with software V200R008C00, V200R007C00, V200R006C00 allow remote attackers to send abnormal Multiprotocol Label Switching (MPLS) packets to cause memory exhaustion.
Impacted products
Vendor Product Version
n/a AR3200,S12700,S5300,S5700,S6300,S6700,S7700,S9300,S9700 AR3200 V200R007C00, V200R005C32, V200R005C20,S12700 V200R008C00, V200R007C00,S5300 V200R008C00, V200R007C00, V200R006C00,S5700 V200R008C00, V200R007C00, V200R006C00,S6300 V200R008C00, V200R007C00,S6700 V200R008C00, V200R007C00,S7700 V200R008C00, V200R007C00, V200R006C00,S9300 V200R008C00, V200R007C00, V200R006C00,S9700 V200R008C00, V200R007C00, V200R006C00, Version: AR3200,S12700,S5300,S5700,S6300,S6700,S7700,S9300,S9700 AR3200 V200R007C00, V200R005C32, V200R005C20,S12700 V200R008C00, V200R007C00,S5300 V200R008C00, V200R007C00, V200R006C00,S5700 V200R008C00, V200R007C00, V200R006C00,S6300 V200R008C00, V200R007C00,S6700 V200R008C00, V200R007C00,S7700 V200R008C00, V200R007C00, V200R006C00,S9300 V200R008C00, V200R007C00, V200R006C00,S9700 V200R008C00, V200R007C00, V200R006C00,
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T02:35:02.049Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160608-01-mpls-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AR3200,S12700,S5300,S5700,S6300,S6700,S7700,S9300,S9700 AR3200 V200R007C00, V200R005C32, V200R005C20,S12700 V200R008C00, V200R007C00,S5300 V200R008C00, V200R007C00, V200R006C00,S5700 V200R008C00, V200R007C00, V200R006C00,S6300 V200R008C00, V200R007C00,S6700 V200R008C00, V200R007C00,S7700 V200R008C00, V200R007C00, V200R006C00,S9300 V200R008C00, V200R007C00, V200R006C00,S9700 V200R008C00, V200R007C00, V200R006C00,",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "AR3200,S12700,S5300,S5700,S6300,S6700,S7700,S9300,S9700 AR3200 V200R007C00, V200R005C32, V200R005C20,S12700 V200R008C00, V200R007C00,S5300 V200R008C00, V200R007C00, V200R006C00,S5700 V200R008C00, V200R007C00, V200R006C00,S6300 V200R008C00, V200R007C00,S6700 V200R008C00, V200R007C00,S7700 V200R008C00, V200R007C00, V200R006C00,S9300 V200R008C00, V200R007C00, V200R006C00,S9700 V200R008C00, V200R007C00, V200R006C00,",
                  },
               ],
            },
         ],
         datePublic: "2017-03-27T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Huawei AR3200 with software V200R007C00, V200R005C32, V200R005C20; S12700 with software V200R008C00, V200R007C00; S5300 with software V200R008C00, V200R007C00, V200R006C00; S5700 with software V200R008C00, V200R007C00, V200R006C00; S6300 with software V200R008C00, V200R007C00; S6700 with software V200R008C00, V200R007C00; S7700 with software V200R008C00, V200R007C00, V200R006C00; S9300 with software V200R008C00, V200R007C00, V200R006C00; and S9700 with software V200R008C00, V200R007C00, V200R006C00 allow remote attackers to send abnormal Multiprotocol Label Switching (MPLS) packets to cause memory exhaustion.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "memory leak",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-04-02T19:57:01",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160608-01-mpls-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2016-8797",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AR3200,S12700,S5300,S5700,S6300,S6700,S7700,S9300,S9700 AR3200 V200R007C00, V200R005C32, V200R005C20,S12700 V200R008C00, V200R007C00,S5300 V200R008C00, V200R007C00, V200R006C00,S5700 V200R008C00, V200R007C00, V200R006C00,S6300 V200R008C00, V200R007C00,S6700 V200R008C00, V200R007C00,S7700 V200R008C00, V200R007C00, V200R006C00,S9300 V200R008C00, V200R007C00, V200R006C00,S9700 V200R008C00, V200R007C00, V200R006C00,",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "AR3200,S12700,S5300,S5700,S6300,S6700,S7700,S9300,S9700 AR3200 V200R007C00, V200R005C32, V200R005C20,S12700 V200R008C00, V200R007C00,S5300 V200R008C00, V200R007C00, V200R006C00,S5700 V200R008C00, V200R007C00, V200R006C00,S6300 V200R008C00, V200R007C00,S6700 V200R008C00, V200R007C00,S7700 V200R008C00, V200R007C00, V200R006C00,S9300 V200R008C00, V200R007C00, V200R006C00,S9700 V200R008C00, V200R007C00, V200R006C00,",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei AR3200 with software V200R007C00, V200R005C32, V200R005C20; S12700 with software V200R008C00, V200R007C00; S5300 with software V200R008C00, V200R007C00, V200R006C00; S5700 with software V200R008C00, V200R007C00, V200R006C00; S6300 with software V200R008C00, V200R007C00; S6700 with software V200R008C00, V200R007C00; S7700 with software V200R008C00, V200R007C00, V200R006C00; S9300 with software V200R008C00, V200R007C00, V200R006C00; and S9700 with software V200R008C00, V200R007C00, V200R006C00 allow remote attackers to send abnormal Multiprotocol Label Switching (MPLS) packets to cause memory exhaustion.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "memory leak",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160608-01-mpls-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160608-01-mpls-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2016-8797",
      datePublished: "2017-04-02T20:00:00",
      dateReserved: "2016-10-18T00:00:00",
      dateUpdated: "2024-08-06T02:35:02.049Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2016-3678
Vulnerability from cvelistv5
Published
2016-04-11 15:00
Modified
2024-08-06 00:03
Severity ?
Summary
Huawei Quidway S9700, S5700, S5300, S9300, and S7700 switches with software before V200R003SPH012 allow remote attackers to cause a denial of service (switch restart) via crafted traffic.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T00:03:34.462Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160330-01-switch-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2016-03-30T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Huawei Quidway S9700, S5700, S5300, S9300, and S7700 switches with software before V200R003SPH012 allow remote attackers to cause a denial of service (switch restart) via crafted traffic.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2016-04-11T14:57:02",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160330-01-switch-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2016-3678",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei Quidway S9700, S5700, S5300, S9300, and S7700 switches with software before V200R003SPH012 allow remote attackers to cause a denial of service (switch restart) via crafted traffic.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160330-01-switch-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160330-01-switch-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2016-3678",
      datePublished: "2016-04-11T15:00:00",
      dateReserved: "2016-03-28T00:00:00",
      dateUpdated: "2024-08-06T00:03:34.462Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2015-8676
Vulnerability from cvelistv5
Published
2016-04-14 15:00
Modified
2024-08-06 08:29
Severity ?
Summary
Memory leak in Huawei S5300EI, S5300SI, S5310HI, S6300EI/ S2350EI, and S5300LI Campus series switches with software V200R001C00 before V200R001SPH018, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; S9300, S7700, and S9700 Campus series switches with software V200R001C00 before V200R001SPH023, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote attackers to cause a denial of service (memory consumption and reboot) via a large number of ICMPv6 packets.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T08:29:20.209Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-02-switch-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2016-01-13T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Memory leak in Huawei S5300EI, S5300SI, S5310HI, S6300EI/ S2350EI, and S5300LI Campus series switches with software V200R001C00 before V200R001SPH018, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; S9300, S7700, and S9700 Campus series switches with software V200R001C00 before V200R001SPH023, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote attackers to cause a denial of service (memory consumption and reboot) via a large number of ICMPv6 packets.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2016-04-14T14:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-02-switch-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2015-8676",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Memory leak in Huawei S5300EI, S5300SI, S5310HI, S6300EI/ S2350EI, and S5300LI Campus series switches with software V200R001C00 before V200R001SPH018, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; S9300, S7700, and S9700 Campus series switches with software V200R001C00 before V200R001SPH023, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote attackers to cause a denial of service (memory consumption and reboot) via a large number of ICMPv6 packets.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-02-switch-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-02-switch-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2015-8676",
      datePublished: "2016-04-14T15:00:00",
      dateReserved: "2015-12-25T00:00:00",
      dateUpdated: "2024-08-06T08:29:20.209Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2016-2404
Vulnerability from cvelistv5
Published
2017-04-02 20:00
Modified
2024-08-05 23:24
Severity ?
Summary
Huawei switches S5700, S6700, S7700, S9700 with software V200R001C00SPC300, V200R002C00SPC100, V200R003C00SPC300, V200R005C00SPC500, V200R006C00; S12700 with software V200R005C00SPC500, V200R006C00; ACU2 with software V200R005C00SPC500, V200R006C00 have a permission control vulnerability. If a switch enables Authentication, Authorization, and Accounting (AAA) for permission control and user permissions are not appropriate, AAA users may obtain the virtual type terminal (VTY) access permission, resulting in privilege escalation.
Impacted products
Vendor Product Version
n/a S5700, S6700, S7700, S9700,S12700,ACU2,, S5700, S6700, S7700, S9700 V200R001C00SPC300, V200R002C00SPC100, V200R003C00SPC300, V200R005C00SPC500, V200R006C00,,S12700 V200R005C00SPC500, V200R006C00,,ACU2 V200R005C00SPC500, V200R006C00, Version: S5700, S6700, S7700, S9700,S12700,ACU2,, S5700, S6700, S7700, S9700 V200R001C00SPC300, V200R002C00SPC100, V200R003C00SPC300, V200R005C00SPC500, V200R006C00,,S12700 V200R005C00SPC500, V200R006C00,,ACU2 V200R005C00SPC500, V200R006C00,
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T23:24:49.290Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160217-01-switch-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "S5700, S6700, S7700, S9700,S12700,ACU2,, S5700, S6700, S7700, S9700 V200R001C00SPC300, V200R002C00SPC100, V200R003C00SPC300, V200R005C00SPC500, V200R006C00,,S12700 V200R005C00SPC500, V200R006C00,,ACU2 V200R005C00SPC500, V200R006C00,",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "S5700, S6700, S7700, S9700,S12700,ACU2,, S5700, S6700, S7700, S9700 V200R001C00SPC300, V200R002C00SPC100, V200R003C00SPC300, V200R005C00SPC500, V200R006C00,,S12700 V200R005C00SPC500, V200R006C00,,ACU2 V200R005C00SPC500, V200R006C00,",
                  },
               ],
            },
         ],
         datePublic: "2017-03-27T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Huawei switches S5700, S6700, S7700, S9700 with software V200R001C00SPC300, V200R002C00SPC100, V200R003C00SPC300, V200R005C00SPC500, V200R006C00; S12700 with software V200R005C00SPC500, V200R006C00; ACU2 with software V200R005C00SPC500, V200R006C00 have a permission control vulnerability. If a switch enables Authentication, Authorization, and Accounting (AAA) for permission control and user permissions are not appropriate, AAA users may obtain the virtual type terminal (VTY) access permission, resulting in privilege escalation.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Permission Control",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-04-02T19:57:01",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160217-01-switch-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2016-2404",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "S5700, S6700, S7700, S9700,S12700,ACU2,, S5700, S6700, S7700, S9700 V200R001C00SPC300, V200R002C00SPC100, V200R003C00SPC300, V200R005C00SPC500, V200R006C00,,S12700 V200R005C00SPC500, V200R006C00,,ACU2 V200R005C00SPC500, V200R006C00,",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "S5700, S6700, S7700, S9700,S12700,ACU2,, S5700, S6700, S7700, S9700 V200R001C00SPC300, V200R002C00SPC100, V200R003C00SPC300, V200R005C00SPC500, V200R006C00,,S12700 V200R005C00SPC500, V200R006C00,,ACU2 V200R005C00SPC500, V200R006C00,",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei switches S5700, S6700, S7700, S9700 with software V200R001C00SPC300, V200R002C00SPC100, V200R003C00SPC300, V200R005C00SPC500, V200R006C00; S12700 with software V200R005C00SPC500, V200R006C00; ACU2 with software V200R005C00SPC500, V200R006C00 have a permission control vulnerability. If a switch enables Authentication, Authorization, and Accounting (AAA) for permission control and user permissions are not appropriate, AAA users may obtain the virtual type terminal (VTY) access permission, resulting in privilege escalation.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Permission Control",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160217-01-switch-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160217-01-switch-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2016-2404",
      datePublished: "2017-04-02T20:00:00",
      dateReserved: "2016-02-18T00:00:00",
      dateUpdated: "2024-08-05T23:24:49.290Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2017-17300
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 20:51
Severity ?
Summary
Huawei S12700 V200R008C00, V200R009C00, S5700 V200R007C00, V200R008C00, V200R009C00, S6700 V200R008C00, V200R009C00, S7700 V200R008C00, V200R009C00, S9700 V200R008C00, V200R009C00 have a numeric errors vulnerability. An unauthenticated, remote attacker may send specific TCP messages with keychain authentication option to the affected products. Due to the improper validation of the messages, it will cause numeric errors when handling the messages. Successful exploit will cause the affected products to reset.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. S12700,S5700,S6700,S7700,S9700 Version: S12700 V200R008C00, V200R009C00, S5700 V200R007C00, V200R008C00, V200R009C00, S6700 V200R008C00, V200R009C00, S7700 V200R008C00, V200R009C00, S9700 V200R008C00, V200R009C00
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T20:51:30.510Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-router-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "S12700,S5700,S6700,S7700,S9700",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "S12700 V200R008C00, V200R009C00, S5700 V200R007C00, V200R008C00, V200R009C00, S6700 V200R008C00, V200R009C00, S7700 V200R008C00, V200R009C00, S9700 V200R008C00, V200R009C00",
                  },
               ],
            },
         ],
         datePublic: "2017-12-15T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Huawei S12700 V200R008C00, V200R009C00, S5700 V200R007C00, V200R008C00, V200R009C00, S6700 V200R008C00, V200R009C00, S7700 V200R008C00, V200R009C00, S9700 V200R008C00, V200R009C00 have a numeric errors vulnerability. An unauthenticated, remote attacker may send specific TCP messages with keychain authentication option to the affected products. Due to the improper validation of the messages, it will cause numeric errors when handling the messages. Successful exploit will cause the affected products to reset.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "numeric errors",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-02-15T15:57:02",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-router-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2017-17300",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "S12700,S5700,S6700,S7700,S9700",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "S12700 V200R008C00, V200R009C00, S5700 V200R007C00, V200R008C00, V200R009C00, S6700 V200R008C00, V200R009C00, S7700 V200R008C00, V200R009C00, S9700 V200R008C00, V200R009C00",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei S12700 V200R008C00, V200R009C00, S5700 V200R007C00, V200R008C00, V200R009C00, S6700 V200R008C00, V200R009C00, S7700 V200R008C00, V200R009C00, S9700 V200R008C00, V200R009C00 have a numeric errors vulnerability. An unauthenticated, remote attacker may send specific TCP messages with keychain authentication option to the affected products. Due to the improper validation of the messages, it will cause numeric errors when handling the messages. Successful exploit will cause the affected products to reset.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "numeric errors",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-router-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-router-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2017-17300",
      datePublished: "2018-02-15T16:00:00",
      dateReserved: "2017-12-04T00:00:00",
      dateUpdated: "2024-08-05T20:51:30.510Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2017-15327
Vulnerability from cvelistv5
Published
2018-04-11 17:00
Modified
2024-08-05 19:50
Severity ?
Summary
S12700 V200R005C00, V200R006C00, V200R006C01, V200R007C00, V200R007C01, V200R007C20, V200R008C00, V200R008C06, V200R009C00, V200R010C00, S7700 V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R006C01, V200R007C00, V200R007C01, V200R008C00, V200R008C06, V200R009C00, V200R010C00, S9700 V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R006C01, V200R007C00, V200R007C01, V200R008C00, V200R009C00, V200R010C00 have an improper authorization vulnerability on Huawei switch products. The system incorrectly performs an authorization check when a normal user attempts to access certain information which is supposed to be accessed only by authenticated user. Successful exploit could cause information disclosure.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. S12700, S7700, S9700 Version: S12700 V200R005C00, V200R006C00, V200R006C01, V200R007C00, V200R007C01, V200R007C20, V200R008C00, V200R008C06, V200R009C00, V200R010C00, S7700 V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R006C01, V200R007C00, V200R007C01, V200R008C00, V200R008C06, V200R009C00, V200R010C00, S9700 V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R006C01, V200R007C00, V200R007C01, V200R008C00, V200R009C00, V200R010C00
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T19:50:16.457Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180328-01-authentication-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "S12700, S7700, S9700",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "S12700 V200R005C00, V200R006C00, V200R006C01, V200R007C00, V200R007C01, V200R007C20, V200R008C00, V200R008C06, V200R009C00, V200R010C00, S7700 V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R006C01, V200R007C00, V200R007C01, V200R008C00, V200R008C06, V200R009C00, V200R010C00, S9700 V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R006C01, V200R007C00, V200R007C01, V200R008C00, V200R009C00, V200R010C00",
                  },
               ],
            },
         ],
         datePublic: "2018-03-28T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "S12700 V200R005C00, V200R006C00, V200R006C01, V200R007C00, V200R007C01, V200R007C20, V200R008C00, V200R008C06, V200R009C00, V200R010C00, S7700 V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R006C01, V200R007C00, V200R007C01, V200R008C00, V200R008C06, V200R009C00, V200R010C00, S9700 V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R006C01, V200R007C00, V200R007C01, V200R008C00, V200R009C00, V200R010C00 have an improper authorization vulnerability on Huawei switch products. The system incorrectly performs an authorization check when a normal user attempts to access certain information which is supposed to be accessed only by authenticated user. Successful exploit could cause information disclosure.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "improper authorization",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-04-11T16:57:01",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180328-01-authentication-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2017-15327",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "S12700, S7700, S9700",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "S12700 V200R005C00, V200R006C00, V200R006C01, V200R007C00, V200R007C01, V200R007C20, V200R008C00, V200R008C06, V200R009C00, V200R010C00, S7700 V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R006C01, V200R007C00, V200R007C01, V200R008C00, V200R008C06, V200R009C00, V200R010C00, S9700 V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R006C01, V200R007C00, V200R007C01, V200R008C00, V200R009C00, V200R010C00",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "S12700 V200R005C00, V200R006C00, V200R006C01, V200R007C00, V200R007C01, V200R007C20, V200R008C00, V200R008C06, V200R009C00, V200R010C00, S7700 V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R006C01, V200R007C00, V200R007C01, V200R008C00, V200R008C06, V200R009C00, V200R010C00, S9700 V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R006C01, V200R007C00, V200R007C01, V200R008C00, V200R009C00, V200R010C00 have an improper authorization vulnerability on Huawei switch products. The system incorrectly performs an authorization check when a normal user attempts to access certain information which is supposed to be accessed only by authenticated user. Successful exploit could cause information disclosure.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "improper authorization",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180328-01-authentication-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180328-01-authentication-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2017-15327",
      datePublished: "2018-04-11T17:00:00",
      dateReserved: "2017-10-14T00:00:00",
      dateUpdated: "2024-08-05T19:50:16.457Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2015-8677
Vulnerability from cvelistv5
Published
2016-04-14 15:00
Modified
2024-08-06 08:29
Severity ?
Summary
Memory leak in Huawei S5300EI, S5300SI, S5310HI, and S6300EI Campus series switches with software V200R003C00 before V200R003SPH011 and V200R005C00 before V200R005SPH008; S2350EI and S5300LI Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH008, and V200R006C00 before V200R006SPH002; S9300, S7700, and S9700 Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH009, and V200R006C00 before V200R006SPH003; S5720HI and S5720EI Campus series switches with software V200R006C00 before V200R006SPH002; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote authenticated users to cause a denial of service (memory consumption and device restart) by logging in and out of the (1) HTTPS or (2) SFTP server, related to SSL session information.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T08:29:20.208Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-03-switch-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2016-01-13T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Memory leak in Huawei S5300EI, S5300SI, S5310HI, and S6300EI Campus series switches with software V200R003C00 before V200R003SPH011 and V200R005C00 before V200R005SPH008; S2350EI and S5300LI Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH008, and V200R006C00 before V200R006SPH002; S9300, S7700, and S9700 Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH009, and V200R006C00 before V200R006SPH003; S5720HI and S5720EI Campus series switches with software V200R006C00 before V200R006SPH002; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote authenticated users to cause a denial of service (memory consumption and device restart) by logging in and out of the (1) HTTPS or (2) SFTP server, related to SSL session information.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2016-04-14T14:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-03-switch-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2015-8677",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Memory leak in Huawei S5300EI, S5300SI, S5310HI, and S6300EI Campus series switches with software V200R003C00 before V200R003SPH011 and V200R005C00 before V200R005SPH008; S2350EI and S5300LI Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH008, and V200R006C00 before V200R006SPH002; S9300, S7700, and S9700 Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH009, and V200R006C00 before V200R006SPH003; S5720HI and S5720EI Campus series switches with software V200R006C00 before V200R006SPH002; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote authenticated users to cause a denial of service (memory consumption and device restart) by logging in and out of the (1) HTTPS or (2) SFTP server, related to SSL session information.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-03-switch-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-03-switch-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2015-8677",
      datePublished: "2016-04-14T15:00:00",
      dateReserved: "2015-12-25T00:00:00",
      dateUpdated: "2024-08-06T08:29:20.208Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2017-15333
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 19:50
Severity ?
Summary
XML parser in Huawei S12700 V200R005C00,S1700 V200R009C00, V200R010C00,S3700 V100R006C03, V100R006C05,S5700 V200R001C00, V200R002C00, V200R003C00, V200R003C02, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S6700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C02, V200R008C00, V200R009C00, V200R010C00,S7700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S9700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,eCNS210_TD V100R004C10, V100R004C10SPC003, V100R004C10SPC100, V100R004C10SPC101, V100R004C10SPC102, V100R004C10SPC200, V100R004C10SPC221, V100R004C10SPC400 has a DOS vulnerability. An attacker may craft specific XML files to the affected products. Due to not check the specially XML file and to parse this file, successful exploit will result in DOS attacks.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. S12700, S1700,S3700,S5700,S6700,S7700, S9700, eCNS210_TD Version: S12700 V200R005C00,S1700 V200R009C00, V200R010C00,S3700 V100R006C03, V100R006C05,S5700 V200R001C00, V200R002C00, V200R003C00, V200R003C02, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S6700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C02, V200R008C00, V200R009C00, V200R010C00,S7700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S9700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,eCNS210_TD V100R004C10, V100R004C10SPC003, V100R004C10SPC100, V100R004C10SPC101, V100R004C10SPC102, V100R004C10SPC200, V100R004C10SPC221, V100R004C10SPC400,
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T19:50:16.483Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-xml-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "S12700, S1700,S3700,S5700,S6700,S7700, S9700, eCNS210_TD",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "S12700 V200R005C00,S1700 V200R009C00, V200R010C00,S3700 V100R006C03, V100R006C05,S5700 V200R001C00, V200R002C00, V200R003C00, V200R003C02, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S6700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C02, V200R008C00, V200R009C00, V200R010C00,S7700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S9700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,eCNS210_TD V100R004C10, V100R004C10SPC003, V100R004C10SPC100, V100R004C10SPC101, V100R004C10SPC102, V100R004C10SPC200, V100R004C10SPC221, V100R004C10SPC400,",
                  },
               ],
            },
         ],
         datePublic: "2017-12-01T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "XML parser in Huawei S12700 V200R005C00,S1700 V200R009C00, V200R010C00,S3700 V100R006C03, V100R006C05,S5700 V200R001C00, V200R002C00, V200R003C00, V200R003C02, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S6700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C02, V200R008C00, V200R009C00, V200R010C00,S7700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S9700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,eCNS210_TD V100R004C10, V100R004C10SPC003, V100R004C10SPC100, V100R004C10SPC101, V100R004C10SPC102, V100R004C10SPC200, V100R004C10SPC221, V100R004C10SPC400 has a DOS vulnerability. An attacker may craft specific XML files to the affected products. Due to not check the specially XML file and to parse this file, successful exploit will result in DOS attacks.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "DOS",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-02-15T15:57:02",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-xml-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2017-15333",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "S12700, S1700,S3700,S5700,S6700,S7700, S9700, eCNS210_TD",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "S12700 V200R005C00,S1700 V200R009C00, V200R010C00,S3700 V100R006C03, V100R006C05,S5700 V200R001C00, V200R002C00, V200R003C00, V200R003C02, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S6700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C02, V200R008C00, V200R009C00, V200R010C00,S7700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S9700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,eCNS210_TD V100R004C10, V100R004C10SPC003, V100R004C10SPC100, V100R004C10SPC101, V100R004C10SPC102, V100R004C10SPC200, V100R004C10SPC221, V100R004C10SPC400,",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "XML parser in Huawei S12700 V200R005C00,S1700 V200R009C00, V200R010C00,S3700 V100R006C03, V100R006C05,S5700 V200R001C00, V200R002C00, V200R003C00, V200R003C02, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S6700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C02, V200R008C00, V200R009C00, V200R010C00,S7700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S9700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,eCNS210_TD V100R004C10, V100R004C10SPC003, V100R004C10SPC100, V100R004C10SPC101, V100R004C10SPC102, V100R004C10SPC200, V100R004C10SPC221, V100R004C10SPC400 has a DOS vulnerability. An attacker may craft specific XML files to the affected products. Due to not check the specially XML file and to parse this file, successful exploit will result in DOS attacks.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "DOS",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-xml-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-xml-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2017-15333",
      datePublished: "2018-02-15T16:00:00",
      dateReserved: "2017-10-14T00:00:00",
      dateUpdated: "2024-08-05T19:50:16.483Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2017-17250
Vulnerability from cvelistv5
Published
2018-03-09 17:00
Modified
2024-08-05 20:43
Severity ?
Summary
Huawei AR120-S V200R005C32; AR1200 V200R005C32; AR1200-S V200R005C32; AR150 V200R005C32; AR150-S V200R005C32; AR160 V200R005C32; AR200 V200R005C32; AR200-S V200R005C32; AR2200-S V200R005C32; AR3200 V200R005C32; V200R007C00; AR510 V200R005C32; NetEngine16EX V200R005C32; SRG1300 V200R005C32; SRG2300 V200R005C32; SRG3300 V200R005C32 have an out-of-bounds write vulnerability. When a user executes a query command after the device received an abnormal OSPF message, the software writes data past the end of the intended buffer due to the insufficient verification of the input data. An unauthenticated, remote attacker could exploit this vulnerability by sending abnormal OSPF messages to the device. A successful exploit could cause the system to crash.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. AR120-S; AR1200; AR1200-S; AR150; AR150-S; AR160; AR200; AR200-S; AR2200-S; AR3200; AR510; NetEngine16EX; SRG1300; SRG2300; SRG3300 Version: AR120-S V200R005C32
Version: AR1200 V200R005C32
Version: AR1200-S V200R005C32
Version: AR150 V200R005C32
Version: AR150-S V200R005C32
Version: AR160 V200R005C32
Version: AR200 V200R005C32
Version: AR200-S V200R005C32
Version: AR2200-S V200R005C32
Version: AR3200 V200R005C32
Version: V200R007C00
Version: AR510 V200R005C32
Version: NetEngine16EX V200R005C32
Version: SRG1300 V200R005C32
Version: SRG2300 V200R005C32
Version: SRG3300 V200R005C32
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T20:43:59.885Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180214-01-ospf-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AR120-S; AR1200; AR1200-S; AR150; AR150-S; AR160; AR200; AR200-S; AR2200-S; AR3200; AR510; NetEngine16EX; SRG1300; SRG2300; SRG3300",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "AR120-S V200R005C32",
                  },
                  {
                     status: "affected",
                     version: "AR1200 V200R005C32",
                  },
                  {
                     status: "affected",
                     version: "AR1200-S V200R005C32",
                  },
                  {
                     status: "affected",
                     version: "AR150 V200R005C32",
                  },
                  {
                     status: "affected",
                     version: "AR150-S V200R005C32",
                  },
                  {
                     status: "affected",
                     version: "AR160 V200R005C32",
                  },
                  {
                     status: "affected",
                     version: "AR200 V200R005C32",
                  },
                  {
                     status: "affected",
                     version: "AR200-S V200R005C32",
                  },
                  {
                     status: "affected",
                     version: "AR2200-S V200R005C32",
                  },
                  {
                     status: "affected",
                     version: "AR3200 V200R005C32",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "AR510 V200R005C32",
                  },
                  {
                     status: "affected",
                     version: "NetEngine16EX V200R005C32",
                  },
                  {
                     status: "affected",
                     version: "SRG1300 V200R005C32",
                  },
                  {
                     status: "affected",
                     version: "SRG2300 V200R005C32",
                  },
                  {
                     status: "affected",
                     version: "SRG3300 V200R005C32",
                  },
               ],
            },
         ],
         datePublic: "2018-02-14T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Huawei AR120-S V200R005C32; AR1200 V200R005C32; AR1200-S V200R005C32; AR150 V200R005C32; AR150-S V200R005C32; AR160 V200R005C32; AR200 V200R005C32; AR200-S V200R005C32; AR2200-S V200R005C32; AR3200 V200R005C32; V200R007C00; AR510 V200R005C32; NetEngine16EX V200R005C32; SRG1300 V200R005C32; SRG2300 V200R005C32; SRG3300 V200R005C32 have an out-of-bounds write vulnerability. When a user executes a query command after the device received an abnormal OSPF message, the software writes data past the end of the intended buffer due to the insufficient verification of the input data. An unauthenticated, remote attacker could exploit this vulnerability by sending abnormal OSPF messages to the device. A successful exploit could cause the system to crash.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "out-of-bounds write",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-03-09T16:57:01",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180214-01-ospf-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2017-17250",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AR120-S; AR1200; AR1200-S; AR150; AR150-S; AR160; AR200; AR200-S; AR2200-S; AR3200; AR510; NetEngine16EX; SRG1300; SRG2300; SRG3300",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "AR120-S V200R005C32",
                                       },
                                       {
                                          version_value: "AR1200 V200R005C32",
                                       },
                                       {
                                          version_value: "AR1200-S V200R005C32",
                                       },
                                       {
                                          version_value: "AR150 V200R005C32",
                                       },
                                       {
                                          version_value: "AR150-S V200R005C32",
                                       },
                                       {
                                          version_value: "AR160 V200R005C32",
                                       },
                                       {
                                          version_value: "AR200 V200R005C32",
                                       },
                                       {
                                          version_value: "AR200-S V200R005C32",
                                       },
                                       {
                                          version_value: "AR2200-S V200R005C32",
                                       },
                                       {
                                          version_value: "AR3200 V200R005C32",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "AR510 V200R005C32",
                                       },
                                       {
                                          version_value: "NetEngine16EX V200R005C32",
                                       },
                                       {
                                          version_value: "SRG1300 V200R005C32",
                                       },
                                       {
                                          version_value: "SRG2300 V200R005C32",
                                       },
                                       {
                                          version_value: "SRG3300 V200R005C32",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei AR120-S V200R005C32; AR1200 V200R005C32; AR1200-S V200R005C32; AR150 V200R005C32; AR150-S V200R005C32; AR160 V200R005C32; AR200 V200R005C32; AR200-S V200R005C32; AR2200-S V200R005C32; AR3200 V200R005C32; V200R007C00; AR510 V200R005C32; NetEngine16EX V200R005C32; SRG1300 V200R005C32; SRG2300 V200R005C32; SRG3300 V200R005C32 have an out-of-bounds write vulnerability. When a user executes a query command after the device received an abnormal OSPF message, the software writes data past the end of the intended buffer due to the insufficient verification of the input data. An unauthenticated, remote attacker could exploit this vulnerability by sending abnormal OSPF messages to the device. A successful exploit could cause the system to crash.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "out-of-bounds write",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180214-01-ospf-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180214-01-ospf-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2017-17250",
      datePublished: "2018-03-09T17:00:00",
      dateReserved: "2017-12-04T00:00:00",
      dateUpdated: "2024-08-05T20:43:59.885Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2017-17137
Vulnerability from cvelistv5
Published
2018-03-05 19:00
Modified
2024-09-17 00:42
Severity ?
Summary
PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has an Out-of-Bounds memory access vulnerability due to insufficient verification. An authenticated local attacker can make processing crash by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. DP300; IPS Module; NGFW Module; NIP6300; NIP6600; RP200; S12700; S1700; S2700; S5700; S6700; S7700; S9700; Secospace USG6300; Secospace USG6500; Secospace USG6600; TE30; TE40; TE50; TE60; TP3106; TP3206; USG9500; ViewPoint 9030 Version: DP300 V500R002C00
Version: IPS Module V500R001C00
Version: V500R001C30
Version: NGFW Module V500R001C00
Version: V500R002C00
Version: NIP6300 V500R001C00
Version: NIP6600 V500R001C00
Version: RP200 V500R002C00
Version: V600R006C00
Version: S12700 V200R007C00
Version: V200R007C01
Version: V200R008C00
Version: V200R009C00
Version: V200R010C00
Version: S1700 V200R006C10
Version: S2700 V200R006C10
Version: V200R007C00
Version: S5700 V200R006C00
Version: S6700 V200R008C00
Version: S7700 V200R007C00
Version: S9700 V200R007C00
Version: Secospace USG6300 V500R001C00
Version: Secospace USG6500 V500R001C00
Version: Secospace USG6600 V500R001C00
Version: V500R001C30S
Version: TE30 V100R001C02
Version: V100R001C10
Version: TE40 V500R002C00
Version: TE50 V500R002C00
Version: TE60 V100R001C01
Version: TP3106 V100R002C00
Version: TP3206 V100R002C00
Version: V100R002C10
Version: USG9500 V500R001C00
Version: ViewPoint 9030 V100R011C02
Version: V100R011C03
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T20:43:59.902Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "DP300; IPS Module; NGFW Module; NIP6300; NIP6600; RP200; S12700; S1700; S2700; S5700; S6700; S7700; S9700; Secospace USG6300; Secospace USG6500; Secospace USG6600; TE30; TE40; TE50; TE60; TP3106; TP3206; USG9500; ViewPoint 9030",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "DP300 V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "IPS Module V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "NGFW Module V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "NIP6300 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "NIP6600 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "RP200 V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "V600R006C00",
                  },
                  {
                     status: "affected",
                     version: "S12700 V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R007C01",
                  },
                  {
                     status: "affected",
                     version: "V200R008C00",
                  },
                  {
                     status: "affected",
                     version: "V200R009C00",
                  },
                  {
                     status: "affected",
                     version: "V200R010C00",
                  },
                  {
                     status: "affected",
                     version: "S1700 V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "S2700 V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "S5700 V200R006C00",
                  },
                  {
                     status: "affected",
                     version: "S6700 V200R008C00",
                  },
                  {
                     status: "affected",
                     version: "S7700 V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "S9700 V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "Secospace USG6300 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "Secospace USG6500 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "Secospace USG6600 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30S",
                  },
                  {
                     status: "affected",
                     version: "TE30 V100R001C02",
                  },
                  {
                     status: "affected",
                     version: "V100R001C10",
                  },
                  {
                     status: "affected",
                     version: "TE40 V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "TE50 V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "TE60 V100R001C01",
                  },
                  {
                     status: "affected",
                     version: "TP3106 V100R002C00",
                  },
                  {
                     status: "affected",
                     version: "TP3206 V100R002C00",
                  },
                  {
                     status: "affected",
                     version: "V100R002C10",
                  },
                  {
                     status: "affected",
                     version: "USG9500 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "ViewPoint 9030 V100R011C02",
                  },
                  {
                     status: "affected",
                     version: "V100R011C03",
                  },
               ],
            },
         ],
         datePublic: "2017-12-06T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has an Out-of-Bounds memory access vulnerability due to insufficient verification. An authenticated local attacker can make processing crash by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Out-of-Bounds memory access",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-03-05T18:57:02",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               DATE_PUBLIC: "2017-12-06T00:00:00",
               ID: "CVE-2017-17137",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "DP300; IPS Module; NGFW Module; NIP6300; NIP6600; RP200; S12700; S1700; S2700; S5700; S6700; S7700; S9700; Secospace USG6300; Secospace USG6500; Secospace USG6600; TE30; TE40; TE50; TE60; TP3106; TP3206; USG9500; ViewPoint 9030",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "DP300 V500R002C00",
                                       },
                                       {
                                          version_value: "IPS Module V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "NGFW Module V500R001C00",
                                       },
                                       {
                                          version_value: "V500R002C00",
                                       },
                                       {
                                          version_value: "NIP6300 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "NIP6600 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "RP200 V500R002C00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                       {
                                          version_value: "S12700 V200R007C00",
                                       },
                                       {
                                          version_value: "V200R007C01",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S1700 V200R006C10",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S2700 V200R006C10",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S5700 V200R006C00",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S6700 V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S7700 V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S9700 V200R007C00",
                                       },
                                       {
                                          version_value: "V200R007C01",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "Secospace USG6300 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "Secospace USG6500 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "Secospace USG6600 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30S",
                                       },
                                       {
                                          version_value: "TE30 V100R001C02",
                                       },
                                       {
                                          version_value: "V100R001C10",
                                       },
                                       {
                                          version_value: "V500R002C00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                       {
                                          version_value: "TE40 V500R002C00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                       {
                                          version_value: "TE50 V500R002C00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                       {
                                          version_value: "TE60 V100R001C01",
                                       },
                                       {
                                          version_value: "V100R001C10",
                                       },
                                       {
                                          version_value: "V500R002C00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                       {
                                          version_value: "TP3106 V100R002C00",
                                       },
                                       {
                                          version_value: "TP3206 V100R002C00",
                                       },
                                       {
                                          version_value: "V100R002C10",
                                       },
                                       {
                                          version_value: "USG9500 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "ViewPoint 9030 V100R011C02",
                                       },
                                       {
                                          version_value: "V100R011C03",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has an Out-of-Bounds memory access vulnerability due to insufficient verification. An authenticated local attacker can make processing crash by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Out-of-Bounds memory access",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2017-17137",
      datePublished: "2018-03-05T19:00:00Z",
      dateReserved: "2017-12-04T00:00:00",
      dateUpdated: "2024-09-17T00:42:09.045Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2017-17136
Vulnerability from cvelistv5
Published
2018-03-05 19:00
Modified
2024-09-16 16:49
Severity ?
Summary
PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a heap overflow vulnerability due to insufficient verification. An authenticated local attacker can make processing crash by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. DP300; IPS Module; NGFW Module; NIP6300; NIP6600; RP200; S12700; S1700; S2700; S5700; S6700; S7700; S9700; Secospace USG6300; Secospace USG6500; Secospace USG6600; TE30; TE40; TE50; TE60; TP3106; TP3206; USG9500; ViewPoint 9030 Version: DP300 V500R002C00
Version: IPS Module V500R001C00
Version: V500R001C30
Version: NGFW Module V500R001C00
Version: V500R002C00
Version: NIP6300 V500R001C00
Version: NIP6600 V500R001C00
Version: RP200 V500R002C00
Version: V600R006C00
Version: S12700 V200R007C00
Version: V200R007C01
Version: V200R008C00
Version: V200R009C00
Version: V200R010C00
Version: S1700 V200R006C10
Version: S2700 V200R006C10
Version: V200R007C00
Version: S5700 V200R006C00
Version: S6700 V200R008C00
Version: S7700 V200R007C00
Version: S9700 V200R007C00
Version: Secospace USG6300 V500R001C00
Version: Secospace USG6500 V500R001C00
Version: Secospace USG6600 V500R001C00
Version: V500R001C30S
Version: TE30 V100R001C02
Version: V100R001C10
Version: TE40 V500R002C00
Version: TE50 V500R002C00
Version: TE60 V100R001C01
Version: TP3106 V100R002C00
Version: TP3206 V100R002C00
Version: V100R002C10
Version: USG9500 V500R001C00
Version: ViewPoint 9030 V100R011C02
Version: V100R011C03
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T20:43:59.931Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "DP300; IPS Module; NGFW Module; NIP6300; NIP6600; RP200; S12700; S1700; S2700; S5700; S6700; S7700; S9700; Secospace USG6300; Secospace USG6500; Secospace USG6600; TE30; TE40; TE50; TE60; TP3106; TP3206; USG9500; ViewPoint 9030",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "DP300 V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "IPS Module V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "NGFW Module V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "NIP6300 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "NIP6600 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "RP200 V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "V600R006C00",
                  },
                  {
                     status: "affected",
                     version: "S12700 V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R007C01",
                  },
                  {
                     status: "affected",
                     version: "V200R008C00",
                  },
                  {
                     status: "affected",
                     version: "V200R009C00",
                  },
                  {
                     status: "affected",
                     version: "V200R010C00",
                  },
                  {
                     status: "affected",
                     version: "S1700 V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "S2700 V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "S5700 V200R006C00",
                  },
                  {
                     status: "affected",
                     version: "S6700 V200R008C00",
                  },
                  {
                     status: "affected",
                     version: "S7700 V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "S9700 V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "Secospace USG6300 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "Secospace USG6500 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "Secospace USG6600 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30S",
                  },
                  {
                     status: "affected",
                     version: "TE30 V100R001C02",
                  },
                  {
                     status: "affected",
                     version: "V100R001C10",
                  },
                  {
                     status: "affected",
                     version: "TE40 V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "TE50 V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "TE60 V100R001C01",
                  },
                  {
                     status: "affected",
                     version: "TP3106 V100R002C00",
                  },
                  {
                     status: "affected",
                     version: "TP3206 V100R002C00",
                  },
                  {
                     status: "affected",
                     version: "V100R002C10",
                  },
                  {
                     status: "affected",
                     version: "USG9500 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "ViewPoint 9030 V100R011C02",
                  },
                  {
                     status: "affected",
                     version: "V100R011C03",
                  },
               ],
            },
         ],
         datePublic: "2017-12-06T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a heap overflow vulnerability due to insufficient verification. An authenticated local attacker can make processing crash by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "heap overflow",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-03-05T18:57:02",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               DATE_PUBLIC: "2017-12-06T00:00:00",
               ID: "CVE-2017-17136",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "DP300; IPS Module; NGFW Module; NIP6300; NIP6600; RP200; S12700; S1700; S2700; S5700; S6700; S7700; S9700; Secospace USG6300; Secospace USG6500; Secospace USG6600; TE30; TE40; TE50; TE60; TP3106; TP3206; USG9500; ViewPoint 9030",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "DP300 V500R002C00",
                                       },
                                       {
                                          version_value: "IPS Module V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "NGFW Module V500R001C00",
                                       },
                                       {
                                          version_value: "V500R002C00",
                                       },
                                       {
                                          version_value: "NIP6300 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "NIP6600 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "RP200 V500R002C00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                       {
                                          version_value: "S12700 V200R007C00",
                                       },
                                       {
                                          version_value: "V200R007C01",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S1700 V200R006C10",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S2700 V200R006C10",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S5700 V200R006C00",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S6700 V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S7700 V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S9700 V200R007C00",
                                       },
                                       {
                                          version_value: "V200R007C01",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "Secospace USG6300 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "Secospace USG6500 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "Secospace USG6600 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30S",
                                       },
                                       {
                                          version_value: "TE30 V100R001C02",
                                       },
                                       {
                                          version_value: "V100R001C10",
                                       },
                                       {
                                          version_value: "V500R002C00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                       {
                                          version_value: "TE40 V500R002C00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                       {
                                          version_value: "TE50 V500R002C00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                       {
                                          version_value: "TE60 V100R001C01",
                                       },
                                       {
                                          version_value: "V100R001C10",
                                       },
                                       {
                                          version_value: "V500R002C00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                       {
                                          version_value: "TP3106 V100R002C00",
                                       },
                                       {
                                          version_value: "TP3206 V100R002C00",
                                       },
                                       {
                                          version_value: "V100R002C10",
                                       },
                                       {
                                          version_value: "USG9500 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "ViewPoint 9030 V100R011C02",
                                       },
                                       {
                                          version_value: "V100R011C03",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a heap overflow vulnerability due to insufficient verification. An authenticated local attacker can make processing crash by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "heap overflow",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2017-17136",
      datePublished: "2018-03-05T19:00:00Z",
      dateReserved: "2017-12-04T00:00:00",
      dateUpdated: "2024-09-16T16:49:17.056Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2017-17138
Vulnerability from cvelistv5
Published
2018-03-05 19:00
Modified
2024-09-17 03:44
Severity ?
Summary
PEM module of DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a DoS vulnerability in PEM module of Huawei products due to insufficient verification. An authenticated local attacker can make processing into deadloop by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. DP300; IPS Module; NGFW Module; NIP6300; NIP6600; RP200; S12700; S1700; S2700; S5700; S6700; S7700; S9700; Secospace USG6300; Secospace USG6500; Secospace USG6600; TE30; TE40; TE50; TE60; TP3106; TP3206; USG9500; ViewPoint 9030 Version: DP300 V500R002C00
Version: IPS Module V500R001C00
Version: V500R001C30
Version: NGFW Module V500R001C00
Version: V500R002C00
Version: NIP6300 V500R001C00
Version: NIP6600 V500R001C00
Version: RP200 V500R002C00
Version: V600R006C00
Version: S12700 V200R007C00
Version: V200R007C01
Version: V200R008C00
Version: V200R009C00
Version: V200R010C00
Version: S1700 V200R006C10
Version: S2700 V200R006C10
Version: V200R007C00
Version: S5700 V200R006C00
Version: S6700 V200R008C00
Version: S7700 V200R007C00
Version: S9700 V200R007C00
Version: Secospace USG6300 V500R001C00
Version: Secospace USG6500 V500R001C00
Version: Secospace USG6600 V500R001C00
Version: V500R001C30S
Version: TE30 V100R001C02
Version: V100R001C10
Version: TE40 V500R002C00
Version: TE50 V500R002C00
Version: TE60 V100R001C01
Version: TP3106 V100R002C00
Version: TP3206 V100R002C00
Version: V100R002C10
Version: USG9500 V500R001C00
Version: ViewPoint 9030 V100R011C02
Version: V100R011C03
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T20:43:59.830Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "DP300; IPS Module; NGFW Module; NIP6300; NIP6600; RP200; S12700; S1700; S2700; S5700; S6700; S7700; S9700; Secospace USG6300; Secospace USG6500; Secospace USG6600; TE30; TE40; TE50; TE60; TP3106; TP3206; USG9500; ViewPoint 9030",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "DP300 V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "IPS Module V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "NGFW Module V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "NIP6300 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "NIP6600 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "RP200 V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "V600R006C00",
                  },
                  {
                     status: "affected",
                     version: "S12700 V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R007C01",
                  },
                  {
                     status: "affected",
                     version: "V200R008C00",
                  },
                  {
                     status: "affected",
                     version: "V200R009C00",
                  },
                  {
                     status: "affected",
                     version: "V200R010C00",
                  },
                  {
                     status: "affected",
                     version: "S1700 V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "S2700 V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "S5700 V200R006C00",
                  },
                  {
                     status: "affected",
                     version: "S6700 V200R008C00",
                  },
                  {
                     status: "affected",
                     version: "S7700 V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "S9700 V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "Secospace USG6300 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "Secospace USG6500 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "Secospace USG6600 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30S",
                  },
                  {
                     status: "affected",
                     version: "TE30 V100R001C02",
                  },
                  {
                     status: "affected",
                     version: "V100R001C10",
                  },
                  {
                     status: "affected",
                     version: "TE40 V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "TE50 V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "TE60 V100R001C01",
                  },
                  {
                     status: "affected",
                     version: "TP3106 V100R002C00",
                  },
                  {
                     status: "affected",
                     version: "TP3206 V100R002C00",
                  },
                  {
                     status: "affected",
                     version: "V100R002C10",
                  },
                  {
                     status: "affected",
                     version: "USG9500 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "ViewPoint 9030 V100R011C02",
                  },
                  {
                     status: "affected",
                     version: "V100R011C03",
                  },
               ],
            },
         ],
         datePublic: "2017-12-06T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "PEM module of DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a DoS vulnerability in PEM module of Huawei products due to insufficient verification. An authenticated local attacker can make processing into deadloop by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "DoS",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-03-05T18:57:02",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               DATE_PUBLIC: "2017-12-06T00:00:00",
               ID: "CVE-2017-17138",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "DP300; IPS Module; NGFW Module; NIP6300; NIP6600; RP200; S12700; S1700; S2700; S5700; S6700; S7700; S9700; Secospace USG6300; Secospace USG6500; Secospace USG6600; TE30; TE40; TE50; TE60; TP3106; TP3206; USG9500; ViewPoint 9030",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "DP300 V500R002C00",
                                       },
                                       {
                                          version_value: "IPS Module V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "NGFW Module V500R001C00",
                                       },
                                       {
                                          version_value: "V500R002C00",
                                       },
                                       {
                                          version_value: "NIP6300 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "NIP6600 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "RP200 V500R002C00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                       {
                                          version_value: "S12700 V200R007C00",
                                       },
                                       {
                                          version_value: "V200R007C01",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S1700 V200R006C10",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S2700 V200R006C10",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S5700 V200R006C00",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S6700 V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S7700 V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S9700 V200R007C00",
                                       },
                                       {
                                          version_value: "V200R007C01",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "Secospace USG6300 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "Secospace USG6500 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "Secospace USG6600 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30S",
                                       },
                                       {
                                          version_value: "TE30 V100R001C02",
                                       },
                                       {
                                          version_value: "V100R001C10",
                                       },
                                       {
                                          version_value: "V500R002C00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                       {
                                          version_value: "TE40 V500R002C00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                       {
                                          version_value: "TE50 V500R002C00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                       {
                                          version_value: "TE60 V100R001C01",
                                       },
                                       {
                                          version_value: "V100R001C10",
                                       },
                                       {
                                          version_value: "V500R002C00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                       {
                                          version_value: "TP3106 V100R002C00",
                                       },
                                       {
                                          version_value: "TP3206 V100R002C00",
                                       },
                                       {
                                          version_value: "V100R002C10",
                                       },
                                       {
                                          version_value: "USG9500 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "ViewPoint 9030 V100R011C02",
                                       },
                                       {
                                          version_value: "V100R011C03",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "PEM module of DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a DoS vulnerability in PEM module of Huawei products due to insufficient verification. An authenticated local attacker can make processing into deadloop by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "DoS",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2017-17138",
      datePublished: "2018-03-05T19:00:00Z",
      dateReserved: "2017-12-04T00:00:00",
      dateUpdated: "2024-09-17T03:44:03.746Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

Vulnerability from fkie_nvd
Published
2021-01-13 23:15
Modified
2024-11-21 05:11
Summary
There is an out-of-bounds read vulnerability in several products. The software reads data past the end of the intended buffer when parsing certain crafted DHCP messages. Successful exploit could cause certain service abnormal. Affected product versions include:NIP6800 versions V500R001C30,V500R001C60SPC500,V500R005C00;S12700 versions V200R008C00;S2700 versions V200R008C00;S5700 versions V200R008C00;S6700 versions V200R008C00;S7700 versions V200R008C00;S9700 versions V200R008C00;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00;USG9500 versions V500R001C30SPC300,V500R001C30SPC600,V500R001C60SPC500,V500R005C00.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B3D681F-E141-4BB1-9437-8BFE286CB164",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "C38F1E7A-0347-4E45-A0B6-CB8CE0D8A07E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6FCA659-5DF8-44EA-91B6-A80FBB68322A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD4C5CC9-FD60-4C64-8F88-CFC71BBEA663",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB8FC67E-DFD3-482E-B7D6-17464885B8DC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD2CD071-58E4-4061-8217-990453213470",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "21FFF548-FBEF-468A-A8DE-1DB1B7C0B3AF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DA5CF67-A58B-4666-B87E-712507233453",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D79CD09-3414-4105-AD59-F3D1BAC61B7E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "36AB80F7-1BD2-4169-AC70-708CE84BB15C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "B80E521E-1BFB-405E-9F8E-4A0734731FD0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "5226BD96-2B00-469B-AADD-CD0541610BBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "391BFC6B-9AE6-49D7-855A-CB94AD1EE5C1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C986370-A4E1-4EA0-BA3E-122F4D16D3F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E2CDEF7-F8C8-482E-B43D-DB3F0CE010F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E961C6AA-400A-41CF-A230-FE7182875F1F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "There is an out-of-bounds read vulnerability in several products. The software reads data past the end of the intended buffer when parsing certain crafted DHCP messages. Successful exploit could cause certain service abnormal. Affected product versions include:NIP6800 versions V500R001C30,V500R001C60SPC500,V500R005C00;S12700 versions V200R008C00;S2700 versions V200R008C00;S5700 versions V200R008C00;S6700 versions V200R008C00;S7700 versions V200R008C00;S9700 versions V200R008C00;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00;USG9500 versions V500R001C30SPC300,V500R001C30SPC600,V500R001C60SPC500,V500R005C00.",
      },
      {
         lang: "es",
         value: "Se presenta una vulnerabilidad de lectura fuera de límites en varios productos.&#xa0;El software lee los datos más allá del final del búfer previsto cuando se analizan determinados mensajes DHCP diseñados.&#xa0;Una explotación con éxito podría causar un servicio anormal.&#xa0;versiones afectadas de productos incluyen: NIP6800 versiones V500R001C30, V500R001C30,V500R001C60; SPC500 versiones V500R005C00; S12700 versiones V200R008C00; S2700 versiones V200R008C00; S5700 versiones V200R008C00; S6700 versiones V200R008C00; S7700 versiones V200R008C00; S9700 versiones V200R008C00; Secospace USG6600 versiones V500R001C30; SPC200 versiones V500R001C30; SPC600 versiones V500R001C60; SPC500 versiones V500R005C00; USG9500 versiones V500R001C30; SPC200 versiones V500R001C30; SPC600 versiones V500R001C60; SPC500 versiones V500R005C00; USG9500 versiones V500R001C30; SPC300 versiones V500R001C30; SPC600 versiones V500R001C60 y SPC500 versiones V500R005C00",
      },
   ],
   id: "CVE-2020-1866",
   lastModified: "2024-11-21T05:11:30.670",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "ADJACENT_NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 3.3,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:A/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 6.5,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "ADJACENT_NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-01-13T23:15:13.367",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-09-eudemon-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-09-eudemon-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-03-05 19:29
Modified
2024-11-21 03:17
Summary
PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has an Out-of-Bounds memory access vulnerability due to insufficient verification. An authenticated local attacker can make processing crash by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service.
Impacted products
Vendor Product Version
huawei dp300_firmware v500r002c00
huawei dp300 -
huawei ips_module_firmware v500r001c00
huawei ips_module_firmware v500r001c30
huawei ips_module -
huawei ngfw_module_firmware v500r001c00
huawei ngfw_module_firmware v500r002c00
huawei ngfw_module -
huawei nip6300_firmware v500r001c00
huawei nip6300_firmware v500r001c30
huawei nip6300 -
huawei nip6600_firmware v500r001c00
huawei nip6600_firmware v500r001c30
huawei nip6600 -
huawei rp200_firmware v500r002c00
huawei rp200_firmware v600r006c00
huawei rp200 -
huawei s12700_firmware v200r007c00
huawei s12700_firmware v200r007c01
huawei s12700_firmware v200r008c00
huawei s12700_firmware v200r009c00
huawei s12700_firmware v200r010c00
huawei s12700 -
huawei s1700_firmware v200r006c10
huawei s1700_firmware v200r009c00
huawei s1700_firmware v200r010c00
huawei s1700 -
huawei s2700_firmware v200r006c10
huawei s2700_firmware v200r007c00
huawei s2700_firmware v200r008c00
huawei s2700_firmware v200r009c00
huawei s2700_firmware v200r010c00
huawei s2700 -
huawei s5700_firmware v200r006c00
huawei s5700_firmware v200r007c00
huawei s5700_firmware v200r008c00
huawei s5700_firmware v200r009c00
huawei s5700_firmware v200r010c00
huawei s5700 -
huawei s6700_firmware v200r008c00
huawei s6700_firmware v200r009c00
huawei s6700_firmware v200r010c00
huawei s6700 -
huawei s7700_firmware v200r007c00
huawei s7700_firmware v200r008c00
huawei s7700_firmware v200r009c00
huawei s7700_firmware v200r010c00
huawei s7700 -
huawei s9700_firmware v200r007c00
huawei s9700_firmware v200r007c01
huawei s9700_firmware v200r008c00
huawei s9700_firmware v200r009c00
huawei s9700_firmware v200r010c00
huawei s9700 -
huawei secospace_usg6300_firmware v500r001c00
huawei secospace_usg6300_firmware v500r001c30
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v500r001c00
huawei secospace_usg6500_firmware v500r001c30
huawei secospace_usg6500 -
huawei secospace_usg6600_firmware v500r001c00
huawei secospace_usg6600_firmware v500r001c30s
huawei secospace_usg6600 -
huawei te30_firmware v100r001c02
huawei te30_firmware v100r001c10
huawei te30_firmware v500r002c00
huawei te30_firmware v600r006c00
huawei te30 -
huawei te40_firmware v500r002c00
huawei te40_firmware v600r006c00
huawei te40 -
huawei te50_firmware v500r002c00
huawei te50_firmware v600r006c00
huawei te50 -
huawei te60_firmware v100r001c02
huawei te60_firmware v100r001c10
huawei te60_firmware v500r002c00
huawei te60_firmware v600r006c00
huawei te60 -
huawei tp3106_firmware v100r002c00
huawei tp3106 -
huawei tp3206_firmware v100r002c00
huawei tp3206_firmware v100r002c10
huawei tp3206 -
huawei usg9500_firmware v500r001c00
huawei usg9500_firmware v500r001c30
huawei usg9500 -
huawei viewpoint_9030_firmware v100r011c02
huawei viewpoint_9030_firmware v100r011c03
huawei viewpoint_9030 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "16C1ED34-BC94-4AAC-ADF4-5FCD637E5B4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "67731A77-1DD4-49B2-B437-2850C9583750",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "98275088-2FBE-42F4-AAEC-DF02950B803D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "10CBC93B-5CF6-45BF-A90A-84B7693E27FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC4803A7-44B2-41BA-814D-151239B92CEF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD4C5CC9-FD60-4C64-8F88-CFC71BBEA663",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B17A34EF-677D-4264-82FB-F7F582C9F56B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "933755CC-4A0B-42FB-9491-3C841059851D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "410E8DAA-E961-46E1-96E2-3AC4B40D8359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F91DC34F-C000-4E51-A70E-38610D31AE53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "099E36B0-125F-4B3F-8D4A-01F8882CF53B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22FE26B5-C6D6-4A6C-8526-ED94F4F57C2C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC1D26AA-09DF-49DA-930F-A2EAEA486361",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E364889D-CDEE-4D8C-82E5-6D5BC3DD768A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB8FC67E-DFD3-482E-B7D6-17464885B8DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6F69BC3-E6C0-4E70-AC13-D79D840579DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5561195B-7385-4175-9D29-77E95E4E9AB6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD2CD071-58E4-4061-8217-990453213470",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5973A534-F961-4A97-B20E-994BA28AFE29",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "40745A01-E5AC-4207-A34F-D8E7F7231F83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "21FFF548-FBEF-468A-A8DE-1DB1B7C0B3AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "48B5A9B7-A931-4806-8AC7-302C6CA49CF1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA744621-893C-4F7E-80A1-66559BC6D6F4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DA5CF67-A58B-4666-B87E-712507233453",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9EA93B5-01A5-4506-9B0A-993621E6940E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "91E52545-B12E-43EC-B132-28FA2E511316",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "2377CD30-6F57-46CB-9DD1-E29458A7D928",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D79CD09-3414-4105-AD59-F3D1BAC61B7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB2A3C92-C5C6-4BE6-A9F6-21C28D68C080",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "37E3F87E-EA36-41ED-8793-F6C166FFC4A7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D78DAB13-32AA-4813-AB0A-0EA870F41183",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "38515A04-EC21-40B3-A29C-8D0A5883EA4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "36AB80F7-1BD2-4169-AC70-708CE84BB15C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "01A0EC8F-6A8A-487F-A92A-789E3789788F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C6DC309-2FC6-4014-9C2B-8EE12C7BB08F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30s:*:*:*:*:*:*:*",
                     matchCriteriaId: "18553F87-9928-4AE8-87D5-EB8014999E62",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "60DB85A7-54F1-4726-9D9C-07CC35621C19",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "492DABB3-66CF-47E9-92D4-518154559A7C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8C4071A-502F-46E4-80FF-C6647161A178",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has an Out-of-Bounds memory access vulnerability due to insufficient verification. An authenticated local attacker can make processing crash by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service.",
      },
      {
         lang: "es",
         value: "El módulo PEM de Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 tiene una vulnerabilidad de acceso a la memoria fuera de límites debido a la verificación insuficiente. Un atacante local autenticado puede provocar que el proceso se cierre inesperadamente mediante certificados maliciosos. El atacante puede explotar esta vulnerabilidad para provocar una denegación de servicio.",
      },
   ],
   id: "CVE-2017-17137",
   lastModified: "2024-11-21T03:17:33.527",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 2.1,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-03-05T19:29:00.533",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2017-09-25 21:29
Modified
2024-11-21 02:37
Summary
Huawei S7700, S9700, S9300 before V200R07C00SPC500, and AR200, AR1200, AR2200, AR3200 before V200R005C20SPC200 allows attackers with physical access to the CF card to obtain sensitive information.
Impacted products
Vendor Product Version
huawei s9300_firmware v200r001c00spc300
huawei s9300_firmware v200r002c00spc100
huawei s9300_firmware v200r003c00spc500
huawei s9300_firmware v200r005c00spc300
huawei s9300_firmware v200r006c00spc300
huawei s9300_firmware v200r006c00spc500
huawei s9300 -
huawei s9700_firmware v200r001c00spc300
huawei s9700_firmware v200r002c00spc100
huawei s9700_firmware v200r003c00spc500
huawei s9700_firmware v200r005c00spc300
huawei s9700_firmware v200r006c00spc300
huawei s9700_firmware v200r006c00spc500
huawei s9700 -
huawei s7700_firmware v200r001c00spc300
huawei s7700_firmware v200r002c00spc100
huawei s7700_firmware v200r003c00spc500
huawei s7700_firmware v200r005c00spc300
huawei s7700_firmware v200r006c00spc300
huawei s7700_firmware v200r006c00spc500
huawei s7700 -
huawei ar200_firmware v200r003c00spc100
huawei ar200_firmware v200r003c00spc200
huawei ar200_firmware v200r003c01spc100
huawei ar200_firmware v200r003c01spc200
huawei ar200_firmware v200r003c01spc300
huawei ar200_firmware v200r003c01spc500
huawei ar200_firmware v200r003c01spc600
huawei ar200_firmware v200r003c01spc800
huawei ar200_firmware v200r003c01spc900
huawei ar200 -
huawei ar1200_firmware v200r003c00spc100
huawei ar1200_firmware v200r003c00spc200
huawei ar1200_firmware v200r003c01spc100
huawei ar1200_firmware v200r003c01spc200
huawei ar1200_firmware v200r003c01spc300
huawei ar1200_firmware v200r003c01spc500
huawei ar1200_firmware v200r003c01spc600
huawei ar1200_firmware v200r003c01spc800
huawei ar1200_firmware v200r003c01spc900
huawei ar1200 -
huawei ar2200_firmware v200r003c00spc100
huawei ar2200_firmware v200r003c00spc200
huawei ar2200_firmware v200r003c01spc100
huawei ar2200_firmware v200r003c01spc200
huawei ar2200_firmware v200r003c01spc300
huawei ar2200_firmware v200r003c01spc500
huawei ar2200_firmware v200r003c01spc600
huawei ar2200_firmware v200r003c01spc800
huawei ar2200_firmware v200r003c01spc900
huawei ar2200 -
huawei ar3200_firmware v200r003c00spc100
huawei ar3200_firmware v200r003c00spc200
huawei ar3200_firmware v200r003c01spc100
huawei ar3200_firmware v200r003c01spc200
huawei ar3200_firmware v200r003c01spc300
huawei ar3200_firmware v200r003c01spc500
huawei ar3200_firmware v200r003c01spc600
huawei ar3200_firmware v200r003c01spc800
huawei ar3200_firmware v200r003c01spc900
huawei ar3200 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D1EF10E-F18B-4F3A-AA2B-25003183E19D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "72842130-3B3A-4FD8-8143-556F4048B456",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "78DA2DC7-63B3-40D7-BEC7-AF81066A2733",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "A066F4B8-2258-4ED2-A166-02FCA7C9F3A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r006c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "0EF7F999-B0B7-4804-B6E5-016013EFE198",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDA38762-CACE-403B-8DE5-42E0306FEB28",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4EE71EF-90D8-40C6-9E80-A543ED32E976",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5C9C9CF-A5E1-4461-8B1E-1C572BB3D59A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBDBE325-B6F4-475F-B7F8-F3142F730039",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "CAB593E5-D919-436C-A10A-6FA72B69EA55",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r006c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA350FCA-CDF6-4CA4-BBBA-39C0A8D734DD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "464C5DF2-E6D7-4679-A375-521FD730CA14",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "07A44DEA-AB17-48F4-87C1-B3B6088BCD82",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "EEBEE7C8-0AB6-4BCE-A2C1-6A4CB4BF68AB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D0B5718-9465-476F-B2FA-FFC6FB08E354",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "13FB139B-C0C2-4BB5-BA60-E1B32030F9E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r006c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "37D36BFD-8333-4F46-8854-87688A62753D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC191A39-26C6-4503-9152-A29A2EAAC6BF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C6C7146-3416-43C8-A5B8-ED6C4FF80219",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "F1F36AFE-F13C-4954-87F4-7D1288D06F60",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "222BEEB0-E420-453C-B73C-D53A9CD13683",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r003c01spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "E810E810-C1C2-412A-8CF0-A01A0B5F40E8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE2BAF03-8BF9-442D-8776-458755F102C5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r003c01spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D657224-1BDC-4D53-A73F-039CBADE7ED6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r003c01spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "773055C8-42C4-4719-93B8-DCCC55657567",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r003c01spc800:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B5591DB-D27B-4655-B457-DB537368C680",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6B91A0-35C2-4012-8386-13F4E196904E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA9F9579-29D2-4C49-92B3-F8A3B6874E6A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "0EF569A6-82D6-4B5B-8CC8-02A285AD4D32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FBFFA36-EE4D-4DB6-85BC-F74103A2E2A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r003c01spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "7058215A-04AE-4B0B-96DC-FC13A7331152",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE93B2B8-FCEA-4831-8E17-FC10131A2369",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r003c01spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "98F74FF3-04D5-49D0-9420-AE5C894031E9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r003c01spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5C3E585-66F4-4554-90E5-3364490823A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r003c01spc800:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB8CEF7D-EE87-4446-9A57-877F7CD788FC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0E81740-CD29-427B-8B4D-D7BC70102E4D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4BA4150-8CA8-48BF-9D45-ABC8AC710060",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "F254A80C-6A4E-4A5F-BEEF-F12AC43E8128",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "22A2F833-98BB-40E9-A5A9-B3B92F0C01E8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0D079CA-9349-4F80-92DC-E350EBC27A9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r003c01spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "34E252FD-E716-4D62-B8E3-1B726D462E1B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A5CD805-B40D-48E5-865A-21BB22627A1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r003c01spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BFC38D4-3B4A-40B9-92C3-E89CCADA88D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r003c01spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "4EA350D8-645E-4758-88B1-D0DBA339EB29",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r003c01spc800:*:*:*:*:*:*:*",
                     matchCriteriaId: "9769D24F-C6EA-46D3-80E2-9ED9EDA06FE3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "F17BB5B4-077D-4F8E-A3F9-802817E128D7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "50662078-4827-4706-AE29-170E2239C5AE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE35DC1B-6F04-4796-850E-EB7311344DBC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "7279FD32-01DE-4CD0-BEA1-622D40F1240D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAC9B725-8D20-476F-B49E-A0E3A82881B7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r003c01spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "451B285C-F05D-421F-ABA7-64A90EF46D45",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A08EEE2-52B6-4023-875D-C4D45598B04C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r003c01spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "70B40F9E-503D-4FC3-96AE-D39DC6CED1FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r003c01spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "F3E1FBAE-C0EF-4620-A4F8-F4979E2AB9D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r003c01spc800:*:*:*:*:*:*:*",
                     matchCriteriaId: "96090658-E99B-472A-B9B4-CE3D56E6E9F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F005EFD-7F00-4A25-804D-BE2E7C88C237",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei S7700, S9700, S9300 before V200R07C00SPC500, and AR200, AR1200, AR2200, AR3200 before V200R005C20SPC200 allows attackers with physical access to the CF card to obtain sensitive information.",
      },
      {
         lang: "es",
         value: "Huawei S7700, S9700, S9300 en versiones anteriores a la V200R07C00SPC500 y AR200, AR1200, AR2200, AR3200 en versiones anteriores a la V200R005C20SPC200 permite que los atacantes con acceso físico a la tarjeta CF obtengan información sensible.",
      },
   ],
   id: "CVE-2015-7846",
   lastModified: "2024-11-21T02:37:31.203",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "PHYSICAL",
               availabilityImpact: "NONE",
               baseScore: 4.6,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.0",
            },
            exploitabilityScore: 0.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2017-09-25T21:29:00.867",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/76173",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-446634.htm",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/76173",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-446634.htm",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-200",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2017-04-02 20:59
Modified
2024-11-21 03:00
Summary
Huawei AR3200 with software V200R007C00, V200R005C32, V200R005C20; S12700 with software V200R008C00, V200R007C00; S5300 with software V200R008C00, V200R007C00, V200R006C00; S5700 with software V200R008C00, V200R007C00, V200R006C00; S6300 with software V200R008C00, V200R007C00; S6700 with software V200R008C00, V200R007C00; S7700 with software V200R008C00, V200R007C00, V200R006C00; S9300 with software V200R008C00, V200R007C00, V200R006C00; and S9700 with software V200R008C00, V200R007C00, V200R006C00 allow remote attackers to send abnormal Multiprotocol Label Switching (MPLS) packets to cause memory exhaustion.
Impacted products
Vendor Product Version
huawei ar3200_firmware v200r005c20
huawei ar3200_firmware v200r005c32
huawei ar3200_firmware v200r007c00
huawei ar3200 -
huawei s12700_firmware v200r007c00
huawei s12700_firmware v200r008c00
huawei s12700 -
huawei s5300_firmware v200r006c00
huawei s5300_firmware v200r007c00
huawei s5300_firmware v200r008c00
huawei s5300 -
huawei s5700_firmware v200r006c00
huawei s5700_firmware v200r007c00
huawei s5700_firmware v200r008c00
huawei s5700 -
huawei s6300_firmware v200r007c00
huawei s6300_firmware v200r008c00
huawei s6300 -
huawei s6700_firmware v200r007c00
huawei s6700_firmware v200r008c00
huawei s6700 -
huawei s7700_firmware v200r006c00
huawei s7700_firmware v200r007c00
huawei s7700_firmware v200r008c00
huawei s7700 -
huawei s9300_firmware v200r006c00
huawei s9300_firmware v200r007c00
huawei s9300_firmware v200r008c00
huawei s9300 -
huawei s9700_firmware v200r006c00
huawei s9700_firmware v200r007c00
huawei s9700_firmware v200r008c00
huawei s9700 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r005c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C10C07E-5194-4EAB-9AC8-DB87CE52F5FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r005c32:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FE26EE9-2331-4D72-96CF-635A0A4EBE3E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9752658E-3CF5-4D9E-98FB-D15FD892479C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "10CBC93B-5CF6-45BF-A90A-84B7693E27FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD4C5CC9-FD60-4C64-8F88-CFC71BBEA663",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "58C2E728-E8F2-461D-A069-4BEC88B94FD0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD6B13D4-07F3-4CB5-8194-89781E685A78",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5454BC21-A04F-4B3D-8533-2414B6E1BC8C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CFEF08E-54C5-4D60-AFF0-37B00D6E2DDD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5973A534-F961-4A97-B20E-994BA28AFE29",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "40745A01-E5AC-4207-A34F-D8E7F7231F83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "21FFF548-FBEF-468A-A8DE-1DB1B7C0B3AF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5811970-FE82-4888-A01D-B356B5578296",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "939C73D9-E0E9-47A5-970E-6C84F5ECD2D7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA3C8988-A1FC-4B04-9134-F2BDDADEAFB5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF4AF711-D921-4261-A459-2A0780EA951F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DA5CF67-A58B-4666-B87E-712507233453",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF3FB3CC-2EAC-4A08-BDDC-DCACEE9FA2AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "2377CD30-6F57-46CB-9DD1-E29458A7D928",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D79CD09-3414-4105-AD59-F3D1BAC61B7E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC8AE44D-1924-4C01-B4B9-CC5BF485A3EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "886E9D1F-25FA-41FA-A64B-E42B9910D2B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E7DB9D3-BB34-49BE-8302-A054D79FE8D6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AC7E622-010C-4C5D-8AA6-D4793AFCE0E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D78DAB13-32AA-4813-AB0A-0EA870F41183",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "36AB80F7-1BD2-4169-AC70-708CE84BB15C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei AR3200 with software V200R007C00, V200R005C32, V200R005C20; S12700 with software V200R008C00, V200R007C00; S5300 with software V200R008C00, V200R007C00, V200R006C00; S5700 with software V200R008C00, V200R007C00, V200R006C00; S6300 with software V200R008C00, V200R007C00; S6700 with software V200R008C00, V200R007C00; S7700 with software V200R008C00, V200R007C00, V200R006C00; S9300 with software V200R008C00, V200R007C00, V200R006C00; and S9700 with software V200R008C00, V200R007C00, V200R006C00 allow remote attackers to send abnormal Multiprotocol Label Switching (MPLS) packets to cause memory exhaustion.",
      },
      {
         lang: "es",
         value: "Huawei AR3200 con software V200R007C00, V200R005C32, V200R005C20; S12700 con software V200R008C00, V200R007C00; S5300 con software V200R008C00, V200R007C00, V200R006C00; S5700 con software V200R008C00, V200R007C00, V200R006C00; S6300 con software V200R008C00, V200R007C00; S6700 con software V200R008C00, V200R007C00; S7700 con software V200R008C00, V200R007C00, V200R006C00; S9300 con software V200R008C00, V200R007C00, V200R006C00; y S9700 con software V200R008C00, V200R007C00, V200R006C00 permiten a atacantes remotos enviar paquetes Multiprotocol Label Switching (MPLS) anormales para provocar un agotamiento de la memoria.",
      },
   ],
   id: "CVE-2016-8797",
   lastModified: "2024-11-21T03:00:06.303",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2017-04-02T20:59:01.860",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160608-01-mpls-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160608-01-mpls-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-399",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2016-09-07 19:28
Modified
2024-11-21 02:56
Summary
Huawei S7700, S9300, S9700, and S12700 devices with software before V200R008C00SPC500 use random numbers with insufficient entropy to generate self-signed certificates, which makes it easier for remote attackers to discover private keys by leveraging knowledge of a certificate.
Impacted products
Vendor Product Version
huawei_firmware s12700 v200r005c00
huawei s12700 -
huawei s9700_firmware v200r003c00
huawei s9700_firmware v200r005c00
huawei s9700 -
huawei s7700_firmware v200r003c00
huawei s7700_firmware v200r005c00
huawei s7700 -
huawei s9300_firmware v200r003c00
huawei s9300_firmware v200r005c00
huawei s9300 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei_firmware:s12700:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B54C737-6E7F-434C-99B8-28825515E735",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "06AD9ACA-E0C3-4096-BE50-94E717CDA318",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "325D6523-A07A-48D4-AD44-CF838BD77432",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1DFF0C0-AA17-4AA1-A418-4759D1A58852",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D84F05D5-BA7D-485B-91C2-273349335CFB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "473B6E52-E60F-4D3C-9028-E362DF2A8327",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "2632DC1D-0CB9-4493-9270-436139C88623",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei S7700, S9300, S9700, and S12700 devices with software before V200R008C00SPC500 use random numbers with insufficient entropy to generate self-signed certificates, which makes it easier for remote attackers to discover private keys by leveraging knowledge of a certificate.",
      },
      {
         lang: "es",
         value: "Dispositivos Huawei S7700, S9300, S9700 y S12700 con software en versiones anteriores a V200R008C00SPC500 utiliza números aleatorios con entropía insuficiente para generar certificados con auto-firma, lo que facilita a atacantes remotos descubrir claves privadas mediante el aprovechamiento del conocimiento un certificado.",
      },
   ],
   id: "CVE-2016-6670",
   lastModified: "2024-11-21T02:56:35.483",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2016-09-07T19:28:13.380",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160810-01-certificate-en",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/92438",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160810-01-certificate-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/92438",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-200",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-06-04 19:29
Modified
2024-11-21 04:44
Summary
Some Huawei S series switches have a DoS vulnerability. An unauthenticated remote attacker can send crafted packets to the affected device to exploit this vulnerability. Due to insufficient verification of the packets, successful exploitation may cause the device reboot and denial of service (DoS) condition. (Vulnerability ID: HWPSIRT-2019-03109)
Impacted products
Vendor Product Version
huawei s12700_firmware v200r005c00
huawei s12700_firmware v200r006c00
huawei s12700_firmware v200r007c00
huawei s12700_firmware v200r008c00
huawei s12700_firmware v200r010c00
huawei s12700_firmware v200r011c10
huawei s12700_firmware v200r012c00
huawei s12700_firmware v200r013c00
huawei s12700 -
huawei s1700_firmware v200r008c00
huawei s1700_firmware v200r009c00
huawei s1700_firmware v200r010c00
huawei s1700_firmware v200r011c10
huawei s1700_firmware v200r012c00
huawei s1700_firmware v200r013c00
huawei s1700 -
huawei s2300_firmware v200r003c00
huawei s2300_firmware v200r005c00
huawei s2300_firmware v200r008c00
huawei s2300_firmware v200r010c00
huawei s2300_firmware v200r011c10
huawei s2300_firmware v200r012c00
huawei s2300_firmware v200r013c00
huawei s2300 -
huawei s2700_firmware v200r005c00
huawei s2700_firmware v200r006c00
huawei s2700_firmware v200r007c00
huawei s2700_firmware v200r008c00
huawei s2700_firmware v200r010c00
huawei s2700_firmware v200r011c10
huawei s2700_firmware v200r012c00
huawei s2700_firmware v200r013c00
huawei s2700 -
huawei s5300_firmware v200r003c00
huawei s5300_firmware v200r005c00
huawei s5300_firmware v200r008c00
huawei s5300_firmware v200r010c00
huawei s5300_firmware v200r011c10
huawei s5300_firmware v200r012c00
huawei s5300_firmware v200r013c00
huawei s5300 -
huawei s5700_firmware v200r003c00
huawei s5700_firmware v200r005c00
huawei s5700_firmware v200r006c00
huawei s5700_firmware v200r007c00
huawei s5700_firmware v200r008c00
huawei s5700_firmware v200r010c00
huawei s5700_firmware v200r011c10
huawei s5700_firmware v200r012c00
huawei s5700_firmware v200r013c00
huawei s5700 -
huawei s600-e_firmware v200r008c00
huawei s600-e_firmware v200r010c00
huawei s600-e_firmware v200r011c10
huawei s600-e_firmware v200r012c00
huawei s600-e_firmware v200r013c00
huawei s600-e -
huawei s6300_firmware v200r003c00
huawei s6300_firmware v200r005c00
huawei s6300_firmware v200r007c00
huawei s6300_firmware v200r008c00
huawei s6300_firmware v200r010c00
huawei s6300_firmware v200r011c10
huawei s6300_firmware v200r012c00
huawei s6300_firmware v200r013c00
huawei s6300 -
huawei s6700_firmware v200r003c00
huawei s6700_firmware v200r005c00
huawei s6700_firmware v200r007c00
huawei s6700_firmware v200r008c00
huawei s6700_firmware v200r010c00
huawei s6700_firmware v200r011c10
huawei s6700_firmware v200r012c00
huawei s6700_firmware v200r013c00
huawei s6700 *
huawei s7700_firmware v200r003c00
huawei s7700_firmware v200r005c00
huawei s7700_firmware v200r006c00
huawei s7700_firmware v200r007c00
huawei s7700_firmware v200r008c00
huawei s7700_firmware v200r010c00
huawei s7700_firmware v200r011c10
huawei s7700_firmware v200r012c00
huawei s7700_firmware v200r013c00
huawei s7700 -
huawei s7900_firmware v200r011c10
huawei s7900_firmware v200r012c00
huawei s7900_firmware v200r013c00
huawei s7900 -
huawei s9300_firmware v200r003c00
huawei s9300_firmware v200r008c00
huawei s9300_firmware v200r008c10
huawei s9300_firmware v200r010c00
huawei s9300_firmware v200r011c10
huawei s9300_firmware v200r012c00
huawei s9300_firmware v200r013c00
huawei s9300 -
huawei s9300x_firmware v200r010c00
huawei s9300x_firmware v200r011c10
huawei s9300x_firmware v200r012c00
huawei s9300x_firmware v200r013c00
huawei s9300x -
huawei s9700_firmware v200r003c00
huawei s9700_firmware v200r005c00
huawei s9700_firmware v200r006c00
huawei s9700_firmware v200r007c00
huawei s9700_firmware v200r008c00
huawei s9700_firmware v200r010c00
huawei s9700_firmware v200r011c10
huawei s9700_firmware v200r012c00
huawei s9700_firmware v200r013c00
huawei s9700 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D81469B-EC6C-493D-B632-4DF821A1F304",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6F2C4C7-3438-42B8-8999-C17E45C8CF49",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "10CBC93B-5CF6-45BF-A90A-84B7693E27FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD4C5CC9-FD60-4C64-8F88-CFC71BBEA663",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "933755CC-4A0B-42FB-9491-3C841059851D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D6FF612-2F2B-4B75-8D97-86205DFCF0CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r012c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDC385D3-E82B-454B-A131-971F3B830EC9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r013c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "33014F41-7B1B-4294-A862-45E2669AAAB3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A3B7337-72AF-409A-9103-451622FB89AC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F91DC34F-C000-4E51-A70E-38610D31AE53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "099E36B0-125F-4B3F-8D4A-01F8882CF53B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "342E032C-BAE5-4F15-8BAE-84F9D9AA58D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r012c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC439F55-11AB-42D2-B891-C6C5D62FF5F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r013c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5EEEAA3-B534-48B7-ABBC-0E1BF3C0AC68",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22FE26B5-C6D6-4A6C-8526-ED94F4F57C2C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C6CC00C-1056-426B-9828-1A886F2C8D41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F1C82DA6-8D95-45D2-B54C-CFE1AA9CC1F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A40EFA43-E71F-464D-829C-8D4C60A57765",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1116C5A3-35F7-48A2-A68F-E299D0EA12F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD500740-A674-4B68-8AFA-26991B82AD2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v200r012c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EDD6B48-17E7-4B2D-B86D-654B059A57B8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v200r013c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6D6A2FA-2ABE-41B3-BEF3-E835D6868E1F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "17566603-275F-4E6B-B5D9-4A716EEC03DC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "AED7DFC5-846F-4F90-91A8-13E9E805C9CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "193FCE7A-C793-446B-9C39-20597FA7BC70",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E364889D-CDEE-4D8C-82E5-6D5BC3DD768A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB8FC67E-DFD3-482E-B7D6-17464885B8DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5561195B-7385-4175-9D29-77E95E4E9AB6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "20648023-4CC5-4606-BE8E-70A5C20D7BE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r012c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1449504A-662C-403C-85AF-CCB5219CE976",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r013c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC3443AF-478E-4043-9E72-5BBC0C88F13D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD2CD071-58E4-4061-8217-990453213470",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD601FFF-E623-4ADC-B286-D11B8004D7CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5EAEF900-7C8C-4569-B74B-A802F951CC47",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5454BC21-A04F-4B3D-8533-2414B6E1BC8C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E122468-50F4-4216-A8F9-04D4DCEC8BE7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "B7B0C041-0B3F-441F-B98B-522FF7039C01",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r012c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "88DD2BD9-F4FE-4438-B792-4A02E6028B99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r013c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "6279E671-644C-4EC6-A675-732BD0B389B8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CFEF08E-54C5-4D60-AFF0-37B00D6E2DDD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4907FBB8-5157-460D-9240-DD7D610C0FCC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCF23DAE-1215-41B2-88C5-4436D846266C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5973A534-F961-4A97-B20E-994BA28AFE29",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "40745A01-E5AC-4207-A34F-D8E7F7231F83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "21FFF548-FBEF-468A-A8DE-1DB1B7C0B3AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA744621-893C-4F7E-80A1-66559BC6D6F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "AFD7EF17-710B-4363-87B7-CE1B4447BF99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r012c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "17CDA635-A9E7-4678-8970-22DFC028BAF7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r013c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "71348C1D-8243-4585-B87A-AFE457700243",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s600-e_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "299234CD-AD78-4C53-8B7E-C0B22681ADB2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s600-e_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7581063D-DFFB-49CE-8099-D39C52B9AAC2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s600-e_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "B850D4D0-6444-44EE-9E1F-4A48931D7580",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s600-e_firmware:v200r012c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "EFD0C771-7387-41B8-BDEF-20028013D145",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s600-e_firmware:v200r013c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "08E7A78F-7F37-41B8-BC9A-B3CC9DFFC671",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s600-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E02D610-AB78-476B-9049-FDB66D9E9907",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C330A14-C941-4B28-AA9C-B78A96A9011D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "C6818ECD-730B-40D6-9108-B8540CC4BF1E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5811970-FE82-4888-A01D-B356B5578296",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "939C73D9-E0E9-47A5-970E-6C84F5ECD2D7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1CEE877-AF03-4A5B-84AA-8EB8067E04F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E5A9491C-AA2F-4E2F-8FB7-C6D6D653B343",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r012c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "94D35430-7723-4277-BEE5-FC002465A521",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r013c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DBC7370E-7CD1-49DC-8B1E-779E269E8CCE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA3C8988-A1FC-4B04-9134-F2BDDADEAFB5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "749B68B9-9F62-4E7A-AC86-F4073BA32E18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F18D9776-5CE7-4DD3-9119-7FB08A35B955",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF4AF711-D921-4261-A459-2A0780EA951F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DA5CF67-A58B-4666-B87E-712507233453",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "91E52545-B12E-43EC-B132-28FA2E511316",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C34E6D4-67FE-4AA4-A825-9666A302F771",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r012c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA68BF50-9118-445D-B778-E60812E67B98",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r013c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "756F699B-4EA0-4A77-8068-CB25B99893EB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5BFADB02-AD16-4B58-AFF9-B659BDB3E025",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1DFF0C0-AA17-4AA1-A418-4759D1A58852",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D84F05D5-BA7D-485B-91C2-273349335CFB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF3FB3CC-2EAC-4A08-BDDC-DCACEE9FA2AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "2377CD30-6F57-46CB-9DD1-E29458A7D928",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D79CD09-3414-4105-AD59-F3D1BAC61B7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "37E3F87E-EA36-41ED-8793-F6C166FFC4A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "26F2CC30-626B-4FEE-BDAD-6A5990DE6384",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r012c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D43F5AE6-A4CD-4C45-A8A4-D5B064FE7C27",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r013c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D48511A7-A013-4C34-8F4F-67289F3BD442",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7900_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B9B6C9C-9270-4904-895B-C60B15A1479E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7900_firmware:v200r012c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F50FCA7-107F-429E-BEC8-29A27AAEF3AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7900_firmware:v200r013c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "922C5EBF-C9BF-4363-AE3C-E30AD7060484",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7900:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EECEBC19-EE35-471D-A062-1E6B33B40A02",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "473B6E52-E60F-4D3C-9028-E362DF2A8327",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E7DB9D3-BB34-49BE-8302-A054D79FE8D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r008c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ACAD052-796D-428E-95B1-65099952B773",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "701D6571-8708-4DB3-9021-ED48C5874503",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2420E92-C734-47C7-A5DC-A057553160B2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r012c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1DE905E-5CE3-42F6-B6E1-F57DC886C3C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r013c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C42090D-C76E-48EC-BA54-BB39A489373D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9300x_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A20E2DAD-8579-49F0-AEA8-B5AF5DBD025F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300x_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1AB5D982-3C99-4FCF-B5ED-265C6CA287F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300x_firmware:v200r012c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A63DEED-6909-4E95-8F05-3EF7C268A224",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300x_firmware:v200r013c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7098404-C4B7-4657-9FFB-7298C310684C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9300x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "808C627E-4D42-459B-BBE0-6FF8FF143D80",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "06AD9ACA-E0C3-4096-BE50-94E717CDA318",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "325D6523-A07A-48D4-AD44-CF838BD77432",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AC7E622-010C-4C5D-8AA6-D4793AFCE0E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D78DAB13-32AA-4813-AB0A-0EA870F41183",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "36AB80F7-1BD2-4169-AC70-708CE84BB15C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C6DC309-2FC6-4014-9C2B-8EE12C7BB08F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B06663D-8499-42B9-83E1-E369F1FD0070",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r012c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B299A06-5D99-43A8-ACF3-4D79174C536E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r013c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "88100CA8-11C0-4D63-ADD8-C01176B6CE3F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Some Huawei S series switches have a DoS vulnerability. An unauthenticated remote attacker can send crafted packets to the affected device to exploit this vulnerability. Due to insufficient verification of the packets, successful exploitation may cause the device reboot and denial of service (DoS) condition. (Vulnerability ID: HWPSIRT-2019-03109)",
      },
      {
         lang: "es",
         value: "Algunos conmutadores de la serie S de Huawei tienen una vulnerabilidad DoS. Un atacante remoto no autorizado puede enviar paquetes diseñados al dispositivo afectado para aprovechar esta vulnerabilidad. Debido a una verificación insuficiente de los paquetes, la operación éxito puede provocar el reinicio del dispositivo y la condición de denegación de servicio (DoS). (ID de vulnerabilidad: HWPSIRT-2019-03109)",
      },
   ],
   id: "CVE-2019-5285",
   lastModified: "2024-11-21T04:44:40.310",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.8,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-06-04T19:29:00.477",
   references: [
      {
         source: "psirt@huawei.com",
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190522-01-switch-en",
      },
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190522-01-switch-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190522-01-switch-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190522-01-switch-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2017-04-02 20:59
Modified
2024-11-21 02:48
Summary
Huawei switches S5700, S6700, S7700, S9700 with software V200R001C00SPC300, V200R002C00SPC100, V200R003C00SPC300, V200R005C00SPC500, V200R006C00; S12700 with software V200R005C00SPC500, V200R006C00; ACU2 with software V200R005C00SPC500, V200R006C00 have a permission control vulnerability. If a switch enables Authentication, Authorization, and Accounting (AAA) for permission control and user permissions are not appropriate, AAA users may obtain the virtual type terminal (VTY) access permission, resulting in privilege escalation.
Impacted products
Vendor Product Version
huawei s5700_firmware v200r001c00spc300
huawei s5700_firmware v200r002c00spc100
huawei s5700_firmware v200r003c00spc300
huawei s5700_firmware v200r005c00spc500
huawei s5700_firmware v200r006c00
huawei s5700 -
huawei s6700_firmware v200r001c00spc300
huawei s6700_firmware v200r002c00spc100
huawei s6700_firmware v200r003c00spc300
huawei s6700_firmware v200r005c00spc500
huawei s6700_firmware v200r006c00
huawei s6700 -
huawei s7700_firmware v200r001c00spc300
huawei s7700_firmware v200r002c00spc100
huawei s7700_firmware v200r003c00spc300
huawei s7700_firmware v200r005c00spc500
huawei s7700_firmware v200r006c00
huawei s7700 -
huawei s9700_firmware v200r001c00spc300
huawei s9700_firmware v200r002c00spc100
huawei s9700_firmware v200r003c00spc300
huawei s9700_firmware v200r005c00spc500
huawei s9700_firmware v200r006c00
huawei s9700 -
huawei s12700_firmware v200r005c00spc500
huawei s12700_firmware v200r006c00
huawei s12700 -
huawei acu2_firmware v200r005c00spc500
huawei acu2_firmware v200r006c00
huawei acu2 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "121BEE57-945E-4368-8AE4-4A823D70D31C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBC629F6-BF42-4C2B-8CB1-2C4412C8D95A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEC329F7-D83F-4119-B8CA-CC819EC872CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r005c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B3B076D-F61E-4BE0-B808-D86EB6A83D92",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5973A534-F961-4A97-B20E-994BA28AFE29",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AF84CB7-7EC9-4978-A4F6-FD5746AF1CE9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "AFFF09EB-AA08-4204-B028-182933EC9700",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D5033F0-7E4F-431A-B4EA-E5D5D1FCFE5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r005c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "96FF5103-C97A-443A-8475-0E99A0175455",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FD4718F-473A-490E-8DFC-6A09FECDDD90",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "07A44DEA-AB17-48F4-87C1-B3B6088BCD82",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "EEBEE7C8-0AB6-4BCE-A2C1-6A4CB4BF68AB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CE013D0-4D00-46E1-9F7F-6711DCC9B8BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r005c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "741262BB-C214-482D-A7BE-A480A985258B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF3FB3CC-2EAC-4A08-BDDC-DCACEE9FA2AE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4EE71EF-90D8-40C6-9E80-A543ED32E976",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5C9C9CF-A5E1-4461-8B1E-1C572BB3D59A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "C892C736-F14F-4A3F-9645-CB74A289DA36",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r005c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "C2D737B8-3A28-4465-A394-E2D5DA8C1927",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AC7E622-010C-4C5D-8AA6-D4793AFCE0E0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r005c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "790FC933-C4E3-471A-B1C1-8E7ECD93748F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6F2C4C7-3438-42B8-8999-C17E45C8CF49",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:acu2_firmware:v200r005c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8307595-31A7-4077-89E6-B4864B22C701",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:acu2_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC1428EF-A60D-4EC8-92F2-64CAD7687D3E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:acu2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF525629-AD0D-4CDC-A979-712C841FF7C6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei switches S5700, S6700, S7700, S9700 with software V200R001C00SPC300, V200R002C00SPC100, V200R003C00SPC300, V200R005C00SPC500, V200R006C00; S12700 with software V200R005C00SPC500, V200R006C00; ACU2 with software V200R005C00SPC500, V200R006C00 have a permission control vulnerability. If a switch enables Authentication, Authorization, and Accounting (AAA) for permission control and user permissions are not appropriate, AAA users may obtain the virtual type terminal (VTY) access permission, resulting in privilege escalation.",
      },
      {
         lang: "es",
         value: "Switches Huawei S5700, S6700, S7700, S9700 con software V200R001C00SPC300, V200R002C00SPC100, V200R003C00SPC300, V200R005C00SPC500, V200R006C00; S12700 con software V200R005C00SPC500, V200R006C00; ACU2 con software V200R005C00SPC500, V200R006C00 tiene una vulnerabilidad de control de permisos. Si un switch habilita Authentication, Authorization y Accounting (AAA) para el control de permisos y los permisos de usuario no son apropiados, los usuarios AAA pueden obtener el permiso de acceso al terminal de tipo virtual (VTY), resultando en una escalada de privilegios.",
      },
   ],
   id: "CVE-2016-2404",
   lastModified: "2024-11-21T02:48:23.837",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "PARTIAL",
               baseScore: 6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:S/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 6.8,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.0",
            },
            exploitabilityScore: 1.6,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2017-04-02T20:59:00.860",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160217-01-switch-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160217-01-switch-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-264",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2016-04-14 15:59
Modified
2024-11-21 02:38
Summary
Memory leak in Huawei S5300EI, S5300SI, S5310HI, and S6300EI Campus series switches with software V200R003C00 before V200R003SPH011 and V200R005C00 before V200R005SPH008; S2350EI and S5300LI Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH008, and V200R006C00 before V200R006SPH002; S9300, S7700, and S9700 Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH009, and V200R006C00 before V200R006SPH003; S5720HI and S5720EI Campus series switches with software V200R006C00 before V200R006SPH002; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote authenticated users to cause a denial of service (memory consumption and device restart) by logging in and out of the (1) HTTPS or (2) SFTP server, related to SSL session information.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5300ei_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD722A3F-A17A-4C2F-BF97-B4EC3E1313AB",
                     versionEndExcluding: "v200r003sph011",
                     versionStartIncluding: "v200r003c00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300ei_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A16F8DA-E9B5-4501-BD07-DCCBC998B5B8",
                     versionEndExcluding: "v200r005sph008",
                     versionStartIncluding: "v200r005c00",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5300ei:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "438F46FA-6373-4323-B2C6-F4D6CFABD675",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5300si_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1818A8DD-58A0-41B2-9E8B-EC1851784654",
                     versionEndExcluding: "v200r001sph018",
                     versionStartIncluding: "v200r001c00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300si_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F77856A0-E46B-4492-8C9F-5B5FEEFEDCED",
                     versionEndExcluding: "v200r003sph011",
                     versionStartIncluding: "v200r002c00",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5300si:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "498B6006-41C9-4853-8CCD-1A3A122FAB51",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5310hi_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "57D589CC-550B-4C9E-827C-3F745B9E86C5",
                     versionEndExcluding: "v200r001sph018",
                     versionStartIncluding: "v200r001c00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5310hi_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9932CAA1-D2DA-4DB5-9068-36A3F8B99558",
                     versionEndExcluding: "v200r003sph011",
                     versionStartIncluding: "v200r002c00",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5310hi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D72B3B4B-1B7A-486C-A8BD-662390D585EB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6300ei_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "13FEE8AC-82C1-45A1-AEEA-90DA113B28FC",
                     versionEndExcluding: "v200r001sph018",
                     versionStartIncluding: "v200r001c00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300ei_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4B767F3-90A5-4B2D-BAA1-8FA0FC0A3FA0",
                     versionEndExcluding: "v200r003sph011",
                     versionStartIncluding: "v200r002c00",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6300ei:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC63D2FE-F8BB-4A20-8DD6-801A12C06F7C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5300li_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B7C59A1-526B-43D1-BFF6-A78DB487B228",
                     versionEndExcluding: "v200r003sph011",
                     versionStartIncluding: "v200r003c00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300li_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "478CEF58-3701-46B7-9CB6-3AB47E502FC3",
                     versionEndExcluding: "v200r005sph008",
                     versionStartIncluding: "v200r005c00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300li_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFCF982C-559F-4074-9C74-C0C473A93262",
                     versionEndExcluding: "v200r006sph002",
                     versionStartIncluding: "v200r006c00",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5300li:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3696874A-E462-482F-8CA4-4FAC37C8641E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s2350ei_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA26DEFB-04A3-41F9-A8B3-F3AC06B5EC8A",
                     versionEndExcluding: "v200r003sph011",
                     versionStartIncluding: "v200r003c00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2350ei_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E5D2580-1C41-4367-8A4D-298030C051F1",
                     versionEndExcluding: "v200r005sph008",
                     versionStartIncluding: "v200r005c00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2350ei_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "909F4FF5-B874-4E0B-A6F1-A2E9FE110381",
                     versionEndExcluding: "v200r006sph002",
                     versionStartIncluding: "v200r006c00",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s2350ei:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A8844AD-71F1-4139-B6CA-5534942DA424",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B0F9954-F0E2-4D1A-8641-E32E424B80FD",
                     versionEndExcluding: "v200r003sph011",
                     versionStartIncluding: "v200r003c00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "14879FE3-07A4-4F07-9325-F153170E2017",
                     versionEndExcluding: "v200r005sph009",
                     versionStartIncluding: "v200r005c00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "614CAF39-2122-4206-905C-C6743656C73A",
                     versionEndExcluding: "v200r006sph003",
                     versionStartIncluding: "v200r006c00",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0E2E640-EC67-40CC-8EF2-3E61195E8B68",
                     versionEndExcluding: "v200r003sph011",
                     versionStartIncluding: "v200r003c00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "398CABF6-F1D2-4A66-B4EE-45CB2A0F1B6E",
                     versionEndExcluding: "v200r005sph009",
                     versionStartIncluding: "v200r005c00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5F28803-5FC5-4904-9D79-0A3B15F8D1C8",
                     versionEndExcluding: "v200r006sph003",
                     versionStartIncluding: "v200r006c00",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BCAD4F5-CA86-441B-A542-6AA797F621B5",
                     versionEndExcluding: "v200r003sph011",
                     versionStartIncluding: "v200r003c00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CA11961-ED08-4931-88F4-AC1E9D191E5D",
                     versionEndExcluding: "v200r005sph009",
                     versionStartIncluding: "v200r005c00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "75C05E42-CCCD-446F-BDAB-0CD8FDBEE519",
                     versionEndExcluding: "v200r006sph003",
                     versionStartIncluding: "v200r006c00",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5720hi_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EEF5A073-7D11-4875-A7C4-F1298AF6A86D",
                     versionEndExcluding: "v200r006sph002",
                     versionStartIncluding: "v200r006c00",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5720hi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB64BC36-693E-4101-9C13-4A4C572A4EDE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5720ei_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "991916AB-5080-42CA-80CE-AFD1E69005E7",
                     versionEndExcluding: "v200r006sph002",
                     versionStartIncluding: "v200r006c00",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5720ei:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7B06975-BD37-452D-9782-B768610D3777",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2D6DD87-D00C-4AB9-AC7F-BCF066DF6030",
                     versionEndExcluding: "v100r006sph022",
                     versionStartIncluding: "v100r006c05",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "17566603-275F-4E6B-B5D9-4A716EEC03DC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s3300_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB47AE0C-67AA-4605-B1F2-C51065C8786F",
                     versionEndExcluding: "v100r006sph022",
                     versionStartIncluding: "v100r006c05",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s3300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A1410A1-ADCC-474F-ABEE-F0FE48E4CD7A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Memory leak in Huawei S5300EI, S5300SI, S5310HI, and S6300EI Campus series switches with software V200R003C00 before V200R003SPH011 and V200R005C00 before V200R005SPH008; S2350EI and S5300LI Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH008, and V200R006C00 before V200R006SPH002; S9300, S7700, and S9700 Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH009, and V200R006C00 before V200R006SPH003; S5720HI and S5720EI Campus series switches with software V200R006C00 before V200R006SPH002; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote authenticated users to cause a denial of service (memory consumption and device restart) by logging in and out of the (1) HTTPS or (2) SFTP server, related to SSL session information.",
      },
      {
         lang: "es",
         value: "Fuga de memoria en switches Huawei de la serie Campus S5300EI, S5300SI, S5310HI y S6300EI con software V200R003C00 en versiones anteriores a V200R003SPH011 y V200R005C00 en versiones anteriores a V200R005SPH008; switches de la serie Campus S2350EI y S5300LI con software V200R003C00 en versiones anteriores a V200R003SPH011, V200R005C00 en versiones anteriores a V200R005SPH008 y V200R006C00 en versiones anteriores a V200R006SPH002; switches de la serie Campus S9300, S7700 y S9700 con software V200R003C00 en versiones anteriores a V200R003SPH011, V200R005C00 en versiones anteriores a V200R005SPH009 y V200R006C00 en versiones anteriores a V200R006SPH003; switches de la serie Campus S5720HI y S5720EI con software V200R006C00 en versiones anteriores a V200R006SPH002; y switches de la serie Campus S2300 y S3300 con software V100R006C05 en versiones anteriores a V100R006SPH022 permite a usuarios remotos autenticados causar una denegación de servicio (consumo de memoria y reinicio de dispositivo) iniciando sesión y cerrándola en el servidor (1) HTTPS o (2) SFTP, relacionada con la información de sesión SSL.",
      },
   ],
   id: "CVE-2015-8677",
   lastModified: "2024-11-21T02:38:57.140",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "COMPLETE",
               baseScore: 6.8,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:S/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2016-04-14T15:59:03.857",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-03-switch-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-03-switch-en",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-399",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-03-05 19:29
Modified
2024-11-21 03:17
Summary
Huawei S12700 V200R005C00; V200R006C00; V200R007C00; V200R007C01; V200R007C20; V200R008C00; V200R009C00;S1700 V200R006C10; V200R009C00;S2700 V100R006C03; V200R003C00; V200R005C00; V200R006C00; V200R006C10; V200R007C00; V200R007C00B050; V200R007C00SPC009T; V200R007C00SPC019T; V200R008C00; V200R009C00;S3700 V100R006C03;S5700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R003C02; V200R005C00; V200R005C01; V200R005C02; V200R005C03; V200R006C00; V200R007C00; V200R008C00; V200R009C00;S6700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R005C01; V200R005C02; V200R008C00; V200R009C00;S7700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R006C00; V200R006C01; V200R007C00; V200R007C01; V200R008C00; V200R008C06; V200R009C00;S9700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R006C00; V200R007C00; V200R007C01; V200R008C00; V200R009C00 have a memory leak vulnerability. In some specific conditions, if attackers send specific malformed MPLS Service PING messages to the affected products, products do not release the memory when handling the packets. So successful exploit will result in memory leak of the affected products.
Impacted products
Vendor Product Version
huawei s12700_firmware v200r005c00
huawei s12700_firmware v200r006c00
huawei s12700_firmware v200r007c00
huawei s12700_firmware v200r007c01
huawei s12700_firmware v200r007c20
huawei s12700_firmware v200r008c00
huawei s12700_firmware v200r009c00
huawei s12700 -
huawei s1700_firmware v200r006c10
huawei s1700_firmware v200r009c00
huawei s1700 -
huawei s2700_firmware v100r006c03
huawei s2700_firmware v200r003c00
huawei s2700_firmware v200r005c00
huawei s2700_firmware v200r006c00
huawei s2700_firmware v200r006c10
huawei s2700_firmware v200r007c00
huawei s2700_firmware v200r007c00b050
huawei s2700_firmware v200r007c00spc009t
huawei s2700_firmware v200r007c00spc019t
huawei s2700_firmware v200r008c00
huawei s2700_firmware v200r009c00
huawei s2700 -
huawei s3700_firmware v100r006c03
huawei s3700 -
huawei s5700_firmware v200r001c00
huawei s5700_firmware v200r001c01
huawei s5700_firmware v200r002c00
huawei s5700_firmware v200r003c00
huawei s5700_firmware v200r003c02
huawei s5700_firmware v200r005c00
huawei s5700_firmware v200r005c01
huawei s5700_firmware v200r005c02
huawei s5700_firmware v200r005c03
huawei s5700_firmware v200r006c00
huawei s5700_firmware v200r007c00
huawei s5700_firmware v200r008c00
huawei s5700_firmware v200r009c00
huawei s5700 -
huawei s6700_firmware v200r001c00
huawei s6700_firmware v200r001c01
huawei s6700_firmware v200r002c00
huawei s6700_firmware v200r003c00
huawei s6700_firmware v200r005c00
huawei s6700_firmware v200r005c01
huawei s6700_firmware v200r005c02
huawei s6700_firmware v200r008c00
huawei s6700_firmware v200r009c00
huawei s6700 -
huawei s7700_firmware v200r001c00
huawei s7700_firmware v200r001c01
huawei s7700_firmware v200r002c00
huawei s7700_firmware v200r003c00
huawei s7700_firmware v200r005c00
huawei s7700_firmware v200r006c00
huawei s7700_firmware v200r006c01
huawei s7700_firmware v200r007c00
huawei s7700_firmware v200r007c01
huawei s7700_firmware v200r008c00
huawei s7700_firmware v200r008c06
huawei s7700_firmware v200r009c00
huawei s7700 -
huawei s9700_firmware v200r001c00
huawei s9700_firmware v200r001c01
huawei s9700_firmware v200r002c00
huawei s9700_firmware v200r003c00
huawei s9700_firmware v200r005c00
huawei s9700_firmware v200r006c00
huawei s9700_firmware v200r007c00
huawei s9700_firmware v200r007c01
huawei s9700_firmware v200r008c00
huawei s9700_firmware v200r009c00
huawei s9700 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D81469B-EC6C-493D-B632-4DF821A1F304",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6F2C4C7-3438-42B8-8999-C17E45C8CF49",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "10CBC93B-5CF6-45BF-A90A-84B7693E27FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC4803A7-44B2-41BA-814D-151239B92CEF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "985C07E4-1E27-4191-9FB8-4714A177479D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD4C5CC9-FD60-4C64-8F88-CFC71BBEA663",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B17A34EF-677D-4264-82FB-F7F582C9F56B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "410E8DAA-E961-46E1-96E2-3AC4B40D8359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F91DC34F-C000-4E51-A70E-38610D31AE53",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22FE26B5-C6D6-4A6C-8526-ED94F4F57C2C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v100r006c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EA85312-3C8F-4F1F-8138-1A091C453193",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9888DCAA-118C-4091-8425-8FBEE3AAABC9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "AED7DFC5-846F-4F90-91A8-13E9E805C9CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "193FCE7A-C793-446B-9C39-20597FA7BC70",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC1D26AA-09DF-49DA-930F-A2EAEA486361",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E364889D-CDEE-4D8C-82E5-6D5BC3DD768A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r007c00b050:*:*:*:*:*:*:*",
                     matchCriteriaId: "339CF153-DF87-4522-8041-E4F65D67D008",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r007c00spc009t:*:*:*:*:*:*:*",
                     matchCriteriaId: "0AD2B901-E5B8-4A6D-BDBD-804CECC27B23",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r007c00spc019t:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC14AAEC-0E25-4B32-9E12-5565B4BF8E37",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB8FC67E-DFD3-482E-B7D6-17464885B8DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6F69BC3-E6C0-4E70-AC13-D79D840579DB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD2CD071-58E4-4061-8217-990453213470",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s3700_firmware:v100r006c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "85611E3B-826E-4B8F-884B-C121DE4EECEB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s3700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B7F84390-E120-406B-967D-B473EB110EA9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "336AA440-AEF4-482B-A037-8976DC38BA1A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "228D261C-DB88-4AEE-91D3-772DD28E4CDE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B2DE9FE-5EC9-462E-86F0-EE772C944DFC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4907FBB8-5157-460D-9240-DD7D610C0FCC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r003c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "2898D6C5-77AB-4C1F-8134-B2DBD13EDB81",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCF23DAE-1215-41B2-88C5-4436D846266C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r005c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "F64CA8E2-AF04-42B3-8E26-2EF379703B1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r005c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB33B908-085C-43C6-B8B7-25BBF3614C9E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r005c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B18ABC1-A970-472A-A8BF-934D1180930E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5973A534-F961-4A97-B20E-994BA28AFE29",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "40745A01-E5AC-4207-A34F-D8E7F7231F83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "21FFF548-FBEF-468A-A8DE-1DB1B7C0B3AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "48B5A9B7-A931-4806-8AC7-302C6CA49CF1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B7B7285-F4C6-415C-A948-D7612750A77D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD40F46-5E04-43F0-A2DB-0ACBEC92C53F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D6DC0AF-017E-41BC-A19D-F9AA055F5224",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "749B68B9-9F62-4E7A-AC86-F4073BA32E18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F18D9776-5CE7-4DD3-9119-7FB08A35B955",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r005c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4979AA8-0D8E-4F37-A7DC-709BE4821D51",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r005c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "898AC16A-8F4E-4709-A3B4-DE74FFB91130",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DA5CF67-A58B-4666-B87E-712507233453",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9EA93B5-01A5-4506-9B0A-993621E6940E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F49D3EAD-1EB3-4C62-80BA-4C9C3CE0408C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "65902ABB-3EF2-4C8B-BAC1-84BC585019BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D75B012-A57D-4C6D-AB26-51D2ECC02F35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1DFF0C0-AA17-4AA1-A418-4759D1A58852",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D84F05D5-BA7D-485B-91C2-273349335CFB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF3FB3CC-2EAC-4A08-BDDC-DCACEE9FA2AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r006c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "345DA517-033D-4C94-A7F2-77C047309E2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "2377CD30-6F57-46CB-9DD1-E29458A7D928",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "D55C2AC7-FF47-4160-B524-E3E6C54612E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D79CD09-3414-4105-AD59-F3D1BAC61B7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r008c06:*:*:*:*:*:*:*",
                     matchCriteriaId: "C6712B77-1268-4A5A-B383-E51D9D51F108",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB2A3C92-C5C6-4BE6-A9F6-21C28D68C080",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B1F0B3D-1923-42C3-A3DB-03D11BE059D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "032E5E4D-B1B8-4659-8B62-3DC237234501",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4FB6ED15-477B-4BB5-AA94-0D7897FBD962",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "06AD9ACA-E0C3-4096-BE50-94E717CDA318",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "325D6523-A07A-48D4-AD44-CF838BD77432",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AC7E622-010C-4C5D-8AA6-D4793AFCE0E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D78DAB13-32AA-4813-AB0A-0EA870F41183",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "38515A04-EC21-40B3-A29C-8D0A5883EA4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "36AB80F7-1BD2-4169-AC70-708CE84BB15C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "01A0EC8F-6A8A-487F-A92A-789E3789788F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei S12700 V200R005C00; V200R006C00; V200R007C00; V200R007C01; V200R007C20; V200R008C00; V200R009C00;S1700 V200R006C10; V200R009C00;S2700 V100R006C03; V200R003C00; V200R005C00; V200R006C00; V200R006C10; V200R007C00; V200R007C00B050; V200R007C00SPC009T; V200R007C00SPC019T; V200R008C00; V200R009C00;S3700 V100R006C03;S5700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R003C02; V200R005C00; V200R005C01; V200R005C02; V200R005C03; V200R006C00; V200R007C00; V200R008C00; V200R009C00;S6700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R005C01; V200R005C02; V200R008C00; V200R009C00;S7700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R006C00; V200R006C01; V200R007C00; V200R007C01; V200R008C00; V200R008C06; V200R009C00;S9700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R006C00; V200R007C00; V200R007C01; V200R008C00; V200R009C00 have a memory leak vulnerability. In some specific conditions, if attackers send specific malformed MPLS Service PING messages to the affected products, products do not release the memory when handling the packets. So successful exploit will result in memory leak of the affected products.",
      },
      {
         lang: "es",
         value: "Huawei S12700 V200R005C00; V200R006C00; V200R007C00; V200R007C01; V200R007C20; V200R008C00; V200R009C00;S1700 V200R006C10; V200R009C00;S2700 V100R006C03; V200R003C00; V200R005C00; V200R006C00; V200R006C10; V200R007C00; V200R007C00B050; V200R007C00SPC009T; V200R007C00SPC019T; V200R008C00; V200R009C00;S3700 V100R006C03;S5700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R003C02; V200R005C00; V200R005C01; V200R005C02; V200R005C03; V200R006C00; V200R007C00; V200R008C00; V200R009C00;S6700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R005C01; V200R005C02; V200R008C00; V200R009C00;S7700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R006C00; V200R006C01; V200R007C00; V200R007C01; V200R008C00; V200R008C06; V200R009C00;S9700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R006C00; V200R007C00; V200R007C01; V200R008C00; V200R009C00 tienen una vulnerabilidad de filtrado de información. En algunas condiciones específicas, si los atacantes envían mensajes PING MPLS Service especialmente mal formados a los productos afectados, estos no liberan la memoria al gestionar los paquetes. Por lo tanto, esto resulta en el filtrado de memoria de los productos afectados.",
      },
   ],
   id: "CVE-2017-17141",
   lastModified: "2024-11-21T03:17:34.063",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "LOW",
               baseScore: 3.7,
               baseSeverity: "LOW",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
               version: "3.0",
            },
            exploitabilityScore: 2.2,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-03-05T19:29:00.737",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-mpls-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-mpls-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-772",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-03-09 17:29
Modified
2024-11-21 03:17
Summary
Huawei AR120-S V200R005C32; AR1200 V200R005C32; AR1200-S V200R005C32; AR150 V200R005C32; AR150-S V200R005C32; AR160 V200R005C32; AR200 V200R005C32; AR200-S V200R005C32; AR2200-S V200R005C32; AR3200 V200R005C32; V200R007C00; AR510 V200R005C32; NetEngine16EX V200R005C32; SRG1300 V200R005C32; SRG2300 V200R005C32; SRG3300 V200R005C32 have an out-of-bounds write vulnerability. When a user executes a query command after the device received an abnormal OSPF message, the software writes data past the end of the intended buffer due to the insufficient verification of the input data. An unauthenticated, remote attacker could exploit this vulnerability by sending abnormal OSPF messages to the device. A successful exploit could cause the system to crash.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r005c32:*:*:*:*:*:*:*",
                     matchCriteriaId: "D81E2517-263C-4B59-9D28-A3DE98289B24",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0CFDB51-BF44-4433-AB2A-CFF553F8D640",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r005c32:*:*:*:*:*:*:*",
                     matchCriteriaId: "4045CC4E-3B44-4E32-A04F-39C8572921B3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4BA4150-8CA8-48BF-9D45-ABC8AC710060",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r005c32:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE7D76DA-E30F-4071-807B-DED30596CD45",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B053C248-3CC2-476D-95A7-90EDD8EAAD69",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r005c32:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9A3CE39-6AC0-45E4-94B0-535AA92DAAF7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "526371A8-11FE-4D00-AFBB-8E867A320B27",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r005c32:*:*:*:*:*:*:*",
                     matchCriteriaId: "6ABEF8DE-D6CA-45DD-B10E-C3FFB5B82FE7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "137A007D-A498-483F-8B4F-DCA118B25F11",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r005c32:*:*:*:*:*:*:*",
                     matchCriteriaId: "75A87025-03BE-4671-9687-85510E9AE4C3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r005c32:*:*:*:*:*:*:*",
                     matchCriteriaId: "0325B983-F920-4006-8F3B-738B1B4EBEAF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r005c32:*:*:*:*:*:*:*",
                     matchCriteriaId: "01485D20-8F48-4D48-9242-95CD59069023",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r005c32:*:*:*:*:*:*:*",
                     matchCriteriaId: "272E6F06-9FAF-421B-8E87-7F1F1705B598",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5862E1A5-0222-4059-B9D7-716A6D0EB8CC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r005c32:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FE26EE9-2331-4D72-96CF-635A0A4EBE3E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9752658E-3CF5-4D9E-98FB-D15FD892479C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r005c32:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CA6C55E-DF1F-475D-B1E9-C09CF8278276",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FCD9E893-609B-4C97-82E6-0651AEC39D14",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r005c32:*:*:*:*:*:*:*",
                     matchCriteriaId: "34D96DF6-070E-44A1-837C-8690859960B1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6224ECC-6949-4204-94D1-C7374C142A50",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "10CBC93B-5CF6-45BF-A90A-84B7693E27FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC4803A7-44B2-41BA-814D-151239B92CEF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD4C5CC9-FD60-4C64-8F88-CFC71BBEA663",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC1D26AA-09DF-49DA-930F-A2EAEA486361",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E364889D-CDEE-4D8C-82E5-6D5BC3DD768A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB8FC67E-DFD3-482E-B7D6-17464885B8DC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD2CD071-58E4-4061-8217-990453213470",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "40745A01-E5AC-4207-A34F-D8E7F7231F83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "21FFF548-FBEF-468A-A8DE-1DB1B7C0B3AF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DA5CF67-A58B-4666-B87E-712507233453",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "2377CD30-6F57-46CB-9DD1-E29458A7D928",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D79CD09-3414-4105-AD59-F3D1BAC61B7E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D78DAB13-32AA-4813-AB0A-0EA870F41183",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "38515A04-EC21-40B3-A29C-8D0A5883EA4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "36AB80F7-1BD2-4169-AC70-708CE84BB15C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r005c32:*:*:*:*:*:*:*",
                     matchCriteriaId: "29D01E86-0F60-4A99-8E48-15B0B0BF3678",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r005c32:*:*:*:*:*:*:*",
                     matchCriteriaId: "B25185C6-3F8D-4D86-84D9-4D81A3DF5632",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BAF601C-B8EC-42F5-95F4-274F8492F57E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r005c32:*:*:*:*:*:*:*",
                     matchCriteriaId: "E586B837-E86A-4B3E-8701-3C92123F9FED",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43681AE7-5C12-4772-85A9-0A10177C6CFD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei AR120-S V200R005C32; AR1200 V200R005C32; AR1200-S V200R005C32; AR150 V200R005C32; AR150-S V200R005C32; AR160 V200R005C32; AR200 V200R005C32; AR200-S V200R005C32; AR2200-S V200R005C32; AR3200 V200R005C32; V200R007C00; AR510 V200R005C32; NetEngine16EX V200R005C32; SRG1300 V200R005C32; SRG2300 V200R005C32; SRG3300 V200R005C32 have an out-of-bounds write vulnerability. When a user executes a query command after the device received an abnormal OSPF message, the software writes data past the end of the intended buffer due to the insufficient verification of the input data. An unauthenticated, remote attacker could exploit this vulnerability by sending abnormal OSPF messages to the device. A successful exploit could cause the system to crash.",
      },
      {
         lang: "es",
         value: "Huawei AR120-S V200R005C32; AR1200 V200R005C32; AR1200-S V200R005C32; AR150 V200R005C32; AR150-S V200R005C32; AR160 V200R005C32; AR200 V200R005C32; AR200-S V200R005C32; AR2200-S V200R005C32; AR3200 V200R005C32; V200R007C00; AR510 V200R005C32; NetEngine16EX V200R005C32; SRG1300 V200R005C32; SRG2300 V200R005C32; SRG3300 V200R005C32 tienen una vulnerabilidad de escritura fuera de límites. Cuando un usuario ejecuta un comando de consulta cuando un dispositivo recibe un mensaje OSPF fuera de lo normal, el software escribe datos más allá del final del búfer planeado debido a la verificación insuficiente de los datos de entrada. Un atacante remoto no autenticado podría explotar esta vulnerabilidad enviando mensajes OSPF anormales al dispositivo. Una explotación exitosa podría hacer que el dispositivo se cierre inesperadamente.",
      },
   ],
   id: "CVE-2017-17250",
   lastModified: "2024-11-21T03:17:42.510",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.1,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-03-09T17:29:01.547",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180214-01-ospf-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180214-01-ospf-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-03-05 19:29
Modified
2024-11-21 03:17
Summary
PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a heap overflow vulnerability due to insufficient verification. An authenticated local attacker can make processing crash by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service.
Impacted products
Vendor Product Version
huawei dp300_firmware v500r002c00
huawei dp300 -
huawei ips_module_firmware v500r001c00
huawei ips_module_firmware v500r001c30
huawei ips_module -
huawei ngfw_module_firmware v500r001c00
huawei ngfw_module_firmware v500r002c00
huawei ngfw_module -
huawei nip6300_firmware v500r001c00
huawei nip6300_firmware v500r001c30
huawei nip6300 -
huawei nip6600_firmware v500r001c00
huawei nip6600_firmware v500r001c30
huawei nip6600 -
huawei rp200_firmware v500r002c00
huawei rp200_firmware v600r006c00
huawei rp200 -
huawei s12700_firmware v200r007c00
huawei s12700_firmware v200r007c01
huawei s12700_firmware v200r008c00
huawei s12700_firmware v200r009c00
huawei s12700_firmware v200r010c00
huawei s12700 -
huawei s1700_firmware v200r006c10
huawei s1700_firmware v200r009c00
huawei s1700_firmware v200r010c00
huawei s1700 -
huawei s2700_firmware v200r006c10
huawei s2700_firmware v200r007c00
huawei s2700_firmware v200r008c00
huawei s2700_firmware v200r009c00
huawei s2700_firmware v200r010c00
huawei s2700 -
huawei s5700_firmware v200r006c00
huawei s5700_firmware v200r007c00
huawei s5700_firmware v200r008c00
huawei s5700_firmware v200r009c00
huawei s5700_firmware v200r010c00
huawei s5700 -
huawei s6700_firmware v200r008c00
huawei s6700_firmware v200r009c00
huawei s6700_firmware v200r010c00
huawei s6700 -
huawei s7700_firmware v200r007c00
huawei s7700_firmware v200r008c00
huawei s7700_firmware v200r009c00
huawei s7700_firmware v200r010c00
huawei s7700 -
huawei s9700_firmware v200r007c00
huawei s9700_firmware v200r007c01
huawei s9700_firmware v200r008c00
huawei s9700_firmware v200r009c00
huawei s9700_firmware v200r010c00
huawei s9700 -
huawei secospace_usg6300_firmware v500r001c00
huawei secospace_usg6300_firmware v500r001c30
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v500r001c00
huawei secospace_usg6500_firmware v500r001c30
huawei secospace_usg6500 -
huawei secospace_usg6600_firmware v500r001c00
huawei secospace_usg6600_firmware v500r001c30s
huawei secospace_usg6600 -
huawei te30_firmware v100r001c02
huawei te30_firmware v100r001c10
huawei te30_firmware v500r002c00
huawei te30_firmware v600r006c00
huawei te30 -
huawei te40_firmware v500r002c00
huawei te40_firmware v600r006c00
huawei te40 -
huawei te50_firmware v500r002c00
huawei te50_firmware v600r006c00
huawei te50 -
huawei te60_firmware v100r001c02
huawei te60_firmware v100r001c10
huawei te60_firmware v500r002c00
huawei te60_firmware v600r006c00
huawei te60 -
huawei tp3106_firmware v100r002c00
huawei tp3106 -
huawei tp3206_firmware v100r002c00
huawei tp3206_firmware v100r002c10
huawei tp3206 -
huawei usg9500_firmware v500r001c00
huawei usg9500_firmware v500r001c30
huawei usg9500 -
huawei viewpoint_9030_firmware v100r011c02
huawei viewpoint_9030_firmware v100r011c03
huawei viewpoint_9030 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "16C1ED34-BC94-4AAC-ADF4-5FCD637E5B4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "67731A77-1DD4-49B2-B437-2850C9583750",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "98275088-2FBE-42F4-AAEC-DF02950B803D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "10CBC93B-5CF6-45BF-A90A-84B7693E27FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC4803A7-44B2-41BA-814D-151239B92CEF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD4C5CC9-FD60-4C64-8F88-CFC71BBEA663",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B17A34EF-677D-4264-82FB-F7F582C9F56B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "933755CC-4A0B-42FB-9491-3C841059851D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "410E8DAA-E961-46E1-96E2-3AC4B40D8359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F91DC34F-C000-4E51-A70E-38610D31AE53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "099E36B0-125F-4B3F-8D4A-01F8882CF53B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22FE26B5-C6D6-4A6C-8526-ED94F4F57C2C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC1D26AA-09DF-49DA-930F-A2EAEA486361",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E364889D-CDEE-4D8C-82E5-6D5BC3DD768A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB8FC67E-DFD3-482E-B7D6-17464885B8DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6F69BC3-E6C0-4E70-AC13-D79D840579DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5561195B-7385-4175-9D29-77E95E4E9AB6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD2CD071-58E4-4061-8217-990453213470",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5973A534-F961-4A97-B20E-994BA28AFE29",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "40745A01-E5AC-4207-A34F-D8E7F7231F83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "21FFF548-FBEF-468A-A8DE-1DB1B7C0B3AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "48B5A9B7-A931-4806-8AC7-302C6CA49CF1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA744621-893C-4F7E-80A1-66559BC6D6F4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DA5CF67-A58B-4666-B87E-712507233453",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9EA93B5-01A5-4506-9B0A-993621E6940E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "91E52545-B12E-43EC-B132-28FA2E511316",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "2377CD30-6F57-46CB-9DD1-E29458A7D928",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D79CD09-3414-4105-AD59-F3D1BAC61B7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB2A3C92-C5C6-4BE6-A9F6-21C28D68C080",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "37E3F87E-EA36-41ED-8793-F6C166FFC4A7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D78DAB13-32AA-4813-AB0A-0EA870F41183",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "38515A04-EC21-40B3-A29C-8D0A5883EA4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "36AB80F7-1BD2-4169-AC70-708CE84BB15C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "01A0EC8F-6A8A-487F-A92A-789E3789788F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C6DC309-2FC6-4014-9C2B-8EE12C7BB08F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30s:*:*:*:*:*:*:*",
                     matchCriteriaId: "18553F87-9928-4AE8-87D5-EB8014999E62",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "60DB85A7-54F1-4726-9D9C-07CC35621C19",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "492DABB3-66CF-47E9-92D4-518154559A7C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8C4071A-502F-46E4-80FF-C6647161A178",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a heap overflow vulnerability due to insufficient verification. An authenticated local attacker can make processing crash by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service.",
      },
      {
         lang: "es",
         value: "El módulo PEM de Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 tiene una vulnerabilidad de referencia de puntero null debido a la verificación insuficiente. Un atacante local autenticado puede provocar que el proceso se cierre inesperadamente mediante certificados maliciosos. El atacante puede explotar esta vulnerabilidad para provocar una denegación de servicio.",
      },
   ],
   id: "CVE-2017-17136",
   lastModified: "2024-11-21T03:17:33.370",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 2.1,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-03-05T19:29:00.487",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-119",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2017-06-08 21:29
Modified
2024-11-21 02:30
Summary
The IP stack in multiple Huawei Campus series switch models allows remote attackers to cause a denial of service (reboot) via a crafted ICMP request message.
Impacted products
Vendor Product Version
huawei s2300_firmware v100r006c00
huawei s2300_firmware v100r006c03
huawei s2300_firmware v100r006c05
huawei s2300 -
huawei s2700_firmware v100r006c00
huawei s2700_firmware v100r006c03
huawei s2700_firmware v100r006c05
huawei s2700 -
huawei s3300_firmware v100r006c00
huawei s3300_firmware v100r006c03
huawei s3300_firmware v100r006c05
huawei s3300 -
huawei s3700_firmware v100r006c00
huawei s3700_firmware v100r006c03
huawei s3700_firmware v100r006c05
huawei s3700 -
huawei s5300ei_firmware v100r006c00
huawei s5300ei_firmware v200r001c00spc300
huawei s5300ei_firmware v200r002c00spc300
huawei s5300ei_firmware v200r003c00spc300
huawei s5300ei_firmware v200r005c00spc300
huawei s5300ei -
huawei s5700ei_firmware v100r006c00
huawei s5700ei_firmware v200r001c00spc300
huawei s5700ei_firmware v200r002c00spc300
huawei s5700ei_firmware v200r003c00spc300
huawei s5700ei_firmware v200r005c00spc300
huawei s5700ei -
huawei s5300si_firmware v100r006c00
huawei s5300si_firmware v200r001c00spc300
huawei s5300si_firmware v200r002c00spc300
huawei s5300si_firmware v200r003c00spc300
huawei s5300si_firmware v200r005c00spc300
huawei s5300si -
huawei s5700si_firmware v100r006c00
huawei s5700si_firmware v200r001c00spc300
huawei s5700si_firmware v200r002c00spc300
huawei s5700si_firmware v200r003c00spc300
huawei s5700si_firmware v200r005c00spc300
huawei s5700si -
huawei s5300hi_firmware v200r001c00spc300
huawei s5300hi_firmware v200r002c00spc300
huawei s5300hi_firmware v200r003c00spc300
huawei s5300hi_firmware v200r005c00spc300
huawei s5300hi -
huawei s5700hi_firmware v200r001c00spc300
huawei s5700hi_firmware v200r002c00spc300
huawei s5700hi_firmware v200r003c00spc300
huawei s5700hi_firmware v200r005c00spc300
huawei s5700hi -
huawei s6300ei_firmware v200r001c00spc300
huawei s6300ei_firmware v200r002c00spc300
huawei s6300ei_firmware v200r003c00spc300
huawei s6300ei_firmware v200r005c00spc300
huawei s6300ei -
huawei s6700ei_firmware v200r001c00spc300
huawei s6700ei_firmware v200r002c00spc300
huawei s6700ei_firmware v200r003c00spc300
huawei s6700ei_firmware v200r005c00spc300
huawei s6700ei -
huawei s5710hi_firmware v200r001c00spc300
huawei s5710hi_firmware v200r002c00spc300
huawei s5710hi_firmware v200r003c00spc300
huawei s5710hi_firmware v200r005c00spc300
huawei s5710hi -
huawei s5300li_firmware v200r001c00spc300
huawei s5300li_firmware v200r002c00spc300
huawei s5300li_firmware v200r003c00spc300
huawei s5300li_firmware v200r005c00spc300
huawei s5300li_firmware v200r006c00spc500
huawei s5300li_firmware v200r007c00spc500
huawei s5300li -
huawei s5700li_firmware v200r001c00spc300
huawei s5700li_firmware v200r002c00spc300
huawei s5700li_firmware v200r003c00spc300
huawei s5700li_firmware v200r005c00spc300
huawei s5700li_firmware v200r006c00spc500
huawei s5700li_firmware v200r007c00spc500
huawei s5700li -
huawei s2350ei_firmware v200r001c00spc300
huawei s2350ei_firmware v200r002c00spc300
huawei s2350ei_firmware v200r003c00spc300
huawei s2350ei_firmware v200r005c00spc300
huawei s2350ei_firmware v200r006c00spc500
huawei s2350ei_firmware v200r007c00spc500
huawei s2350ei -
huawei s2750ei_firmware v200r001c00spc300
huawei s2750ei_firmware v200r002c00spc300
huawei s2750ei_firmware v200r003c00spc300
huawei s2750ei_firmware v200r005c00spc300
huawei s2750ei_firmware v200r006c00spc500
huawei s2750ei_firmware v200r007c00spc500
huawei s2750ei -
huawei s5720hi_firmware v200r006c00spc500
huawei s5720hi_firmware v200r007c00spc500
huawei s5720hi -
huawei s7700_firmware v200r001c00spc300
huawei s7700_firmware v200r002c00spc300
huawei s7700_firmware v200r003c00spc500
huawei s7700_firmware v200r005c00spc300
huawei s7700_firmware v200r006c00spc500
huawei s7700_firmware v200r007c00spc500
huawei s7700 -
huawei s9300_firmware v200r001c00spc300
huawei s9300_firmware v200r002c00spc300
huawei s9300_firmware v200r003c00spc500
huawei s9300_firmware v200r005c00spc300
huawei s9300_firmware v200r006c00spc500
huawei s9300_firmware v200r007c00spc500
huawei s9300 -
huawei s9700_firmware v200r001c00spc300
huawei s9700_firmware v200r002c00spc300
huawei s9700_firmware v200r003c00spc500
huawei s9700_firmware v200r005c00spc300
huawei s9700_firmware v200r006c00spc500
huawei s9700_firmware v200r007c00spc500
huawei s9700 -
huawei s12700_firmware v200r005c00spc300
huawei s12700_firmware v200r006c00spc500
huawei s12700_firmware v200r007c00spc500
huawei s12700 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v100r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9D7CB90-6F2C-4012-8E57-F3B85F9D09C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v100r006c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "FEFF6D05-BC82-4943-9D79-95CBEDD5CD2C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v100r006c05:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B863F3A-38C5-4E36-8E71-713B12EE6889",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "17566603-275F-4E6B-B5D9-4A716EEC03DC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v100r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "02401EA6-28B6-4424-B182-C20CD081FFD2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v100r006c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EA85312-3C8F-4F1F-8138-1A091C453193",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v100r006c05:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA7D9357-D179-4B24-A073-17BA09AEC7E9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD2CD071-58E4-4061-8217-990453213470",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s3300_firmware:v100r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "22A2763B-2A83-4C0A-BA11-2B22CE834EDD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s3300_firmware:v100r006c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "8C328054-3E5C-4122-AD5B-49A71791D7F6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s3300_firmware:v100r006c05:*:*:*:*:*:*:*",
                     matchCriteriaId: "3DBB1A49-B169-40F4-B611-C739896A2A71",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s3300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A1410A1-ADCC-474F-ABEE-F0FE48E4CD7A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s3700_firmware:v100r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7002CF50-20B6-4CB5-8EDE-8B35C7435D6B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s3700_firmware:v100r006c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "85611E3B-826E-4B8F-884B-C121DE4EECEB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s3700_firmware:v100r006c05:*:*:*:*:*:*:*",
                     matchCriteriaId: "021F224A-F28F-4192-883C-8A75898BEA84",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s3700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B7F84390-E120-406B-967D-B473EB110EA9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5300ei_firmware:v100r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB980280-1737-47E2-8524-06C2EB3E3A44",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300ei_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "8239CCD8-B83E-4BC0-9F80-F192CE486A4E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300ei_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A43BCB4-6D92-408E-A73E-CF87CD346E0F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300ei_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "030E1304-CCFB-4433-A367-0D2A1B574914",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300ei_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B196776-C623-4161-8BFB-3F408DB63253",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5300ei:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "438F46FA-6373-4323-B2C6-F4D6CFABD675",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700ei_firmware:v100r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E881F881-A952-4E28-93A5-8EDFF2FC08BB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700ei_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "860D9897-72D7-48BC-AAA8-89EDC787DA36",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700ei_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC32DB6F-2C8F-45C7-BF80-9750EDAFE1C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700ei_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "C3B1BE75-73A8-424A-9B4B-1BBF64C34E23",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700ei_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "B43D90EA-9BB1-49AE-9076-939D20217917",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700ei:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B0BE6C3-1FB2-4718-AA9D-1A8D8663C195",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5300si_firmware:v100r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BDBAD45D-6AFB-4A5B-82E8-ED4D15DBF925",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300si_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A61C07A-A249-4EA4-8B33-604A70707757",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300si_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "5BC533FD-445D-4198-9230-46051233EBC6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300si_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "B76A602C-EC5B-48A9-BDF6-07A43BFF925C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300si_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "1599C015-4E36-4C8E-BE07-351DA50F960B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5300si:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "498B6006-41C9-4853-8CCD-1A3A122FAB51",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700si_firmware:v100r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "210E88DD-C61B-4E70-B412-ABF4B73F3BC2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700si_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "E89C6C1C-AE55-44DC-A9A0-C6B2A8646AAD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700si_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE9C1F25-98EC-43B0-B0C6-6DBFA2CD3A96",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700si_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B019E52-17FB-48D9-A301-B4E1855B0C59",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700si_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "265C8691-8272-4C48-BE25-8B2B51C15888",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700si:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "24C4DC87-DE8C-461F-A555-F6E9A71C1C48",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5300hi_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "73686E67-21C2-45B0-A105-A2AB5B3E7218",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300hi_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "350FCDA4-19BF-4E63-B7C9-A1159A267EBA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300hi_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "6563866F-D1E3-4B8B-9D08-AA952F610556",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300hi_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "77512809-D6F1-4F19-8B79-70CC973FC6C4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5300hi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "20B4C8E2-7928-41FF-ACF7-E2CF28501997",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700hi_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "4F365BF7-A73E-4628-98E7-06A6C819B38F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700hi_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6CFB46C-A6E3-49C4-84A9-B682BD2AF13D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700hi_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CBAA8F6-0AE2-4287-A3F1-64198AAF7151",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700hi_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C341CDB-A532-4B87-9DF5-D0576412DC8B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700hi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED775342-B93C-4DF9-BC62-B6BE549F1B29",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6300ei_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FD5B574-03D0-4111-B4AF-3732012C2E52",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300ei_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "22644C5E-1ABF-433B-AD38-13533395F456",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300ei_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "806F90CD-1EDA-4148-8938-DDC78B3DE82D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300ei_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "36314640-E462-42EB-9BE6-B4683B9DA7B6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6300ei:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC63D2FE-F8BB-4A20-8DD6-801A12C06F7C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6700ei_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "10DD372D-3ED3-4E80-85DB-5E03BF4F38BE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700ei_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CEEFD6-7FFD-498A-841F-A4664157033B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700ei_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC040EE3-4CC8-42CC-A03B-89F4061A3B07",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700ei_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "D68F9EF2-A93E-4CE1-9A7C-7097BDAF18C5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6700ei:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F09DBA68-6F2E-42B1-B62C-50ED5317D363",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5710hi_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC1062F4-6272-4C69-9F52-B2D04BF8B04A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5710hi_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA4B9066-4940-4BCF-A11A-65E4D3F9819E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5710hi_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FBC1C70-C1C0-4CAD-9616-039E80837983",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5710hi_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "59EBEED2-52C2-4F9E-919C-C4C6B3617D68",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5710hi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DFF0F26-CDF2-49B0-AED7-EEA4B9E99E8C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5300li_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E037F4C-EA5B-4526-9182-F028E580C361",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300li_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DE63BF3-2EE8-4AB7-91D1-E83D2DFF0F9A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300li_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "97C17461-23DF-4E9C-9806-102F06D66045",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300li_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "BFD9B623-1853-4F2B-B89B-1E31B3AC743A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300li_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "E849DDBF-80AC-4736-88A2-E6EECCC8CE4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300li_firmware:v200r007c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "983B3479-E7EE-49C2-82D5-02B6620B5479",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5300li:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3696874A-E462-482F-8CA4-4FAC37C8641E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700li_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "18E9BB0F-6A34-490E-82EC-ADE12AC3E649",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700li_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B171E0D-91E5-4EC6-9C0F-FAB2BC0A3915",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700li_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "B338780D-71EB-44A1-A95B-26C240586FAC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700li_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC27F896-EF43-40D4-A436-212E865BF699",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700li_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2570A5D-2AC0-495C-BF99-2E19A9B8217F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700li_firmware:v200r007c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "D60AF421-5F71-43CC-B852-B16063B26F66",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700li:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "21B89917-2B3D-4BA5-8836-ADEECF46E976",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s2350ei_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C15E318-E188-46CD-B7B5-AFDDB12137E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2350ei_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "01A6ECDF-0606-45BD-8574-76508DB88669",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2350ei_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1C446CC-A622-4E08-9FDE-399EBDB3C3B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2350ei_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "B73AADFE-502E-43B0-BAE2-9E99ACFC5799",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2350ei_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5E2F24F-D185-4529-BFA3-E3B6CED7ABED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2350ei_firmware:v200r007c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AB4D0E0-636B-47CC-8A9C-86D2937F59A1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s2350ei:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A8844AD-71F1-4139-B6CA-5534942DA424",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s2750ei_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "98BD1EFD-29F1-495E-8701-EFF2CC710F4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2750ei_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E01D70-2DEC-4A5B-B33E-5665B9200B96",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2750ei_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "D376B21B-5B1C-44F3-A4A3-0650EBC1A0C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2750ei_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B2FAA30-8F9C-4993-8F24-72D7CFA8EBDB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2750ei_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC43FCD5-E820-44E9-8C2F-63F252BA4042",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2750ei_firmware:v200r007c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5C14E76-DE28-44C1-84FC-6A61B1CE77BD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s2750ei:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7770B303-C595-4D00-961B-23BCCCEBC725",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5720hi_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "7635D7EE-D274-42C5-A627-E2C77F4753DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5720hi_firmware:v200r007c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "7520E268-DFAC-4CC1-AEC5-08844E95CECE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5720hi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB64BC36-693E-4101-9C13-4A4C572A4EDE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "07A44DEA-AB17-48F4-87C1-B3B6088BCD82",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD36DBAD-B0A9-4A16-AE6A-D3949A1764D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D0B5718-9465-476F-B2FA-FFC6FB08E354",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "13FB139B-C0C2-4BB5-BA60-E1B32030F9E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC191A39-26C6-4503-9152-A29A2EAAC6BF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "F368821C-C253-4584-B53C-F6BBA0186433",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D1EF10E-F18B-4F3A-AA2B-25003183E19D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "54D5B323-BFB3-4A0A-B1E1-37E4DC4FF984",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "78DA2DC7-63B3-40D7-BEC7-AF81066A2733",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "A066F4B8-2258-4ED2-A166-02FCA7C9F3A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDA38762-CACE-403B-8DE5-42E0306FEB28",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r007c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "989CE0D9-95CE-4571-A89F-EE083C63CFB8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4EE71EF-90D8-40C6-9E80-A543ED32E976",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "8C2BF2B6-915B-4F57-8C75-CD09612985F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBDBE325-B6F4-475F-B7F8-F3142F730039",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "CAB593E5-D919-436C-A10A-6FA72B69EA55",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "464C5DF2-E6D7-4679-A375-521FD730CA14",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D4F46F5-1BD2-444E-84B9-09DC4440B355",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5234B43-EA0C-45C9-B188-4D6085F031F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8A79318-19CF-4097-9B49-A9BF7CD9E716",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "CAEE3E52-4646-4D35-931B-4739E059732F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The IP stack in multiple Huawei Campus series switch models allows remote attackers to cause a denial of service (reboot) via a crafted ICMP request message.",
      },
      {
         lang: "es",
         value: "En varios modelos de switch de la serie Huawei Campus, la pila IP permite a atacantes remotos causar una denegación de servicio (reinicio) a través de un mensaje de solicitud ICMP manipulado.",
      },
   ],
   id: "CVE-2015-3913",
   lastModified: "2024-11-21T02:30:04.850",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.8,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2017-06-08T21:29:00.377",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-427449.htm",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-427449.htm",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-03-22 20:15
Modified
2024-11-21 05:49
Summary
There is a use-after-free vulnerability in a Huawei product. A module cannot deal with specific operations in special scenarios. Attackers can exploit this vulnerability by performing malicious operations. This can cause memory use-after-free, compromising normal service. Affected product include some versions of NIP6300, NIP6600, NIP6800, S1700, S2700, S5700, S6700 , S7700, S9700, Secospace USG6300, Secospace USG6500, Secospace USG6600 and USG9500.
Impacted products
Vendor Product Version
huawei nip6300_firmware v500r001c30
huawei nip6300_firmware v500r001c60
huawei nip6300 -
huawei nip6600_firmware v500r001c30
huawei nip6600 -
huawei nip6800_firmware v500r001c60
huawei nip6800 -
huawei s12700_firmware v200r007c01
huawei s12700_firmware v200r007c01b102
huawei s12700_firmware v200r008c00
huawei s12700_firmware v200r010c00
huawei s12700_firmware v200r010c00spc300
huawei s12700_firmware v200r011c00
huawei s12700_firmware v200r011c00spc100
huawei s12700_firmware v200r011c10
huawei s12700 -
huawei s1700_firmware v200r009c00spc200
huawei s1700_firmware v200r009c00spc500
huawei s1700_firmware v200r010c00
huawei s1700_firmware v200r010c00spc300
huawei s1700_firmware v200r011c00
huawei s1700_firmware v200r011c00spc100
huawei s1700_firmware v200r011c10
huawei s1700 -
huawei s2700_firmware v200r008c00
huawei s2700_firmware v200r010c00
huawei s2700_firmware v200r010c00spc300
huawei s2700_firmware v200r011c00
huawei s2700_firmware v200r011c00spc100
huawei s2700_firmware v200r011c10
huawei s2700 -
huawei s5700_firmware v200r008c00
huawei s5700_firmware v200r010c00
huawei s5700_firmware v200r010c00spc300
huawei s5700_firmware v200r011c00
huawei s5700_firmware v200r011c00spc100
huawei s5700_firmware v200r011c10
huawei s5700_firmware v200r011c10spc100
huawei s5700 -
huawei s6700_firmware v200r008c00
huawei s6700_firmware v200r010c00
huawei s6700_firmware v200r010c00spc300
huawei s6700_firmware v200r011c00
huawei s6700_firmware v200r011c00spc100
huawei s6700_firmware v200r011c10
huawei s6700_firmware v200r011c10spc100
huawei s6700 -
huawei s7700_firmware v200r008c00
huawei s7700_firmware v200r010c00
huawei s7700_firmware v200r010c00spc300
huawei s7700_firmware v200r011c00
huawei s7700_firmware v200r011c00spc100
huawei s7700_firmware v200r011c10
huawei s7700 -
huawei s9700_firmware v200r007c01
huawei s9700_firmware v200r007c01b102
huawei s9700_firmware v200r008c00
huawei s9700_firmware v200r010c00
huawei s9700_firmware v200r010c00spc300
huawei s9700_firmware v200r011c00
huawei s9700_firmware v200r011c00spc100
huawei s9700_firmware v200r011c10
huawei s9700 -
huawei secospace_usg6300_firmware v500r001c30
huawei secospace_usg6300_firmware v500r001c60
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v500r001c30
huawei secospace_usg6500_firmware v500r001c60
huawei secospace_usg6500 -
huawei secospace_usg6600_firmware v500r001c30
huawei secospace_usg6600_firmware v500r001c60
huawei secospace_usg6600 -
huawei usg9500_firmware v500r001c30
huawei usg9500_firmware v500r001c60
huawei usg9500 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "A26FE369-FDB8-4425-B51A-465A41FECE7E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7EE3877-6344-466D-90B0-68CF4A53A256",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC4803A7-44B2-41BA-814D-151239B92CEF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c01b102:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA273AD6-F7C0-49F3-A33F-E46B86168A98",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD4C5CC9-FD60-4C64-8F88-CFC71BBEA663",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "933755CC-4A0B-42FB-9491-3C841059851D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r010c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E46ADD0-4DF7-4C87-88D6-46A2065DB5B2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r011c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB158E3E-8A26-415F-86E9-E63524EAA055",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r011c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E146F90-3E3F-4F23-81C0-0C4F36293711",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D6FF612-2F2B-4B75-8D97-86205DFCF0CF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r009c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A91097D-76DB-4E5D-B520-6BF22E73BEFF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r009c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "D085F205-5C80-4A34-89A9-54F9FB8F2F69",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "099E36B0-125F-4B3F-8D4A-01F8882CF53B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r010c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "69FA8636-5936-4776-9DF2-1BD294796F0B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r011c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A843B78A-CDB1-45A0-BBAC-6F3D69AD84DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r011c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "A59EDC82-83AD-408E-AA8E-15E221C3B009",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "342E032C-BAE5-4F15-8BAE-84F9D9AA58D0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22FE26B5-C6D6-4A6C-8526-ED94F4F57C2C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB8FC67E-DFD3-482E-B7D6-17464885B8DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5561195B-7385-4175-9D29-77E95E4E9AB6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r010c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A57254C-A4F0-47D2-8A1A-029E79BE863C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r011c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9461516A-F5BB-4A52-A315-8C2B559528A0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r011c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "225A56F2-2EEB-4816-9A20-7A6E37C65FA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "20648023-4CC5-4606-BE8E-70A5C20D7BE6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD2CD071-58E4-4061-8217-990453213470",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "21FFF548-FBEF-468A-A8DE-1DB1B7C0B3AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA744621-893C-4F7E-80A1-66559BC6D6F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r010c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED5093F9-8629-4DA5-AC3A-EE5FFD7A57AB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r011c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD2FEF0B-B4AC-4EDB-AD25-41F4F9DA1DAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r011c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "57E9C52D-0F60-41E5-8646-1F4D908CA82C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "AFD7EF17-710B-4363-87B7-CE1B4447BF99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r011c10spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A2FFFE5-5B4E-4040-BE25-A90D77AB53FE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DA5CF67-A58B-4666-B87E-712507233453",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "91E52545-B12E-43EC-B132-28FA2E511316",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r010c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "17889C1C-0187-4814-940D-5BA6DDA39ECF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r011c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "11F25342-CE07-44CD-BD61-A998DFC8EF8E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r011c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "D31F91CA-80E9-4C2A-AD61-A4FC08C8A83E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C34E6D4-67FE-4AA4-A825-9666A302F771",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r011c10spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "52947109-38C8-41A2-BC59-B43EA2343F43",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D79CD09-3414-4105-AD59-F3D1BAC61B7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "37E3F87E-EA36-41ED-8793-F6C166FFC4A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r010c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "82E3273C-3C33-4880-A044-389F5CB6FECA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r011c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "749528C3-5F85-4B80-98AA-FFD5574779F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r011c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "2341D4F8-67E0-4B10-9D16-F2282D3EDBED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "26F2CC30-626B-4FEE-BDAD-6A5990DE6384",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "38515A04-EC21-40B3-A29C-8D0A5883EA4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c01b102:*:*:*:*:*:*:*",
                     matchCriteriaId: "2091CE58-DB15-4D36-ABF9-5DC94D39E358",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "36AB80F7-1BD2-4169-AC70-708CE84BB15C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C6DC309-2FC6-4014-9C2B-8EE12C7BB08F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r010c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "3BBC7227-051E-4244-9A63-760D0714DA35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r011c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D42D4D0E-2E0D-448E-B83D-50A1361C048B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r011c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "90A601DF-D90C-43EB-8A56-3890CF0C252D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B06663D-8499-42B9-83E1-E369F1FD0070",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDD7E147-B39E-4C6F-BA5F-F046F3AE4728",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "6EE084FC-27EB-4CE6-B529-508DA690C9D8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6AACFD2-9C9D-49E3-A911-0CF58F863EE0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "74B7C57C-7CD4-4FF0-BE51-2F4794FED7AE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "There is a use-after-free vulnerability in a Huawei product. A module cannot deal with specific operations in special scenarios. Attackers can exploit this vulnerability by performing malicious operations. This can cause memory use-after-free, compromising normal service. Affected product include some versions of NIP6300, NIP6600, NIP6800, S1700, S2700, S5700, S6700 , S7700, S9700, Secospace USG6300, Secospace USG6500, Secospace USG6600 and USG9500.",
      },
      {
         lang: "es",
         value: "Se presenta una vulnerabilidad de uso de la memoria previamente liberada en un producto de Huawei.&#xa0;Un módulo no puede tratar operaciones específicas en escenarios especiales.&#xa0;Los atacantes pueden explotar esta vulnerabilidad al realizar operaciones maliciosas.&#xa0;Esto puede causar un uso de la memoria previamente liberada, comprometiendo el servicio normal.&#xa0;Los productos afectados incluyen algunas versiones de NIP6300, NIP6600, NIP6800, S1700, S2700, S5700, S6700, S7700, S9700, Secospace USG6300, Secospace USG6500, Secospace USG6600 y USG9500",
      },
   ],
   id: "CVE-2021-22321",
   lastModified: "2024-11-21T05:49:54.420",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "LOW",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-03-22T20:15:17.613",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-01-uaf-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-01-uaf-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-416",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:14
Summary
XML parser in Huawei S12700 V200R005C00,S1700 V200R009C00, V200R010C00,S3700 V100R006C03, V100R006C05,S5700 V200R001C00, V200R002C00, V200R003C00, V200R003C02, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S6700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C02, V200R008C00, V200R009C00, V200R010C00,S7700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S9700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,eCNS210_TD V100R004C10, V100R004C10SPC003, V100R004C10SPC100, V100R004C10SPC101, V100R004C10SPC102, V100R004C10SPC200, V100R004C10SPC221, V100R004C10SPC400 has a DOS vulnerability. An attacker may craft specific XML files to the affected products. Due to not check the specially XML file and to parse this file, successful exploit will result in DOS attacks.
Impacted products
Vendor Product Version
huawei s12700_firmware v200r005c00
huawei s12700 -
huawei s1700_firmware v200r009c00
huawei s1700_firmware v200r010c00
huawei s1700 -
huawei s5700_firmware v200r001c00
huawei s5700_firmware v200r002c00
huawei s5700_firmware v200r003c00
huawei s5700_firmware v200r003c02
huawei s5700_firmware v200r005c00
huawei s5700_firmware v200r006c00
huawei s5700_firmware v200r007c00
huawei s5700_firmware v200r008c00
huawei s5700_firmware v200r009c00
huawei s5700_firmware v200r010c00
huawei s5700 -
huawei s6700_firmware v200r001c00
huawei s6700_firmware v200r002c00
huawei s6700_firmware v200r003c00
huawei s6700_firmware v200r005c00
huawei s6700_firmware v200r005c02
huawei s6700_firmware v200r008c00
huawei s6700_firmware v200r009c00
huawei s6700_firmware v200r010c00
huawei s6700 -
huawei s6700_firmware v200r001c00
huawei s6700_firmware v200r002c00
huawei s6700_firmware v200r003c00
huawei s6700_firmware v200r005c00
huawei s6700_firmware v200r005c02
huawei s6700_firmware v200r008c00
huawei s6700_firmware v200r009c00
huawei s6700_firmware v200r010c00
huawei s6700 -
huawei s7700_firmware v200r001c00
huawei s7700_firmware v200r002c00
huawei s7700_firmware v200r003c00
huawei s7700_firmware v200r005c00
huawei s7700_firmware v200r006c00
huawei s7700_firmware v200r007c00
huawei s7700_firmware v200r008c00
huawei s7700_firmware v200r009c00
huawei s7700_firmware v200r010c00
huawei s7700 -
huawei s9700_firmware v200r001c00
huawei s9700_firmware v200r002c00
huawei s9700_firmware v200r003c00
huawei s9700_firmware v200r005c00
huawei s9700_firmware v200r006c00
huawei s9700_firmware v200r007c00
huawei s9700_firmware v200r008c00
huawei s9700_firmware v200r009c00
huawei s9700_firmware v200r010c00
huawei s9700 -
huawei ecns210_td_firmware v100r004c10
huawei ecns210_td_firmware v100r004c10spc003
huawei ecns210_td_firmware v100r004c10spc100
huawei ecns210_td_firmware v100r004c10spc101
huawei ecns210_td_firmware v100r004c10spc102
huawei ecns210_td_firmware v100r004c10spc200
huawei ecns210_td_firmware v100r004c10spc221
huawei ecns210_td_firmware v100r004c10spc400
huawei ecns210_td -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D81469B-EC6C-493D-B632-4DF821A1F304",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F91DC34F-C000-4E51-A70E-38610D31AE53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "099E36B0-125F-4B3F-8D4A-01F8882CF53B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22FE26B5-C6D6-4A6C-8526-ED94F4F57C2C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "336AA440-AEF4-482B-A037-8976DC38BA1A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B2DE9FE-5EC9-462E-86F0-EE772C944DFC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4907FBB8-5157-460D-9240-DD7D610C0FCC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r003c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "2898D6C5-77AB-4C1F-8134-B2DBD13EDB81",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCF23DAE-1215-41B2-88C5-4436D846266C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5973A534-F961-4A97-B20E-994BA28AFE29",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "40745A01-E5AC-4207-A34F-D8E7F7231F83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "21FFF548-FBEF-468A-A8DE-1DB1B7C0B3AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "48B5A9B7-A931-4806-8AC7-302C6CA49CF1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA744621-893C-4F7E-80A1-66559BC6D6F4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B7B7285-F4C6-415C-A948-D7612750A77D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D6DC0AF-017E-41BC-A19D-F9AA055F5224",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "749B68B9-9F62-4E7A-AC86-F4073BA32E18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F18D9776-5CE7-4DD3-9119-7FB08A35B955",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r005c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "898AC16A-8F4E-4709-A3B4-DE74FFB91130",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DA5CF67-A58B-4666-B87E-712507233453",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9EA93B5-01A5-4506-9B0A-993621E6940E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "91E52545-B12E-43EC-B132-28FA2E511316",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B7B7285-F4C6-415C-A948-D7612750A77D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D6DC0AF-017E-41BC-A19D-F9AA055F5224",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "749B68B9-9F62-4E7A-AC86-F4073BA32E18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F18D9776-5CE7-4DD3-9119-7FB08A35B955",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r005c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "898AC16A-8F4E-4709-A3B4-DE74FFB91130",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DA5CF67-A58B-4666-B87E-712507233453",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9EA93B5-01A5-4506-9B0A-993621E6940E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "91E52545-B12E-43EC-B132-28FA2E511316",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F49D3EAD-1EB3-4C62-80BA-4C9C3CE0408C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D75B012-A57D-4C6D-AB26-51D2ECC02F35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1DFF0C0-AA17-4AA1-A418-4759D1A58852",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D84F05D5-BA7D-485B-91C2-273349335CFB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF3FB3CC-2EAC-4A08-BDDC-DCACEE9FA2AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "2377CD30-6F57-46CB-9DD1-E29458A7D928",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D79CD09-3414-4105-AD59-F3D1BAC61B7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB2A3C92-C5C6-4BE6-A9F6-21C28D68C080",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "37E3F87E-EA36-41ED-8793-F6C166FFC4A7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B1F0B3D-1923-42C3-A3DB-03D11BE059D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4FB6ED15-477B-4BB5-AA94-0D7897FBD962",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "06AD9ACA-E0C3-4096-BE50-94E717CDA318",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "325D6523-A07A-48D4-AD44-CF838BD77432",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AC7E622-010C-4C5D-8AA6-D4793AFCE0E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D78DAB13-32AA-4813-AB0A-0EA870F41183",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "36AB80F7-1BD2-4169-AC70-708CE84BB15C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "01A0EC8F-6A8A-487F-A92A-789E3789788F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C6DC309-2FC6-4014-9C2B-8EE12C7BB08F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "30C6245A-D192-4D02-BB4E-285ABD2BB328",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10spc003:*:*:*:*:*:*:*",
                     matchCriteriaId: "26692835-0934-46B9-99F3-16C6C445716C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "A16ED12F-F226-4D51-ACF3-7F0B17E3ECF1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10spc101:*:*:*:*:*:*:*",
                     matchCriteriaId: "22E94D2A-8B69-498F-9326-4973F81BA53B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10spc102:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B4EC75E-9FE1-4E3E-A884-D05EA6BC6DE4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A07D70E-8237-4D0C-BE2A-ABEE76BB78A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10spc221:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A6D1CC-5E68-41DD-B983-44B5070FD71A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10spc400:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC368972-3057-4E2C-BC6A-234AC7A700B2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ecns210_td:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47FCDC81-B742-4D42-BD52-52BBDDDD4BE5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "XML parser in Huawei S12700 V200R005C00,S1700 V200R009C00, V200R010C00,S3700 V100R006C03, V100R006C05,S5700 V200R001C00, V200R002C00, V200R003C00, V200R003C02, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S6700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C02, V200R008C00, V200R009C00, V200R010C00,S7700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S9700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,eCNS210_TD V100R004C10, V100R004C10SPC003, V100R004C10SPC100, V100R004C10SPC101, V100R004C10SPC102, V100R004C10SPC200, V100R004C10SPC221, V100R004C10SPC400 has a DOS vulnerability. An attacker may craft specific XML files to the affected products. Due to not check the specially XML file and to parse this file, successful exploit will result in DOS attacks.",
      },
      {
         lang: "es",
         value: "El analizador XML en Huawei S12700 V200R005C00,S1700 V200R009C00, V200R010C00,S3700 V100R006C03, V100R006C05,S5700 V200R001C00, V200R002C00, V200R003C00, V200R003C02, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S6700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C02, V200R008C00, V200R009C00, V200R010C00,S7700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S9700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,eCNS210_TD V100R004C10, V100R004C10SPC003, V100R004C10SPC100, V100R004C10SPC101, V100R004C10SPC102, V100R004C10SPC200, V100R004C10SPC221 y V100R004C10SPC400 tiene una vulnerabilidad de denegación de servicio. Un atacante podría manipular archivos XML específicos para los productos afectados. Dado que no se comprueba este archivo XML, al analizarlo se podría provocar un ataque DOS.",
      },
   ],
   id: "CVE-2017-15346",
   lastModified: "2024-11-21T03:14:30.757",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 4.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 1,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-02-15T16:29:01.047",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-xml-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-xml-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2016-04-11 15:59
Modified
2024-11-21 02:50
Summary
Huawei Quidway S9700, S5700, S5300, S9300, and S7700 switches with software before V200R003SPH012 allow remote attackers to cause a denial of service (switch restart) via crafted traffic.
Impacted products
Vendor Product Version
huawei s5300_firmware v200r003c00spc500
huawei s5700_firmware v200r003c00spc500
huawei s7700_firmware v200r003c00spc500
huawei s9300_firmware v200r003c00spc500
huawei s9700_firmware v200r003c00spc500
huawei s5300 -
huawei s5700 -
huawei s7700 -
huawei s9300 -
huawei s9700 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:huawei:s5300_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "946678A8-DE69-47F7-8E30-4B2BA0C510A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:huawei:s5700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "435BA0E6-618F-44CC-BC5D-BF3D5E015F11",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:huawei:s7700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "A75D8053-9786-48DC-92D9-53D021BFD9DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:huawei:s9300_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "4FD8A1E2-CF98-4E4D-A4E4-DCCAF3C7CBD0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:huawei:s9700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "E72F6D8C-8E96-4F47-B626-A8423493D882",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CFEF08E-54C5-4D60-AFF0-37B00D6E2DDD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei Quidway S9700, S5700, S5300, S9300, and S7700 switches with software before V200R003SPH012 allow remote attackers to cause a denial of service (switch restart) via crafted traffic.",
      },
      {
         lang: "es",
         value: "Switches Huawei Quidway S9700, S5700, S5300, S9300 y S7700 con software en versiones anteriores a V200R003SPH012 permite a atacantes remotos provocar una denegación de servicio (reinicio de switch) a través de tráfico manipulado.",
      },
   ],
   id: "CVE-2016-3678",
   lastModified: "2024-11-21T02:50:29.710",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: true,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.8,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2016-04-11T15:59:10.597",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160330-01-switch-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160330-01-switch-en",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2016-09-26 15:59
Modified
2024-11-21 02:56
Summary
Memory leak in Huawei S9300, S5300, S5700, S6700, S7700, S9700, and S12700 devices allows remote attackers to cause a denial of service (memory consumption and restart) via a large number of malformed packets.
Impacted products
Vendor Product Version
huawei s5300_firmware v200r001c00
huawei s5300_firmware v200r002c00
huawei s5300_firmware v200r003c00
huawei s5300_firmware v200r005c00
huawei s5300_firmware v200r005c01
huawei s5300_firmware v200r005c02
huawei s5300_firmware v200r006c00
huawei s5300_firmware v200r007c00
huawei s5300_firmware v200r008c00
huawei s5300 -
huawei s12700_firmware v200r005c00
huawei s12700_firmware v200r006c00
huawei s12700_firmware v200r008c00
huawei s12700 -
huawei s6300_firmware v200r001c00
huawei s6300_firmware v200r002c00
huawei s6300_firmware v200r003c00
huawei s6300_firmware v200r005c00
huawei s6300_firmware v200r005c01
huawei s6300_firmware v200r005c02
huawei s6300_firmware v200r008c00
huawei s6300 -
huawei s7700_firmware v200r001c00
huawei s7700_firmware v200r002c00
huawei s7700_firmware v200r003c00
huawei s7700_firmware v200r005c00
huawei s7700_firmware v200r006c00
huawei s7700_firmware v200r008c00
huawei s7700 -
huawei s5700_firmware v200r001c00
huawei s5700_firmware v200r001c01
huawei s5700_firmware v200r002c00
huawei s5700_firmware v200r003c00
huawei s5700_firmware v200r003c02
huawei s5700_firmware v200r005c00
huawei s5700_firmware v200r006c00
huawei s5700_firmware v200r008c00
huawei s5700 -
huawei s6700_firmware v200r001c00
huawei s6700_firmware v200r001c01
huawei s6700_firmware v200r002c00
huawei s6700_firmware v200r003c00
huawei s6700_firmware v200r008c00
huawei s6700 -
huawei s9700_firmware v200r001c00
huawei s9700_firmware v200r001c01
huawei s9700_firmware v200r002c00
huawei s9700_firmware v200r003c00
huawei s9700_firmware v200r005c00
huawei s9700_firmware v200r006c00
huawei s9700_firmware v200r008c00
huawei s9700 -
huawei s9300_firmware v200r001c00
huawei s9300_firmware v200r003c00
huawei s9300_firmware v200r005c00
huawei s9300_firmware v200r006c00
huawei s9300_firmware v200r008c00
huawei s9300 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CD6E677-2031-4AC4-A5FE-DED60F789127",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FD118E1-317E-4903-A4D0-51EBCFA58C5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD601FFF-E623-4ADC-B286-D11B8004D7CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5EAEF900-7C8C-4569-B74B-A802F951CC47",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r005c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB2B09C5-81F1-48B4-940D-6DFD06200139",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r005c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDC356D3-F015-46A0-8F7A-1C594F19535B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "58C2E728-E8F2-461D-A069-4BEC88B94FD0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD6B13D4-07F3-4CB5-8194-89781E685A78",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5454BC21-A04F-4B3D-8533-2414B6E1BC8C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CFEF08E-54C5-4D60-AFF0-37B00D6E2DDD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D81469B-EC6C-493D-B632-4DF821A1F304",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6F2C4C7-3438-42B8-8999-C17E45C8CF49",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD4C5CC9-FD60-4C64-8F88-CFC71BBEA663",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A680CFA-9C46-453D-A5BC-8ED1EBD45C2B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9B67169-BF28-4493-89E9-9AAB895D9456",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C330A14-C941-4B28-AA9C-B78A96A9011D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "C6818ECD-730B-40D6-9108-B8540CC4BF1E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r005c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5EF72D9-ABCC-474C-A6B2-67944C32ED5C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r005c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4FBF354-D5BD-438A-9348-B65A45789053",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "939C73D9-E0E9-47A5-970E-6C84F5ECD2D7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA3C8988-A1FC-4B04-9134-F2BDDADEAFB5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F49D3EAD-1EB3-4C62-80BA-4C9C3CE0408C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D75B012-A57D-4C6D-AB26-51D2ECC02F35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1DFF0C0-AA17-4AA1-A418-4759D1A58852",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D84F05D5-BA7D-485B-91C2-273349335CFB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF3FB3CC-2EAC-4A08-BDDC-DCACEE9FA2AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D79CD09-3414-4105-AD59-F3D1BAC61B7E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "336AA440-AEF4-482B-A037-8976DC38BA1A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "228D261C-DB88-4AEE-91D3-772DD28E4CDE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B2DE9FE-5EC9-462E-86F0-EE772C944DFC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4907FBB8-5157-460D-9240-DD7D610C0FCC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r003c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "2898D6C5-77AB-4C1F-8134-B2DBD13EDB81",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCF23DAE-1215-41B2-88C5-4436D846266C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5973A534-F961-4A97-B20E-994BA28AFE29",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "21FFF548-FBEF-468A-A8DE-1DB1B7C0B3AF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B7B7285-F4C6-415C-A948-D7612750A77D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD40F46-5E04-43F0-A2DB-0ACBEC92C53F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D6DC0AF-017E-41BC-A19D-F9AA055F5224",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "749B68B9-9F62-4E7A-AC86-F4073BA32E18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DA5CF67-A58B-4666-B87E-712507233453",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B1F0B3D-1923-42C3-A3DB-03D11BE059D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "032E5E4D-B1B8-4659-8B62-3DC237234501",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4FB6ED15-477B-4BB5-AA94-0D7897FBD962",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "06AD9ACA-E0C3-4096-BE50-94E717CDA318",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "325D6523-A07A-48D4-AD44-CF838BD77432",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AC7E622-010C-4C5D-8AA6-D4793AFCE0E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "36AB80F7-1BD2-4169-AC70-708CE84BB15C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8F37BC5-3B25-4E30-A1CA-5ACFA46119B5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "473B6E52-E60F-4D3C-9028-E362DF2A8327",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "2632DC1D-0CB9-4493-9270-436139C88623",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC8AE44D-1924-4C01-B4B9-CC5BF485A3EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E7DB9D3-BB34-49BE-8302-A054D79FE8D6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Memory leak in Huawei S9300, S5300, S5700, S6700, S7700, S9700, and S12700 devices allows remote attackers to cause a denial of service (memory consumption and restart) via a large number of malformed packets.",
      },
      {
         lang: "es",
         value: "Fuga de memoria en dispositivos Huawei S9300, S5300, S5700, S6700, S7700, S9700 y S12700 permite a atacantes remotos provocar una denegación de servicio (consumo de memoria y reinicio) a través de un gran número de paquetes malformados.",
      },
   ],
   id: "CVE-2016-6518",
   lastModified: "2024-11-21T02:56:16.780",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2016-09-26T15:59:01.780",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160914-01-sep-en",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/92968",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160914-01-sep-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/92968",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-399",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2017-11-22 19:29
Modified
2024-11-21 03:33
Summary
AC6005 V200R006C10SPC200,AC6605 V200R006C10SPC200,AR1200 with software V200R005C10CP0582T, V200R005C10HP0581T, V200R005C20SPC026T,AR200 with software V200R005C20SPC026T,AR3200 V200R005C20SPC026T,CloudEngine 12800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 5800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 6800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 7800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 8800 with software V100R006C00, V200R001C00,E600 V200R008C00,S12700 with software V200R005C00, V200R006C00, V200R007C00, V200R008C00,S1700 with software V100R006C00, V100R007C00, V200R006C00,S2300 with software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S2700 with software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S5300 with software V100R005C00, V100R006C00, V100R006C01, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S5700 with software V100R005C00, V100R006C00, V100R006C01, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S6300 with software V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R008C00,S6700 with software V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S7700 with software V100R003C00, V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S9300 with software V100R001C00, V100R002C00, V100R003C00, V100R006C00, V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R008C10,S9700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00,Secospace USG6600 V500R001C00SPC050 have a MaxAge LSA vulnerability due to improper OSPF implementation. When the device receives special LSA packets, the LS (Link Status) age would be set to MaxAge, 3600 seconds. An attacker can exploit this vulnerability to poison the route table and launch a DoS attack.
Impacted products
Vendor Product Version
huawei ac6005_firmware v200r006c10spc200
huawei ac6005 -
huawei ac6605_firmware v200r006c10spc200
huawei ac6605 -
huawei ar1200_firmware v200r005c10cp0582t
huawei ar1200_firmware v200r005c10hp0581t
huawei ar1200_firmware v200r005c20spc026t
huawei ar1200 -
huawei ar200_firmware v200r005c20spc026t
huawei ar200 -
huawei ar3200_firmware v200r005c20spc026t
huawei ar3200 -
huawei cloudengine_12800_firmware v100r003c00
huawei cloudengine_12800_firmware v100r005c00
huawei cloudengine_12800_firmware v100r005c10
huawei cloudengine_12800_firmware v100r006c00
huawei cloudengine_12800_firmware v200r001c00
huawei cloudengine_12800 -
huawei cloudengine_5800_firmware v100r003c00
huawei cloudengine_5800_firmware v100r005c00
huawei cloudengine_5800_firmware v100r005c10
huawei cloudengine_5800_firmware v100r006c00
huawei cloudengine_5800_firmware v200r001c00
huawei cloudengine_5800 -
huawei cloudengine_6800_firmware v100r003c00
huawei cloudengine_6800_firmware v100r005c00
huawei cloudengine_6800_firmware v100r005c10
huawei cloudengine_6800_firmware v100r006c00
huawei cloudengine_6800_firmware v200r001c00
huawei cloudengine_6800 -
huawei cloudengine_7800_firmware v100r003c00
huawei cloudengine_7800_firmware v100r005c00
huawei cloudengine_7800_firmware v100r005c10
huawei cloudengine_7800_firmware v100r006c00
huawei cloudengine_7800_firmware v200r001c00
huawei cloudengine_7800 -
huawei cloudengine_8800_firmware v100r006c00
huawei cloudengine_8800_firmware v200r001c00
huawei cloudengine_8800 -
huawei e600_firmware v200r008c00
huawei e600 -
huawei s12700_firmware v200r005c00
huawei s12700_firmware v200r006c00
huawei s12700_firmware v200r007c00
huawei s12700_firmware v200r008c00
huawei s12700 -
huawei s1700_firmware v100r006c00
huawei s1700_firmware v100r007c00
huawei s1700_firmware v200r006c00
huawei s1700 -
huawei s2300_firmware v100r005c00
huawei s2300_firmware v100r006c00
huawei s2300_firmware v100r006c03
huawei s2300_firmware v100r006c05
huawei s2300_firmware v200r003c00
huawei s2300_firmware v200r003c02
huawei s2300_firmware v200r003c10
huawei s2300_firmware v200r005c00
huawei s2300_firmware v200r005c01
huawei s2300_firmware v200r005c02
huawei s2300_firmware v200r005c03
huawei s2300_firmware v200r006c00
huawei s2300_firmware v200r007c00
huawei s2300_firmware v200r008c00
huawei s2300 -
huawei s2700_firmware v100r005c00
huawei s2700_firmware v100r006c00
huawei s2700_firmware v100r006c03
huawei s2700_firmware v100r006c05
huawei s2700_firmware v200r003c00
huawei s2700_firmware v200r003c02
huawei s2700_firmware v200r003c10
huawei s2700_firmware v200r005c00
huawei s2700_firmware v200r005c01
huawei s2700_firmware v200r005c02
huawei s2700_firmware v200r005c03
huawei s2700_firmware v200r006c00
huawei s2700_firmware v200r007c00
huawei s2700_firmware v200r008c00
huawei s2700 -
huawei s5300_firmware v100r005c00
huawei s5300_firmware v100r006c00
huawei s5300_firmware v100r006c01
huawei s5300_firmware v200r001c00
huawei s5300_firmware v200r001c01
huawei s5300_firmware v200r002c00
huawei s5300_firmware v200r003c00
huawei s5300_firmware v200r003c02
huawei s5300_firmware v200r003c10
huawei s5300_firmware v200r005c00
huawei s5300_firmware v200r006c00
huawei s5300_firmware v200r007c00
huawei s5300_firmware v200r008c00
huawei s5300 -
huawei s5700_firmware v100r005c00
huawei s5700_firmware v100r006c00
huawei s5700_firmware v100r006c01
huawei s5700_firmware v200r001c00
huawei s5700_firmware v200r001c01
huawei s5700_firmware v200r002c00
huawei s5700_firmware v200r003c00
huawei s5700_firmware v200r003c02
huawei s5700_firmware v200r003c10
huawei s5700_firmware v200r005c00
huawei s5700_firmware v200r006c00
huawei s5700_firmware v200r007c00
huawei s5700_firmware v200r008c00
huawei s5700 -
huawei s6300_firmware v100r006c00
huawei s6300_firmware v200r001c00
huawei s6300_firmware v200r001c01
huawei s6300_firmware v200r002c00
huawei s6300_firmware v200r003c00
huawei s6300_firmware v200r003c02
huawei s6300_firmware v200r003c10
huawei s6300_firmware v200r005c00
huawei s6300_firmware v200r008c00
huawei s6300 -
huawei s6700_firmware v100r006c00
huawei s6700_firmware v200r001c00
huawei s6700_firmware v200r001c01
huawei s6700_firmware v200r002c00
huawei s6700_firmware v200r003c00
huawei s6700_firmware v200r003c02
huawei s6700_firmware v200r003c10
huawei s6700_firmware v200r005c00
huawei s6700_firmware v200r006c00
huawei s6700_firmware v200r007c00
huawei s6700_firmware v200r008c00
huawei s6700 -
huawei s7700_firmware v100r003c00
huawei s7700_firmware v100r006c00
huawei s7700_firmware v200r001c00
huawei s7700_firmware v200r001c01
huawei s7700_firmware v200r002c00
huawei s7700_firmware v200r003c00
huawei s7700_firmware v200r005c00
huawei s7700_firmware v200r006c00
huawei s7700_firmware v200r007c00
huawei s7700_firmware v200r008c00
huawei s7700 -
huawei s9300_firmware v100r001c00
huawei s9300_firmware v100r002c00
huawei s9300_firmware v100r003c00
huawei s9300_firmware v100r006c00
huawei s9300_firmware v200r001c00
huawei s9300_firmware v200r002c00
huawei s9300_firmware v200r003c00
huawei s9300_firmware v200r005c00
huawei s9300_firmware v200r006c00
huawei s9300_firmware v200r007c00
huawei s9300_firmware v200r008c00
huawei s9300_firmware v200r008c10
huawei s9300 -
huawei s9700_firmware v200r001c00
huawei s9700_firmware v200r002c00
huawei s9700_firmware v200r003c00
huawei s9700_firmware v200r005c00
huawei s9700_firmware v200r006c00
huawei s9700_firmware v200r007c00
huawei s9700_firmware v200r008c00
huawei s9700 -
huawei secospace_usg6600_firmware v500r001c00
huawei secospace_usg6600_firmware v500r001c20
huawei secospace_usg6600_firmware v500r001c30
huawei secospace_usg6600 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ac6005_firmware:v200r006c10spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC214387-5475-4906-9DB0-37904F155D3E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ac6005:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3681DA94-7184-4DC6-BD73-FCE2DB808F07",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ac6605_firmware:v200r006c10spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "27E1DFD0-E93F-4603-A0BD-0A9BB47FEF83",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ac6605:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA1E5AE5-EBB2-4E05-A3C7-E2CA54205FF7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r005c10cp0582t:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C83A896-DBC0-4BF1-8FE8-1A69229C0AFD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r005c10hp0581t:*:*:*:*:*:*:*",
                     matchCriteriaId: "50006839-F220-4076-A90C-3DC021E318E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r005c20spc026t:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC958A4F-DE8B-452C-B8BB-F905E8FCE81B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4BA4150-8CA8-48BF-9D45-ABC8AC710060",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r005c20spc026t:*:*:*:*:*:*:*",
                     matchCriteriaId: "B375CF5B-F667-4C55-A0FA-A3341D07DC10",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r005c20spc026t:*:*:*:*:*:*:*",
                     matchCriteriaId: "41B21485-192C-43E2-9F3A-26248F6EE3D6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:cloudengine_12800_firmware:v100r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "2AEB5929-1526-4910-BE22-07FCDDA06D0B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:cloudengine_12800_firmware:v100r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E58D7203-2EE3-412A-B39C-94D82B0BBB98",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:cloudengine_12800_firmware:v100r005c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "71EF4F82-092F-4D19-832B-A174F7D47477",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:cloudengine_12800_firmware:v100r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C2DACA5-0AA6-419B-AC6A-8CC19326758E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4492E892-7BE5-413A-AD53-2D39BD6626F6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:cloudengine_12800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE8A2875-0F7E-4790-A925-5999396B7578",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:cloudengine_5800_firmware:v100r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "90200F0F-FF1A-42D9-A4EF-8DD5F6DB6BA4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:cloudengine_5800_firmware:v100r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "33B93684-6903-4A54-B631-15873D3D3744",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:cloudengine_5800_firmware:v100r005c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DFDAAAC-0585-406F-B547-FB71C5352209",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:cloudengine_5800_firmware:v100r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "916288E9-1DAB-40BE-9C29-3E8603FC0F02",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:cloudengine_5800_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1573B4A5-A78B-4A17-8E1B-673A11D18221",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:cloudengine_5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8FD775C-F6B6-42B3-942E-EB4DC889B5F0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:cloudengine_6800_firmware:v100r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "C42246DF-E736-4D98-AF73-3F5B731485D2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:cloudengine_6800_firmware:v100r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E31AD6C5-E687-47C9-8473-2486A6864128",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:cloudengine_6800_firmware:v100r005c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "40D8A10D-8B77-4F43-87A9-803ED9855AC9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:cloudengine_6800_firmware:v100r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E574B02-F89A-4D5C-B462-3AF56F1C0A57",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:cloudengine_6800_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD5BEF58-456D-4983-B1CA-A53CE5C4E24E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:cloudengine_6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "19F2B3CC-12AD-466D-98F9-0C09C7C053CF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:cloudengine_7800_firmware:v100r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "374AD269-B0F4-4534-ABAC-D08343B2CE42",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:cloudengine_7800_firmware:v100r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "828A6E23-962D-4A92-B14D-949B01489F35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:cloudengine_7800_firmware:v100r005c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "B676B444-6128-4A04-B3E7-421F74FA9CD1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:cloudengine_7800_firmware:v100r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF6985E0-9375-4DE2-A879-AAACF923381C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:cloudengine_7800_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0FFE8C7-6E03-45ED-A581-779C75A5C432",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:cloudengine_7800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D05E858C-A3D8-4BF1-A750-CFD8C949ABF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:cloudengine_8800_firmware:v100r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "494F5272-28A3-4CE8-BB15-A7532C6DBA2E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:cloudengine_8800_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "397A2479-E943-401D-80AA-CD647E4AD451",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:cloudengine_8800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "102751EB-C284-4983-BDFA-BFB634CB2CEC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:e600_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE665712-0AF8-4671-9C3B-E2361B67A115",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:e600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "021DF9A0-E7A9-4BB4-B8FA-49702D5F9E17",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D81469B-EC6C-493D-B632-4DF821A1F304",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6F2C4C7-3438-42B8-8999-C17E45C8CF49",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "10CBC93B-5CF6-45BF-A90A-84B7693E27FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD4C5CC9-FD60-4C64-8F88-CFC71BBEA663",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v100r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "293C2F9D-AD5B-4BEA-AA5F-42867723A3CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v100r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EF14270-0AB9-425D-BB3C-53580F0E9568",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "37009595-4D24-4679-93B7-3DCB6812E904",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22FE26B5-C6D6-4A6C-8526-ED94F4F57C2C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v100r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D875DDE-A38C-4C96-BE75-1CC5EAB7127B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v100r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9D7CB90-6F2C-4012-8E57-F3B85F9D09C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v100r006c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "FEFF6D05-BC82-4943-9D79-95CBEDD5CD2C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v100r006c05:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B863F3A-38C5-4E36-8E71-713B12EE6889",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C6CC00C-1056-426B-9828-1A886F2C8D41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v200r003c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "2EEB211D-DF38-446D-8188-A1BA2B5055EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "F72A58FB-F7F5-4A4E-9B6A-F58A81B95040",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F1C82DA6-8D95-45D2-B54C-CFE1AA9CC1F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v200r005c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "84857AE5-BCD7-4CD7-B1E0-EED6160189DD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v200r005c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEA81D41-E5C2-4788-A8EF-634B6273C454",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v200r005c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "C47744E0-DAA5-41F5-8983-76457145029C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F982369-1A22-4F39-90AD-ABB824845774",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "79FA2FDA-DB2D-47D9-8017-0E5D4EC8D620",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A40EFA43-E71F-464D-829C-8D4C60A57765",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "17566603-275F-4E6B-B5D9-4A716EEC03DC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v100r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "39637990-2BCB-4429-B9FF-E24305D689B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v100r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "02401EA6-28B6-4424-B182-C20CD081FFD2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v100r006c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EA85312-3C8F-4F1F-8138-1A091C453193",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v100r006c05:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA7D9357-D179-4B24-A073-17BA09AEC7E9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9888DCAA-118C-4091-8425-8FBEE3AAABC9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r003c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "35D75511-AFE2-4F56-BD35-38196442B369",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA3B89B7-1EA4-4597-BE48-67D0F79DB482",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "AED7DFC5-846F-4F90-91A8-13E9E805C9CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r005c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "2EBB2862-B8A8-4723-AB8C-2F703204B4DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r005c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC8A7075-264D-4AD7-92AE-10EADC4F2CFD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r005c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EA1D0A3-F955-4E7A-B52C-E9B483FB87DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "193FCE7A-C793-446B-9C39-20597FA7BC70",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E364889D-CDEE-4D8C-82E5-6D5BC3DD768A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB8FC67E-DFD3-482E-B7D6-17464885B8DC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD2CD071-58E4-4061-8217-990453213470",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v100r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "0090CFFF-364F-436E-AA48-4AF6DCE852CD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v100r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F5A65B0-66CC-456D-B356-FBF4B24E2EBA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v100r006c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "03E13B90-A465-4FBB-9D40-8EE380EB6CE9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CD6E677-2031-4AC4-A5FE-DED60F789127",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5BAE79D-445C-4234-B520-A00073750161",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FD118E1-317E-4903-A4D0-51EBCFA58C5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD601FFF-E623-4ADC-B286-D11B8004D7CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r003c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D5A6744-9B7F-4FF4-BE1B-AB6E6249ECE3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCA51B28-0130-4643-B45D-F2A74A08C9EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5EAEF900-7C8C-4569-B74B-A802F951CC47",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "58C2E728-E8F2-461D-A069-4BEC88B94FD0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD6B13D4-07F3-4CB5-8194-89781E685A78",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5454BC21-A04F-4B3D-8533-2414B6E1BC8C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CFEF08E-54C5-4D60-AFF0-37B00D6E2DDD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v100r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C60179-9ADC-4C50-8973-0767F295A963",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v100r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3D3E8A8-0D1E-40E7-8F94-81BACD476750",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v100r006c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "4F89C2BA-E029-4D8E-93FB-F72322B21450",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "336AA440-AEF4-482B-A037-8976DC38BA1A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "228D261C-DB88-4AEE-91D3-772DD28E4CDE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B2DE9FE-5EC9-462E-86F0-EE772C944DFC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4907FBB8-5157-460D-9240-DD7D610C0FCC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r003c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "2898D6C5-77AB-4C1F-8134-B2DBD13EDB81",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "914C959A-3A3B-4B9C-BEF6-9EE129042C2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCF23DAE-1215-41B2-88C5-4436D846266C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5973A534-F961-4A97-B20E-994BA28AFE29",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "40745A01-E5AC-4207-A34F-D8E7F7231F83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "21FFF548-FBEF-468A-A8DE-1DB1B7C0B3AF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v100r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B6B86F2-833E-4F41-A310-FC75A21D8241",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A680CFA-9C46-453D-A5BC-8ED1EBD45C2B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCEA87EC-B795-41BB-AC08-2E2F4D77BEF5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9B67169-BF28-4493-89E9-9AAB895D9456",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C330A14-C941-4B28-AA9C-B78A96A9011D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r003c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "A73AC184-24AF-4DE8-BDFC-D646475C21F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F94C9F0-CBB9-4F5C-8D5C-8DD1B420C0BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "C6818ECD-730B-40D6-9108-B8540CC4BF1E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "939C73D9-E0E9-47A5-970E-6C84F5ECD2D7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA3C8988-A1FC-4B04-9134-F2BDDADEAFB5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v100r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0ECAC9C-B545-4DA7-9DC7-6B661B3465BC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B7B7285-F4C6-415C-A948-D7612750A77D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD40F46-5E04-43F0-A2DB-0ACBEC92C53F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D6DC0AF-017E-41BC-A19D-F9AA055F5224",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "749B68B9-9F62-4E7A-AC86-F4073BA32E18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r003c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DD08A9D-8391-4F67-A61B-D80950079CE8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "BDC63F52-B7FE-4F43-9A70-ECB2D3621195",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F18D9776-5CE7-4DD3-9119-7FB08A35B955",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FD4718F-473A-490E-8DFC-6A09FECDDD90",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF4AF711-D921-4261-A459-2A0780EA951F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DA5CF67-A58B-4666-B87E-712507233453",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v100r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "C306E48F-EE09-4C7D-9084-484245A1A9F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v100r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8061AC8-1A89-4D3D-A95A-305EE65900A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F49D3EAD-1EB3-4C62-80BA-4C9C3CE0408C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "65902ABB-3EF2-4C8B-BAC1-84BC585019BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D75B012-A57D-4C6D-AB26-51D2ECC02F35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1DFF0C0-AA17-4AA1-A418-4759D1A58852",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D84F05D5-BA7D-485B-91C2-273349335CFB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF3FB3CC-2EAC-4A08-BDDC-DCACEE9FA2AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "2377CD30-6F57-46CB-9DD1-E29458A7D928",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D79CD09-3414-4105-AD59-F3D1BAC61B7E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v100r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E180AC6-B8CA-4733-82A1-8BA7D0B0B683",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "937381A6-259E-4FC3-837D-686ECCB4957F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v100r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A1C2351-2403-4259-9113-031DD4AE39BB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v100r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E38DC13-7D02-4C04-9569-FC6365A06F8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8F37BC5-3B25-4E30-A1CA-5ACFA46119B5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC83D96A-728C-40C1-97F5-BE079A39D724",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "473B6E52-E60F-4D3C-9028-E362DF2A8327",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "2632DC1D-0CB9-4493-9270-436139C88623",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC8AE44D-1924-4C01-B4B9-CC5BF485A3EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "886E9D1F-25FA-41FA-A64B-E42B9910D2B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E7DB9D3-BB34-49BE-8302-A054D79FE8D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r008c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ACAD052-796D-428E-95B1-65099952B773",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B1F0B3D-1923-42C3-A3DB-03D11BE059D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4FB6ED15-477B-4BB5-AA94-0D7897FBD962",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "06AD9ACA-E0C3-4096-BE50-94E717CDA318",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "325D6523-A07A-48D4-AD44-CF838BD77432",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AC7E622-010C-4C5D-8AA6-D4793AFCE0E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D78DAB13-32AA-4813-AB0A-0EA870F41183",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "36AB80F7-1BD2-4169-AC70-708CE84BB15C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "AC6005 V200R006C10SPC200,AC6605 V200R006C10SPC200,AR1200 with software V200R005C10CP0582T, V200R005C10HP0581T, V200R005C20SPC026T,AR200 with software V200R005C20SPC026T,AR3200 V200R005C20SPC026T,CloudEngine 12800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 5800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 6800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 7800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 8800 with software V100R006C00, V200R001C00,E600 V200R008C00,S12700 with software V200R005C00, V200R006C00, V200R007C00, V200R008C00,S1700 with software V100R006C00, V100R007C00, V200R006C00,S2300 with software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S2700 with software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S5300 with software V100R005C00, V100R006C00, V100R006C01, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S5700 with software V100R005C00, V100R006C00, V100R006C01, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S6300 with software V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R008C00,S6700 with software V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S7700 with software V100R003C00, V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S9300 with software V100R001C00, V100R002C00, V100R003C00, V100R006C00, V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R008C10,S9700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00,Secospace USG6600 V500R001C00SPC050 have a MaxAge LSA vulnerability due to improper OSPF implementation. When the device receives special LSA packets, the LS (Link Status) age would be set to MaxAge, 3600 seconds. An attacker can exploit this vulnerability to poison the route table and launch a DoS attack.",
      },
      {
         lang: "es",
         value: "AC6005 V200R006C10SPC200,AC6605 V200R006C10SPC200,AR1200 con software V200R005C10CP0582T, V200R005C10HP0581T, V200R005C20SPC026T,AR200 con software V200R005C20SPC026T,AR3200 V200R005C20SPC026T,CloudEngine 12800 con software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 5800 con software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 6800 con software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 7800 con software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 8800 con software V100R006C00, V200R001C00,E600 V200R008C00,S12700 con software V200R005C00, V200R006C00, V200R007C00, V200R008C00,S1700 con software V100R006C00, V100R007C00, V200R006C00,S2300 con software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S2700 con software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S5300 con software V100R005C00, V100R006C00, V100R006C01, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S5700 con software V100R005C00, V100R006C00, V100R006C01, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S6300 con software V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R008C00,S6700 con software V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S7700 con software V100R003C00, V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S9300 con software V100R001C00, V100R002C00, V100R003C00, V100R006C00, V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R008C10,S9700 con software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00 y Secospace USG6600 V500R001C00SPC050 tienen una vulnerabilidad MaxAge LSA debido a una implementación OSPF incorrecta. Cuando el dispositivo recibe paquetes LSA especiales, la propiedad age del LS (Link Status) sería igual al de MaxAge, 3600 segundos. Un atacante podría explotar esta vulnerabilidad para envenenar la tabla de rutas y lanzar un ataque de denegación de servicio (Dos).",
      },
   ],
   id: "CVE-2017-8147",
   lastModified: "2024-11-21T03:33:24.850",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2017-11-22T19:29:03.257",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Issue Tracking",
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170720-01-ospf-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170720-01-ospf-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-01-30 17:29
Modified
2024-11-21 02:10
Summary
Multiple heap-based buffer overflows in the eSap software platform in Huawei Campus S9300, S7700, S9700, S5300, S5700, S6300, and S6700 series switches; AR150, AR160, AR200, AR1200, AR2200, AR3200, AR530, NetEngine16EX, SRG1300, SRG2300, and SRG3300 series routers; and WLAN AC6005, AC6605, and ACU2 access controllers allow remote attackers to cause a denial of service (device restart) via a crafted length field in a packet.
Impacted products
Vendor Product Version
huawei s9300_firmware v200r001c00spc300
huawei s9300_firmware v200r002c00spc100
huawei s9300_firmware v200r003c00spc500
huawei s9300 -
huawei s9700_firmware v200r001c00spc300
huawei s9700_firmware v200r002c00spc100
huawei s9700_firmware v200r003c00spc500
huawei s9700 -
huawei s7700_firmware v200r001c00spc300
huawei s7700_firmware v200r002c00spc100
huawei s7700_firmware v200r003c00spc500
huawei s7700 -
huawei s5300_firmware v200r001c00spc300
huawei s5300_firmware v200r002c00spc100
huawei s5300_firmware v200r003c00spc300
huawei s5300 -
huawei s5700_firmware v200r001c00spc300
huawei s5700_firmware v200r002c00spc100
huawei s5700_firmware v200r003c00spc300
huawei s5700 -
huawei s6300_firmware v200r001c00spc300
huawei s6300_firmware v200r002c00spc100
huawei s6300_firmware v200r003c00spc300
huawei s6300 -
huawei s6700_firmware v200r001c00spc300
huawei s6700_firmware v200r002c00spc100
huawei s6700_firmware v200r003c00spc300
huawei s6700 -
huawei ar150_firmware v200r003c00spc100
huawei ar150_firmware v200r003c00spc200
huawei ar150_firmware v200r003c01spc100
huawei ar150_firmware v200r003c01spc300
huawei ar150_firmware v200r003c01spc900
huawei ar150_firmware v200r005c00spc100
huawei ar150_firmware v200r005c00spc200
huawei ar150 -
huawei ar160_firmware v200r003c00spc100
huawei ar160_firmware v200r003c00spc200
huawei ar160_firmware v200r003c01spc100
huawei ar160_firmware v200r003c01spc300
huawei ar160_firmware v200r003c01spc900
huawei ar160_firmware v200r005c00spc100
huawei ar160_firmware v200r005c00spc200
huawei ar160 -
huawei ar200_firmware v200r003c00spc100
huawei ar200_firmware v200r003c00spc200
huawei ar200_firmware v200r003c01spc100
huawei ar200_firmware v200r003c01spc300
huawei ar200_firmware v200r003c01spc900
huawei ar200_firmware v200r005c00spc100
huawei ar200_firmware v200r005c00spc200
huawei ar200 -
huawei ar1200_firmware v200r003c00spc100
huawei ar1200_firmware v200r003c00spc200
huawei ar1200_firmware v200r003c01spc100
huawei ar1200_firmware v200r003c01spc300
huawei ar1200_firmware v200r003c01spc900
huawei ar1200_firmware v200r005c00spc100
huawei ar1200_firmware v200r005c00spc200
huawei ar1200 -
huawei ar2200_firmware v200r003c00spc100
huawei ar2200_firmware v200r003c00spc200
huawei ar2200_firmware v200r003c01spc100
huawei ar2200_firmware v200r003c01spc300
huawei ar2200_firmware v200r003c01spc900
huawei ar2200_firmware v200r005c00spc100
huawei ar2200_firmware v200r005c00spc200
huawei ar2200 -
huawei ar3200_firmware v200r003c00spc100
huawei ar3200_firmware v200r003c00spc200
huawei ar3200_firmware v200r003c01spc100
huawei ar3200_firmware v200r003c01spc300
huawei ar3200_firmware v200r003c01spc900
huawei ar3200_firmware v200r005c00spc100
huawei ar3200_firmware v200r005c00spc200
huawei ar3200 -
huawei ar530_firmware v200r003c00spc100
huawei ar530_firmware v200r003c00spc200
huawei ar530_firmware v200r003c01spc100
huawei ar530_firmware v200r003c01spc300
huawei ar530_firmware v200r003c01spc900
huawei ar530_firmware v200r005c00spc100
huawei ar530_firmware v200r005c00spc200
huawei ar530 -
huawei netengine16ex_firmware v200r003c00spc100
huawei netengine16ex_firmware v200r003c00spc200
huawei netengine16ex_firmware v200r003c01spc100
huawei netengine16ex_firmware v200r003c01spc300
huawei netengine16ex_firmware v200r003c01spc900
huawei netengine16ex_firmware v200r005c00spc100
huawei netengine16ex_firmware v200r005c00spc200
huawei netengine16ex -
huawei srg1300_firmware v200r003c00spc100
huawei srg1300_firmware v200r003c00spc200
huawei srg1300_firmware v200r003c01spc100
huawei srg1300_firmware v200r003c01spc300
huawei srg1300_firmware v200r003c01spc900
huawei srg1300_firmware v200r005c00spc100
huawei srg1300_firmware v200r005c00spc200
huawei srg1300 -
huawei srg2300_firmware v200r003c00spc100
huawei srg2300_firmware v200r003c00spc200
huawei srg2300_firmware v200r003c01spc100
huawei srg2300_firmware v200r003c01spc300
huawei srg2300_firmware v200r003c01spc900
huawei srg2300_firmware v200r005c00spc100
huawei srg2300_firmware v200r005c00spc200
huawei srg2300 -
huawei srg3300_firmware v200r003c00spc100
huawei srg3300_firmware v200r003c00spc200
huawei srg3300_firmware v200r003c01spc100
huawei srg3300_firmware v200r003c01spc300
huawei srg3300_firmware v200r003c01spc900
huawei srg3300_firmware v200r005c00spc100
huawei srg3300_firmware v200r005c00spc200
huawei srg3300 -
huawei wlan_ac6005_firmware v200r003c00spc100
huawei wlan_ac6005_firmware v200r003c00spc200
huawei wlan_ac6005_firmware v200r003c00spc300
huawei wlan_ac6005_firmware v200r003c00spc500
huawei wlan_ac6005_firmware v200r005c00spc100
huawei wlan_ac6005 -
huawei wlan_ac6605_firmware v200r003c00spc100
huawei wlan_ac6605_firmware v200r003c00spc200
huawei wlan_ac6605_firmware v200r003c00spc300
huawei wlan_ac6605_firmware v200r003c00spc500
huawei wlan_ac6605_firmware v200r005c00spc100
huawei wlan_ac6605 -
huawei wlan_acu2_firmware v200r005c00spc100
huawei wlan_acu2 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D1EF10E-F18B-4F3A-AA2B-25003183E19D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "72842130-3B3A-4FD8-8143-556F4048B456",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "78DA2DC7-63B3-40D7-BEC7-AF81066A2733",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4EE71EF-90D8-40C6-9E80-A543ED32E976",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5C9C9CF-A5E1-4461-8B1E-1C572BB3D59A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBDBE325-B6F4-475F-B7F8-F3142F730039",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "07A44DEA-AB17-48F4-87C1-B3B6088BCD82",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "EEBEE7C8-0AB6-4BCE-A2C1-6A4CB4BF68AB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D0B5718-9465-476F-B2FA-FFC6FB08E354",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "93E7A87E-E2FB-4852-9BE5-164822801822",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "647A8737-10F5-4008-8F68-BF8BE4319C56",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D07FB95-7CE7-480A-BF2D-87017EFAE038",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CFEF08E-54C5-4D60-AFF0-37B00D6E2DDD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "121BEE57-945E-4368-8AE4-4A823D70D31C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBC629F6-BF42-4C2B-8CB1-2C4412C8D95A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEC329F7-D83F-4119-B8CA-CC819EC872CB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "7082EE3F-3174-42C2-B010-5078DC752D67",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "58578CA3-392E-4E6D-9B93-E57DC4F44237",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CB0108A-2462-45D6-8A82-8681E8167D6C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA3C8988-A1FC-4B04-9134-F2BDDADEAFB5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AF84CB7-7EC9-4978-A4F6-FD5746AF1CE9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "AFFF09EB-AA08-4204-B028-182933EC9700",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D5033F0-7E4F-431A-B4EA-E5D5D1FCFE5E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "EEBE2B34-CF31-46BB-9901-5296B95FBFF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "38B23B80-2739-47ED-A579-A824236513D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "F93E6A51-0061-4C00-89E4-A29B9B84DE48",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "3661E164-31AE-41A6-B234-0D057B345045",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "872DA1C2-74D5-4CDD-8F7C-F090116DA894",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "4FC8C129-5D9E-4DF3-A678-748786F80174",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "70AADC9F-B269-4854-BD0F-5B8AA399A232",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "526371A8-11FE-4D00-AFBB-8E867A320B27",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDF6DE13-0932-4347-8D32-19CC8BF4B785",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "2129467C-C154-4F05-AFA6-8FC8E4E35219",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "630A1C03-EA2E-4A96-9EC1-B7B8E3002A0F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "B675E367-481F-42C1-A485-ACA0B316D7DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD77CD84-CE15-4216-B5C5-ACD028AA4402",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C2EB57C-6032-4711-9EFA-91C626E79341",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "4182C1FF-262A-421B-9024-AB8004256CDE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "137A007D-A498-483F-8B4F-DCA118B25F11",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C6C7146-3416-43C8-A5B8-ED6C4FF80219",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "F1F36AFE-F13C-4954-87F4-7D1288D06F60",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "222BEEB0-E420-453C-B73C-D53A9CD13683",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE2BAF03-8BF9-442D-8776-458755F102C5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6B91A0-35C2-4012-8386-13F4E196904E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B66285D-66E4-4374-AE1F-E2AC29BBA656",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "91D25CC5-8EF8-41C2-ADAF-6F13125D3EC0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA9F9579-29D2-4C49-92B3-F8A3B6874E6A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "0EF569A6-82D6-4B5B-8CC8-02A285AD4D32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FBFFA36-EE4D-4DB6-85BC-F74103A2E2A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE93B2B8-FCEA-4831-8E17-FC10131A2369",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0E81740-CD29-427B-8B4D-D7BC70102E4D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "4129EE01-D445-4A19-A905-8E508F576D3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCDA5EA6-AB59-4253-8967-26DA1652CD3F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4BA4150-8CA8-48BF-9D45-ABC8AC710060",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "F254A80C-6A4E-4A5F-BEEF-F12AC43E8128",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "22A2F833-98BB-40E9-A5A9-B3B92F0C01E8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0D079CA-9349-4F80-92DC-E350EBC27A9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A5CD805-B40D-48E5-865A-21BB22627A1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "F17BB5B4-077D-4F8E-A3F9-802817E128D7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "46C9D4ED-FC65-495B-95EB-8F904B98606B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "A117033D-5A6F-4CD7-A017-09DDFCD3DDCE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "50662078-4827-4706-AE29-170E2239C5AE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE35DC1B-6F04-4796-850E-EB7311344DBC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "7279FD32-01DE-4CD0-BEA1-622D40F1240D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAC9B725-8D20-476F-B49E-A0E3A82881B7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A08EEE2-52B6-4023-875D-C4D45598B04C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F005EFD-7F00-4A25-804D-BE2E7C88C237",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "ACE31F6A-AE83-4EF4-AED3-49F4E6D687D5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0A674FC-2891-4A81-BB11-BB586A3F8372",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar530_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "26F121C9-1BE9-4734-8B13-B3A54B027B6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar530_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1771F14-BDA7-49C7-9D3D-A302C4C2CA22",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar530_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "13ECBDBC-15B8-475C-A204-9CAD825F4824",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar530_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEB16FD0-D560-4565-923B-B6DC1BE850ED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar530_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5A46497-0365-4F6C-BAAE-5C2D5F80D166",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar530_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "6890F3D6-4692-4316-84E2-32E9CF31C5FE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar530_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B15618E-773C-47BB-9476-8E71E2931769",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar530:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DA0A0C5-5956-424C-AA57-12E9DE30B956",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "4169C33E-ED1E-4824-B700-46DD9AF15404",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "751CB51E-4199-4293-9456-7F1F4D524F3E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0C25FF4-2E02-4C19-836B-FEC277239EE4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "678CDD2F-C220-4D97-96C4-80896EBF9264",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DF6B3C0-2A0F-45AB-A181-CCC24A63C397",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0373872-7A22-4D95-AD86-2C9660F38E08",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "192E86F0-A53E-49CD-9CC6-37C7EC38FB96",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6224ECC-6949-4204-94D1-C7374C142A50",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C8D83A7-4EE9-4219-A60A-27A34BD1728F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D82BBF0-410B-401C-8547-51BEB7D316A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA0607AD-61D1-4CA8-9C88-AEE97CB19001",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "C38C50B3-FED4-477B-9F4B-48272FA4B2F6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "E886101F-0DB8-4F4E-979E-DC4AD9097BDF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "096DB6E6-240F-4147-96F2-B943514E71CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "17AD622B-396B-47F5-8832-F6B4DC5405BC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDEC640B-818D-465D-ADC4-1B04F1CB3003",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "B35A8241-8722-416B-A2B7-58119AC81EBC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "503914FC-703E-44F5-AE7E-DB9B97C8258F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "14B72192-5C81-441A-8788-55127D65D34F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "20F8112E-1892-4705-BF21-1720A1719681",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "595546F2-E729-431E-9CDE-C2E67CD4A02F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "6500362D-D2F0-4363-A406-18D25A53B2B8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BAF601C-B8EC-42F5-95F4-274F8492F57E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E05D6D4-CCA3-429C-B716-EB0E718AF450",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4E1601C-5803-4035-8C59-844E50BC0947",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r003c01spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "B45ECACF-E367-4AC0-8439-7D1B4D4E0A73",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r003c01spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "C6A90D53-A06B-4385-935C-90500A1768BF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r003c01spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "59ACBB59-6FE8-44F9-B2AD-463E0FCC9E1A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE48F320-5E46-4951-BDB6-C5BBAACC6B45",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DF5E8BA-FFB7-4724-A85E-195DCB31A908",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43681AE7-5C12-4772-85A9-0A10177C6CFD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:wlan_ac6005_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "3020A841-8AC7-4683-82CE-420F56507516",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:wlan_ac6005_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "06130B76-14ED-4333-BB1A-3F54883F7730",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:wlan_ac6005_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "A626747D-05B9-4B3D-A1A2-3A14F0CE3E12",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:wlan_ac6005_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCA19134-A9EE-4E99-BF5C-E3CF9C0B8B55",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:wlan_ac6005_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "14D0861B-BED2-4C74-92B7-363FD598B70F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:wlan_ac6005:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF84D689-7852-4441-B73C-D0A7FA9A4E6A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:wlan_ac6605_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB400854-8129-4887-9B45-4EBE31AEE2FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:wlan_ac6605_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1E887F0-EDAC-4839-9BE5-ABCCBDFC0C5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:wlan_ac6605_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "9458DF46-C496-4976-8A08-4C25902F41DE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:wlan_ac6605_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "0EC8DFB3-1576-4491-8A71-754B941B6BB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:wlan_ac6605_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "A34A1F8B-76F9-4419-8B80-8C49BA84732C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:wlan_ac6605:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "251596D6-98C5-4CDF-9808-177AD2E51C15",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:wlan_acu2_firmware:v200r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CB358CA-11A9-4A33-AF9D-6C7D681EC177",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:wlan_acu2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9401915-9621-4C43-A668-E7F0B1487A29",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Multiple heap-based buffer overflows in the eSap software platform in Huawei Campus S9300, S7700, S9700, S5300, S5700, S6300, and S6700 series switches; AR150, AR160, AR200, AR1200, AR2200, AR3200, AR530, NetEngine16EX, SRG1300, SRG2300, and SRG3300 series routers; and WLAN AC6005, AC6605, and ACU2 access controllers allow remote attackers to cause a denial of service (device restart) via a crafted length field in a packet.",
      },
      {
         lang: "es",
         value: "Múltiples desbordamientos de búfer basados en memoria dinámica (heap) en la plataforma de software en los switches Huawei Campus S9300, S7700, S9700, S5300, S5700, S6300 y S6700 series; los routers AR150, AR160, AR200, AR1200, AR2200, AR3200, AR530, NetEngine16EX, SRG1300, SRG2300 y SRG3300 series; y los controladores de acceso WLAN AC6005, AC6605 y ACU2 permiten que atacantes remotos provoquen una denegación de servicio (reinicio del dispositivo) mediante un campo length manipulado en un paquete.",
      },
   ],
   id: "CVE-2014-4705",
   lastModified: "2024-11-21T02:10:45.170",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.8,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-01-30T17:29:00.227",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Permissions Required",
         ],
         url: "http://secunia.com/advisories/59349",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345171.htm",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Permissions Required",
         ],
         url: "http://secunia.com/advisories/59349",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345171.htm",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-119",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:14
Summary
XML parser in Huawei S12700 V200R005C00,S1700 V200R009C00, V200R010C00,S3700 V100R006C03, V100R006C05,S5700 V200R001C00, V200R002C00, V200R003C00, V200R003C02, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S6700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C02, V200R008C00, V200R009C00, V200R010C00,S7700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S9700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,eCNS210_TD V100R004C10, V100R004C10SPC003, V100R004C10SPC100, V100R004C10SPC101, V100R004C10SPC102, V100R004C10SPC200, V100R004C10SPC221, V100R004C10SPC400 has a DOS vulnerability. An attacker may craft specific XML files to the affected products. Due to not check the specially XML file and to parse this file, successful exploit will result in DOS attacks.
Impacted products
Vendor Product Version
huawei s12700_firmware v200r005c00
huawei s12700 -
huawei s1700_firmware v200r009c00
huawei s1700_firmware v200r010c00
huawei s1700 -
huawei s5700_firmware v200r001c00
huawei s5700_firmware v200r002c00
huawei s5700_firmware v200r003c00
huawei s5700_firmware v200r003c02
huawei s5700_firmware v200r005c00
huawei s5700_firmware v200r006c00
huawei s5700_firmware v200r007c00
huawei s5700_firmware v200r008c00
huawei s5700_firmware v200r009c00
huawei s5700_firmware v200r010c00
huawei s5700 -
huawei s6700_firmware v200r001c00
huawei s6700_firmware v200r002c00
huawei s6700_firmware v200r003c00
huawei s6700_firmware v200r005c00
huawei s6700_firmware v200r005c02
huawei s6700_firmware v200r008c00
huawei s6700_firmware v200r009c00
huawei s6700_firmware v200r010c00
huawei s6700 -
huawei s6700_firmware v200r001c00
huawei s6700_firmware v200r002c00
huawei s6700_firmware v200r003c00
huawei s6700_firmware v200r005c00
huawei s6700_firmware v200r005c02
huawei s6700_firmware v200r008c00
huawei s6700_firmware v200r009c00
huawei s6700_firmware v200r010c00
huawei s6700 -
huawei s7700_firmware v200r001c00
huawei s7700_firmware v200r002c00
huawei s7700_firmware v200r003c00
huawei s7700_firmware v200r005c00
huawei s7700_firmware v200r006c00
huawei s7700_firmware v200r007c00
huawei s7700_firmware v200r008c00
huawei s7700_firmware v200r009c00
huawei s7700_firmware v200r010c00
huawei s7700 -
huawei s9700_firmware v200r001c00
huawei s9700_firmware v200r002c00
huawei s9700_firmware v200r003c00
huawei s9700_firmware v200r005c00
huawei s9700_firmware v200r006c00
huawei s9700_firmware v200r007c00
huawei s9700_firmware v200r008c00
huawei s9700_firmware v200r009c00
huawei s9700_firmware v200r010c00
huawei s9700 -
huawei ecns210_td_firmware v100r004c10
huawei ecns210_td_firmware v100r004c10spc003
huawei ecns210_td_firmware v100r004c10spc100
huawei ecns210_td_firmware v100r004c10spc101
huawei ecns210_td_firmware v100r004c10spc102
huawei ecns210_td_firmware v100r004c10spc200
huawei ecns210_td_firmware v100r004c10spc221
huawei ecns210_td_firmware v100r004c10spc400
huawei ecns210_td -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D81469B-EC6C-493D-B632-4DF821A1F304",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F91DC34F-C000-4E51-A70E-38610D31AE53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "099E36B0-125F-4B3F-8D4A-01F8882CF53B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22FE26B5-C6D6-4A6C-8526-ED94F4F57C2C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "336AA440-AEF4-482B-A037-8976DC38BA1A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B2DE9FE-5EC9-462E-86F0-EE772C944DFC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4907FBB8-5157-460D-9240-DD7D610C0FCC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r003c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "2898D6C5-77AB-4C1F-8134-B2DBD13EDB81",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCF23DAE-1215-41B2-88C5-4436D846266C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5973A534-F961-4A97-B20E-994BA28AFE29",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "40745A01-E5AC-4207-A34F-D8E7F7231F83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "21FFF548-FBEF-468A-A8DE-1DB1B7C0B3AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "48B5A9B7-A931-4806-8AC7-302C6CA49CF1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA744621-893C-4F7E-80A1-66559BC6D6F4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B7B7285-F4C6-415C-A948-D7612750A77D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D6DC0AF-017E-41BC-A19D-F9AA055F5224",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "749B68B9-9F62-4E7A-AC86-F4073BA32E18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F18D9776-5CE7-4DD3-9119-7FB08A35B955",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r005c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "898AC16A-8F4E-4709-A3B4-DE74FFB91130",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DA5CF67-A58B-4666-B87E-712507233453",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9EA93B5-01A5-4506-9B0A-993621E6940E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "91E52545-B12E-43EC-B132-28FA2E511316",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B7B7285-F4C6-415C-A948-D7612750A77D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D6DC0AF-017E-41BC-A19D-F9AA055F5224",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "749B68B9-9F62-4E7A-AC86-F4073BA32E18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F18D9776-5CE7-4DD3-9119-7FB08A35B955",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r005c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "898AC16A-8F4E-4709-A3B4-DE74FFB91130",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DA5CF67-A58B-4666-B87E-712507233453",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9EA93B5-01A5-4506-9B0A-993621E6940E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "91E52545-B12E-43EC-B132-28FA2E511316",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F49D3EAD-1EB3-4C62-80BA-4C9C3CE0408C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D75B012-A57D-4C6D-AB26-51D2ECC02F35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1DFF0C0-AA17-4AA1-A418-4759D1A58852",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D84F05D5-BA7D-485B-91C2-273349335CFB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF3FB3CC-2EAC-4A08-BDDC-DCACEE9FA2AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "2377CD30-6F57-46CB-9DD1-E29458A7D928",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D79CD09-3414-4105-AD59-F3D1BAC61B7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB2A3C92-C5C6-4BE6-A9F6-21C28D68C080",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "37E3F87E-EA36-41ED-8793-F6C166FFC4A7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B1F0B3D-1923-42C3-A3DB-03D11BE059D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4FB6ED15-477B-4BB5-AA94-0D7897FBD962",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "06AD9ACA-E0C3-4096-BE50-94E717CDA318",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "325D6523-A07A-48D4-AD44-CF838BD77432",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AC7E622-010C-4C5D-8AA6-D4793AFCE0E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D78DAB13-32AA-4813-AB0A-0EA870F41183",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "36AB80F7-1BD2-4169-AC70-708CE84BB15C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "01A0EC8F-6A8A-487F-A92A-789E3789788F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C6DC309-2FC6-4014-9C2B-8EE12C7BB08F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "30C6245A-D192-4D02-BB4E-285ABD2BB328",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10spc003:*:*:*:*:*:*:*",
                     matchCriteriaId: "26692835-0934-46B9-99F3-16C6C445716C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "A16ED12F-F226-4D51-ACF3-7F0B17E3ECF1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10spc101:*:*:*:*:*:*:*",
                     matchCriteriaId: "22E94D2A-8B69-498F-9326-4973F81BA53B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10spc102:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B4EC75E-9FE1-4E3E-A884-D05EA6BC6DE4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A07D70E-8237-4D0C-BE2A-ABEE76BB78A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10spc221:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A6D1CC-5E68-41DD-B983-44B5070FD71A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10spc400:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC368972-3057-4E2C-BC6A-234AC7A700B2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ecns210_td:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47FCDC81-B742-4D42-BD52-52BBDDDD4BE5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "XML parser in Huawei S12700 V200R005C00,S1700 V200R009C00, V200R010C00,S3700 V100R006C03, V100R006C05,S5700 V200R001C00, V200R002C00, V200R003C00, V200R003C02, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S6700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C02, V200R008C00, V200R009C00, V200R010C00,S7700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S9700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,eCNS210_TD V100R004C10, V100R004C10SPC003, V100R004C10SPC100, V100R004C10SPC101, V100R004C10SPC102, V100R004C10SPC200, V100R004C10SPC221, V100R004C10SPC400 has a DOS vulnerability. An attacker may craft specific XML files to the affected products. Due to not check the specially XML file and to parse this file, successful exploit will result in DOS attacks.",
      },
      {
         lang: "es",
         value: "El analizador XML en Huawei S12700 V200R005C00,S1700 V200R009C00, V200R010C00,S3700 V100R006C03, V100R006C05,S5700 V200R001C00, V200R002C00, V200R003C00, V200R003C02, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S6700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C02, V200R008C00, V200R009C00, V200R010C00,S7700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S9700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,eCNS210_TD V100R004C10, V100R004C10SPC003, V100R004C10SPC100, V100R004C10SPC101, V100R004C10SPC102, V100R004C10SPC200, V100R004C10SPC221 y V100R004C10SPC400 tiene una vulnerabilidad de denegación de servicio. Un atacante podría manipular archivos XML específicos para los productos afectados. Dado que no se comprueba este archivo XML, al analizarlo se podría provocar un ataque DOS.",
      },
   ],
   id: "CVE-2017-15333",
   lastModified: "2024-11-21T03:14:29.053",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 4.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 1,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-02-15T16:29:00.423",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-xml-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-xml-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2016-04-14 15:59
Modified
2024-11-21 02:38
Summary
Memory leak in Huawei S5300EI, S5300SI, S5310HI, S6300EI/ S2350EI, and S5300LI Campus series switches with software V200R001C00 before V200R001SPH018, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; S9300, S7700, and S9700 Campus series switches with software V200R001C00 before V200R001SPH023, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote attackers to cause a denial of service (memory consumption and reboot) via a large number of ICMPv6 packets.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s2350ei_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "39008864-1F6B-41B1-A07B-9F5227669ECF",
                     versionEndExcluding: "v200r001sph018",
                     versionStartIncluding: "v200r001c00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2350ei_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B1457C7-F741-4A7B-B4D8-126190A0B870",
                     versionEndExcluding: "v200r003sph011",
                     versionStartIncluding: "v200r002c00",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s2350ei:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A8844AD-71F1-4139-B6CA-5534942DA424",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5300ei_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "19788976-18BB-4B7A-AE46-558C779A9F2C",
                     versionEndExcluding: "v200r001sph018",
                     versionStartIncluding: "v200r001c00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300ei_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7245FC5C-EF30-48A0-9294-4F61A1F784AE",
                     versionEndExcluding: "v200r003sph011",
                     versionStartIncluding: "v200r002c00",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5300ei:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "438F46FA-6373-4323-B2C6-F4D6CFABD675",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5300si_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1818A8DD-58A0-41B2-9E8B-EC1851784654",
                     versionEndExcluding: "v200r001sph018",
                     versionStartIncluding: "v200r001c00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300si_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F77856A0-E46B-4492-8C9F-5B5FEEFEDCED",
                     versionEndExcluding: "v200r003sph011",
                     versionStartIncluding: "v200r002c00",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5300si:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "498B6006-41C9-4853-8CCD-1A3A122FAB51",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5310hi_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "57D589CC-550B-4C9E-827C-3F745B9E86C5",
                     versionEndExcluding: "v200r001sph018",
                     versionStartIncluding: "v200r001c00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5310hi_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9932CAA1-D2DA-4DB5-9068-36A3F8B99558",
                     versionEndExcluding: "v200r003sph011",
                     versionStartIncluding: "v200r002c00",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5310hi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D72B3B4B-1B7A-486C-A8BD-662390D585EB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6300ei_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "13FEE8AC-82C1-45A1-AEEA-90DA113B28FC",
                     versionEndExcluding: "v200r001sph018",
                     versionStartIncluding: "v200r001c00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300ei_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4B767F3-90A5-4B2D-BAA1-8FA0FC0A3FA0",
                     versionEndExcluding: "v200r003sph011",
                     versionStartIncluding: "v200r002c00",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6300ei:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC63D2FE-F8BB-4A20-8DD6-801A12C06F7C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5300li_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9E6FE64-24E7-4126-81EB-CEDD5552CA69",
                     versionEndExcluding: "v200r001sph018",
                     versionStartIncluding: "v200r001c00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300li_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "149C309F-27C3-4B91-B83D-1A6D3877BB41",
                     versionEndExcluding: "v200r003sph011",
                     versionStartIncluding: "v200r002c00",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5300li:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3696874A-E462-482F-8CA4-4FAC37C8641E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2218055E-B6F7-4C63-AA46-3563C4F9546A",
                     versionEndExcluding: "v200r001sph023",
                     versionStartIncluding: "v200r001c00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE336196-B997-4613-A21B-6E543C12BFD6",
                     versionEndExcluding: "v200r003c00",
                     versionStartIncluding: "v200r002c00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "473B6E52-E60F-4D3C-9028-E362DF2A8327",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9D64809-AD3A-4057-ABE6-EA53556F894A",
                     versionEndExcluding: "v200r001sph023",
                     versionStartIncluding: "v200r001c00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C2A6DC9F-6B9A-4A9B-AA9D-E50C45675C36",
                     versionEndExcluding: "v200r003c00",
                     versionStartIncluding: "v200r002c00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1DFF0C0-AA17-4AA1-A418-4759D1A58852",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5961FF81-109C-4CF8-942D-ED9908981B69",
                     versionEndExcluding: "v200r001sph023",
                     versionStartIncluding: "v200r001c00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3DA3D055-9991-44A6-A250-C5119BF95857",
                     versionEndExcluding: "v200r003c00",
                     versionStartIncluding: "v200r002c00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "06AD9ACA-E0C3-4096-BE50-94E717CDA318",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2D6DD87-D00C-4AB9-AC7F-BCF066DF6030",
                     versionEndExcluding: "v100r006sph022",
                     versionStartIncluding: "v100r006c05",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "17566603-275F-4E6B-B5D9-4A716EEC03DC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s3300_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB47AE0C-67AA-4605-B1F2-C51065C8786F",
                     versionEndExcluding: "v100r006sph022",
                     versionStartIncluding: "v100r006c05",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s3300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A1410A1-ADCC-474F-ABEE-F0FE48E4CD7A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Memory leak in Huawei S5300EI, S5300SI, S5310HI, S6300EI/ S2350EI, and S5300LI Campus series switches with software V200R001C00 before V200R001SPH018, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; S9300, S7700, and S9700 Campus series switches with software V200R001C00 before V200R001SPH023, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote attackers to cause a denial of service (memory consumption and reboot) via a large number of ICMPv6 packets.",
      },
      {
         lang: "es",
         value: "Fuga de memoria en switches Huawei de la serie Campus S5300EI, S5300SI, S5310HI, S6300EI/ S2350EI y S5300LI con software V200R001C00 en versiones anteriores a V200R001SPH018, V200R002C00 en versiones anteriores a V200R003SPH011 y V200R003C00 en versiones anteriores a V200R003SPH011; switches de la serie Campus S9300, S7700 y S9700 con software V200R001C00 en versiones anteriores a V200R001SPH023, V200R002C00 en versiones anteriores a V200R003SPH011 y V200R003C00 en versiones anteriores a V200R003SPH011; y switches de la serie Campus S2300 y S3300 con software V100R006C05 en versiones anteriores a V100R006SPH022 permite a atacantes remotos causar una denegación de servicio (consumo de memoria y reinicio) a través de un gran número de paquetes ICMPv6.",
      },
   ],
   id: "CVE-2015-8676",
   lastModified: "2024-11-21T02:38:56.983",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.8,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2016-04-14T15:59:02.980",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-02-switch-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-02-switch-en",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-119",
            },
            {
               lang: "en",
               value: "CWE-399",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-10-27 01:15
Modified
2024-11-21 06:14
Summary
There is an out of bounds write vulnerability in some Huawei products. The vulnerability is caused by a function of a module that does not properly verify input parameter. Successful exploit could cause out of bounds write leading to a denial of service condition.Affected product versions include:IPS Module V500R005C00,V500R005C20;NGFW Module V500R005C00;NIP6600 V500R005C00,V500R005C20;S12700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600,V200R013C00SPC500,V200R019C00SPC200,V200R019C00SPC500,V200R019C10SPC200,V200R020C00,V200R020C10;S1700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S2700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S5700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600,V200R019C00SPC500;S6700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S7700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600;S9700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;USG9500 V500R005C00,V500R005C20.
Impacted products
Vendor Product Version
huawei ips_module_firmware v500r005c00
huawei ips_module_firmware v500r005c20
huawei ips_module -
huawei ngfw_module_firmware v500r005c00
huawei ngfw_module -
huawei nip6600_firmware v500r005c00
huawei nip6600_firmware v500r005c20
huawei nip6600 -
huawei s12700_firmware v200r010c00spc600
huawei s12700_firmware v200r011c10spc500
huawei s12700_firmware v200r011c10spc600
huawei s12700_firmware v200r013c00spc500
huawei s12700_firmware v200r019c00spc200
huawei s12700_firmware v200r019c00spc500
huawei s12700_firmware v200r019c10spc200
huawei s12700_firmware v200r020c00
huawei s12700_firmware v200r020c10
huawei s12700 -
huawei s1700_firmware v200r010c00spc600
huawei s1700_firmware v200r011c10spc500
huawei s1700_firmware v200r011c10spc600
huawei s1700 -
huawei s2700_firmware v200r010c00spc600
huawei s2700_firmware v200r011c10spc500
huawei s2700_firmware v200r011c10spc600
huawei s2700 -
huawei s5700_firmware v200r010c00spc600
huawei s5700_firmware v200r010c00spc700
huawei s5700_firmware v200r011c10spc500
huawei s5700_firmware v200r011c10spc600
huawei s5700_firmware v200r019c00spc500
huawei s5700 -
huawei s6700_firmware v200r010c00spc600
huawei s6700_firmware v200r011c10spc500
huawei s6700_firmware v200r011c10spc600
huawei s6700 -
huawei s7700_firmware v200r010c00spc600
huawei s7700_firmware v200r010c00spc700
huawei s7700_firmware v200r011c10spc500
huawei s7700_firmware v200r011c10spc600
huawei s7700 -
huawei s9700_firmware v200r010c00spc600
huawei s9700_firmware v200r011c10spc500
huawei s9700_firmware v200r011c10spc600
huawei s9700 -
huawei usg9500_firmware v500r005c00
huawei usg9500_firmware v500r005c20
huawei usg9500 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "60A9007D-D6AD-4DB9-A0AC-1E400AEC0884",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r005c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A91B37BC-F4FD-499A-918E-6396251A0F5F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D57DC59-B234-463F-8BBD-631B7EE9928C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9AC093ED-A979-4484-B758-1C16DF2D6030",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r005c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FEB99CA-7B73-4633-9F9C-9AF54B0A43FA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r010c00spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "975CEC1E-D82C-45AD-B920-80961221C0BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r011c10spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9824CC2-7B77-4FD7-9509-49FA0D94AF4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r011c10spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "0442199D-AF21-44E8-B604-7D64129FD25D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r013c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "2836F054-A1CD-4B9C-9D4E-7DD198ED6004",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r019c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2ED767D-2826-4ECD-8C59-B688AC54B0CD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r019c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A58127B-8ED8-49AD-83CE-AF95E221E092",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r019c10spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "A630BDAD-C254-4107-9593-1E9FB415C138",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r020c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B11D63D0-072D-4E44-B254-491974603C7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r020c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "913DDCCC-0A91-458D-8A74-E4B9E9A71EC7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r010c00spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "0FCC64B5-1BB4-4A4B-983F-D1D986CA506E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r011c10spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "32CA1299-EA8A-4A24-96AA-DC3C5C3B9701",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r011c10spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "20386C76-4480-47ED-99AD-7ADBE41C3364",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22FE26B5-C6D6-4A6C-8526-ED94F4F57C2C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r010c00spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "4676DA03-36A6-40B1-BA74-75260083D10A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r011c10spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9C4217C-0FBB-46BC-B108-F53A2AF259E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r011c10spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "744381A0-4E85-4F0C-881B-DF2F7E1DB186",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD2CD071-58E4-4061-8217-990453213470",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r010c00spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D60424B-15CE-415E-8E6C-34E5DC52E6C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r010c00spc700:*:*:*:*:*:*:*",
                     matchCriteriaId: "46FDAD12-710C-4FE1-950F-B57810649C16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r011c10spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "F402F7DA-6BDF-4C53-B33B-3D8FE1B14506",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r011c10spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "238025D5-0E08-4708-BA6D-6E6560814525",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r019c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "35753856-3BE4-481C-8D49-077E51138633",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r010c00spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAA552D9-B8ED-4DD9-B825-FDB42F7070E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r011c10spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "83AE1FCE-5E38-4436-96B9-57DE026BDE7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r011c10spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F2F0768-EE4C-408B-8FDD-87CBC4970688",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r010c00spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "8030D59B-D7AC-4155-B23C-0E77603F9DEB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r010c00spc700:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC7D191A-1496-4A38-BD9B-4222A9CA31BE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r011c10spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4342AD2-7764-4447-9341-78DF30E20416",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r011c10spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "37C57D09-618F-44B0-86A8-5BAC25CA486F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r010c00spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD82D614-9515-4A9C-B96A-2614DDADEB7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r011c10spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "B45A35D3-D5CE-40F1-ABC2-9A9E6FA8FE46",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r011c10spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "234ED4C3-67B4-4B0E-8EA1-9A70CAAD2BCF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E961C6AA-400A-41CF-A230-FE7182875F1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "31F8A14F-8956-493C-8062-EAB872AD0420",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "There is an out of bounds write vulnerability in some Huawei products. The vulnerability is caused by a function of a module that does not properly verify input parameter. Successful exploit could cause out of bounds write leading to a denial of service condition.Affected product versions include:IPS Module V500R005C00,V500R005C20;NGFW Module V500R005C00;NIP6600 V500R005C00,V500R005C20;S12700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600,V200R013C00SPC500,V200R019C00SPC200,V200R019C00SPC500,V200R019C10SPC200,V200R020C00,V200R020C10;S1700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S2700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S5700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600,V200R019C00SPC500;S6700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S7700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600;S9700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;USG9500 V500R005C00,V500R005C20.",
      },
      {
         lang: "es",
         value: "Se presenta una vulnerabilidad de escritura fuera de límites en algunos productos de Huawei. La vulnerabilidad está causada por una función de un módulo que no verifica correctamente el parámetro input. Una explotación con éxito podría causar una escritura fuera de límites conllevando a una condición de denegación de servicio. Las versiones de producto afectadas incluyen: Módulo IPS V500R005C00,V500R005C20;Módulo NGFW V500R005C00;NIP6600 V500R005C00,V500R005C20; S12700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600,V200R013C00SPC500,V200R019C00SPC200,V200R019C00SPC500,V200R019C10SPC200,V200R020C00,V200R020C10; S1700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S2700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600; S5700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600,V200R019C00SPC500;S6700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600; S7700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600;S9700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;USG9500 V500R005C00,V500R005C20",
      },
   ],
   id: "CVE-2021-37129",
   lastModified: "2024-11-21T06:14:42.100",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-10-27T01:15:07.763",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-outofwrite-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-outofwrite-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-03-05 19:29
Modified
2024-11-21 03:17
Summary
PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a null pointer reference vulnerability due to insufficient verification. An authenticated local attacker calls PEM decoder with special parameter which could cause a denial of service.
Impacted products
Vendor Product Version
huawei dp300_firmware v500r002c00
huawei dp300 -
huawei ips_module_firmware v500r001c00
huawei ips_module_firmware v500r001c30
huawei ips_module -
huawei ngfw_module_firmware v500r001c00
huawei ngfw_module_firmware v500r002c00
huawei ngfw_module -
huawei nip6300_firmware v500r001c00
huawei nip6300_firmware v500r001c30
huawei nip6300 -
huawei nip6600_firmware v500r001c00
huawei nip6600_firmware v500r001c30
huawei nip6600 -
huawei rp200_firmware v500r002c00
huawei rp200_firmware v600r006c00
huawei rp200 -
huawei s12700_firmware v200r007c00
huawei s12700_firmware v200r007c01
huawei s12700_firmware v200r008c00
huawei s12700_firmware v200r009c00
huawei s12700_firmware v200r010c00
huawei s12700 -
huawei s1700_firmware v200r006c10
huawei s1700_firmware v200r009c00
huawei s1700_firmware v200r010c00
huawei s1700 -
huawei s2700_firmware v200r006c10
huawei s2700_firmware v200r007c00
huawei s2700_firmware v200r008c00
huawei s2700_firmware v200r009c00
huawei s2700_firmware v200r010c00
huawei s2700 -
huawei s5700_firmware v200r006c00
huawei s5700_firmware v200r007c00
huawei s5700_firmware v200r008c00
huawei s5700_firmware v200r009c00
huawei s5700_firmware v200r010c00
huawei s5700 -
huawei s6700_firmware v200r008c00
huawei s6700_firmware v200r009c00
huawei s6700_firmware v200r010c00
huawei s6700 -
huawei s7700_firmware v200r007c00
huawei s7700_firmware v200r008c00
huawei s7700_firmware v200r009c00
huawei s7700_firmware v200r010c00
huawei s7700 -
huawei s9700_firmware v200r007c00
huawei s9700_firmware v200r007c01
huawei s9700_firmware v200r008c00
huawei s9700_firmware v200r009c00
huawei s9700_firmware v200r010c00
huawei s9700 -
huawei secospace_usg6300_firmware v500r001c00
huawei secospace_usg6300_firmware v500r001c30
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v500r001c00
huawei secospace_usg6500_firmware v500r001c30
huawei secospace_usg6500 -
huawei secospace_usg6600_firmware v500r001c00
huawei secospace_usg6600_firmware v500r001c30s
huawei secospace_usg6600 -
huawei te30_firmware v100r001c02
huawei te30_firmware v100r001c10
huawei te30_firmware v500r002c00
huawei te30_firmware v600r006c00
huawei te30 -
huawei te40_firmware v500r002c00
huawei te40_firmware v600r006c00
huawei te40 -
huawei te50_firmware v500r002c00
huawei te50_firmware v600r006c00
huawei te50 -
huawei te60_firmware v100r001c02
huawei te60_firmware v100r001c10
huawei te60_firmware v500r002c00
huawei te60_firmware v600r006c00
huawei te60 -
huawei tp3106_firmware v100r002c00
huawei tp3106 -
huawei tp3206_firmware v100r002c00
huawei tp3206_firmware v100r002c10
huawei tp3206 -
huawei usg9500_firmware v500r001c00
huawei usg9500_firmware v500r001c30
huawei usg9500 -
huawei viewpoint_9030_firmware v100r011c02
huawei viewpoint_9030_firmware v100r011c03
huawei viewpoint_9030 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "16C1ED34-BC94-4AAC-ADF4-5FCD637E5B4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "67731A77-1DD4-49B2-B437-2850C9583750",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "98275088-2FBE-42F4-AAEC-DF02950B803D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "10CBC93B-5CF6-45BF-A90A-84B7693E27FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC4803A7-44B2-41BA-814D-151239B92CEF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD4C5CC9-FD60-4C64-8F88-CFC71BBEA663",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B17A34EF-677D-4264-82FB-F7F582C9F56B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "933755CC-4A0B-42FB-9491-3C841059851D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "410E8DAA-E961-46E1-96E2-3AC4B40D8359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F91DC34F-C000-4E51-A70E-38610D31AE53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "099E36B0-125F-4B3F-8D4A-01F8882CF53B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22FE26B5-C6D6-4A6C-8526-ED94F4F57C2C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC1D26AA-09DF-49DA-930F-A2EAEA486361",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E364889D-CDEE-4D8C-82E5-6D5BC3DD768A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB8FC67E-DFD3-482E-B7D6-17464885B8DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6F69BC3-E6C0-4E70-AC13-D79D840579DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5561195B-7385-4175-9D29-77E95E4E9AB6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD2CD071-58E4-4061-8217-990453213470",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5973A534-F961-4A97-B20E-994BA28AFE29",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "40745A01-E5AC-4207-A34F-D8E7F7231F83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "21FFF548-FBEF-468A-A8DE-1DB1B7C0B3AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "48B5A9B7-A931-4806-8AC7-302C6CA49CF1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA744621-893C-4F7E-80A1-66559BC6D6F4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DA5CF67-A58B-4666-B87E-712507233453",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9EA93B5-01A5-4506-9B0A-993621E6940E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "91E52545-B12E-43EC-B132-28FA2E511316",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "2377CD30-6F57-46CB-9DD1-E29458A7D928",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D79CD09-3414-4105-AD59-F3D1BAC61B7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB2A3C92-C5C6-4BE6-A9F6-21C28D68C080",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "37E3F87E-EA36-41ED-8793-F6C166FFC4A7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D78DAB13-32AA-4813-AB0A-0EA870F41183",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "38515A04-EC21-40B3-A29C-8D0A5883EA4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "36AB80F7-1BD2-4169-AC70-708CE84BB15C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "01A0EC8F-6A8A-487F-A92A-789E3789788F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C6DC309-2FC6-4014-9C2B-8EE12C7BB08F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30s:*:*:*:*:*:*:*",
                     matchCriteriaId: "18553F87-9928-4AE8-87D5-EB8014999E62",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "60DB85A7-54F1-4726-9D9C-07CC35621C19",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "492DABB3-66CF-47E9-92D4-518154559A7C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8C4071A-502F-46E4-80FF-C6647161A178",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a null pointer reference vulnerability due to insufficient verification. An authenticated local attacker calls PEM decoder with special parameter which could cause a denial of service.",
      },
      {
         lang: "es",
         value: "El módulo PEM de Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 tiene una vulnerabilidad de referencia de puntero null debido a la verificación insuficiente. Un atacante local autenticado llama al descodificador PEM con un parámetro especial, lo que podría provocar una denegación de servicio (DoS).",
      },
   ],
   id: "CVE-2017-17135",
   lastModified: "2024-11-21T03:17:33.207",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 2.1,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-03-05T19:29:00.427",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-476",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-03-05 19:29
Modified
2024-11-21 03:17
Summary
PEM module of DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a DoS vulnerability in PEM module of Huawei products due to insufficient verification. An authenticated local attacker can make processing into deadloop by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service.
Impacted products
Vendor Product Version
huawei dp300_firmware v500r002c00
huawei dp300 -
huawei ips_module_firmware v500r001c00
huawei ips_module_firmware v500r001c30
huawei ips_module -
huawei ngfw_module_firmware v500r001c00
huawei ngfw_module_firmware v500r002c00
huawei ngfw_module -
huawei nip6300_firmware v500r001c00
huawei nip6300_firmware v500r001c30
huawei nip6300 -
huawei nip6600_firmware v500r001c00
huawei nip6600_firmware v500r001c30
huawei nip6600 -
huawei rp200_firmware v500r002c00
huawei rp200_firmware v600r006c00
huawei rp200 -
huawei s12700_firmware v200r007c00
huawei s12700_firmware v200r007c01
huawei s12700_firmware v200r008c00
huawei s12700_firmware v200r009c00
huawei s12700_firmware v200r010c00
huawei s12700 -
huawei s1700_firmware v200r006c10
huawei s1700_firmware v200r009c00
huawei s1700_firmware v200r010c00
huawei s1700 -
huawei s2700_firmware v200r006c10
huawei s2700_firmware v200r007c00
huawei s2700_firmware v200r008c00
huawei s2700_firmware v200r009c00
huawei s2700_firmware v200r010c00
huawei s2700 -
huawei s5700_firmware v200r006c00
huawei s5700_firmware v200r007c00
huawei s5700_firmware v200r008c00
huawei s5700_firmware v200r009c00
huawei s5700_firmware v200r010c00
huawei s5700 -
huawei s6700_firmware v200r008c00
huawei s6700_firmware v200r009c00
huawei s6700_firmware v200r010c00
huawei s6700 -
huawei s7700_firmware v200r007c00
huawei s7700_firmware v200r008c00
huawei s7700_firmware v200r009c00
huawei s7700_firmware v200r010c00
huawei s7700 -
huawei s9700_firmware v200r007c00
huawei s9700_firmware v200r007c01
huawei s9700_firmware v200r008c00
huawei s9700_firmware v200r009c00
huawei s9700_firmware v200r010c00
huawei s9700 -
huawei secospace_usg6300_firmware v500r001c00
huawei secospace_usg6300_firmware v500r001c30
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v500r001c00
huawei secospace_usg6500_firmware v500r001c30
huawei secospace_usg6500 -
huawei secospace_usg6600_firmware v500r001c00
huawei secospace_usg6600_firmware v500r001c30s
huawei secospace_usg6600 -
huawei te30_firmware v100r001c02
huawei te30_firmware v100r001c10
huawei te30_firmware v500r002c00
huawei te30_firmware v600r006c00
huawei te30 -
huawei te40_firmware v500r002c00
huawei te40_firmware v600r006c00
huawei te40 -
huawei te50_firmware v500r002c00
huawei te50_firmware v600r006c00
huawei te50 -
huawei te60_firmware v100r001c02
huawei te60_firmware v100r001c10
huawei te60_firmware v500r002c00
huawei te60_firmware v600r006c00
huawei te60 -
huawei tp3106_firmware v100r002c00
huawei tp3106 -
huawei tp3206_firmware v100r002c00
huawei tp3206_firmware v100r002c10
huawei tp3206 -
huawei usg9500_firmware v500r001c00
huawei usg9500_firmware v500r001c30
huawei usg9500 -
huawei viewpoint_9030_firmware v100r011c02
huawei viewpoint_9030_firmware v100r011c03
huawei viewpoint_9030 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "16C1ED34-BC94-4AAC-ADF4-5FCD637E5B4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "67731A77-1DD4-49B2-B437-2850C9583750",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "98275088-2FBE-42F4-AAEC-DF02950B803D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "10CBC93B-5CF6-45BF-A90A-84B7693E27FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC4803A7-44B2-41BA-814D-151239B92CEF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD4C5CC9-FD60-4C64-8F88-CFC71BBEA663",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B17A34EF-677D-4264-82FB-F7F582C9F56B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "933755CC-4A0B-42FB-9491-3C841059851D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "410E8DAA-E961-46E1-96E2-3AC4B40D8359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F91DC34F-C000-4E51-A70E-38610D31AE53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "099E36B0-125F-4B3F-8D4A-01F8882CF53B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22FE26B5-C6D6-4A6C-8526-ED94F4F57C2C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC1D26AA-09DF-49DA-930F-A2EAEA486361",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E364889D-CDEE-4D8C-82E5-6D5BC3DD768A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB8FC67E-DFD3-482E-B7D6-17464885B8DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6F69BC3-E6C0-4E70-AC13-D79D840579DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5561195B-7385-4175-9D29-77E95E4E9AB6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD2CD071-58E4-4061-8217-990453213470",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5973A534-F961-4A97-B20E-994BA28AFE29",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "40745A01-E5AC-4207-A34F-D8E7F7231F83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "21FFF548-FBEF-468A-A8DE-1DB1B7C0B3AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "48B5A9B7-A931-4806-8AC7-302C6CA49CF1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA744621-893C-4F7E-80A1-66559BC6D6F4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DA5CF67-A58B-4666-B87E-712507233453",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9EA93B5-01A5-4506-9B0A-993621E6940E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "91E52545-B12E-43EC-B132-28FA2E511316",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "2377CD30-6F57-46CB-9DD1-E29458A7D928",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D79CD09-3414-4105-AD59-F3D1BAC61B7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB2A3C92-C5C6-4BE6-A9F6-21C28D68C080",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "37E3F87E-EA36-41ED-8793-F6C166FFC4A7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D78DAB13-32AA-4813-AB0A-0EA870F41183",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "38515A04-EC21-40B3-A29C-8D0A5883EA4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "36AB80F7-1BD2-4169-AC70-708CE84BB15C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "01A0EC8F-6A8A-487F-A92A-789E3789788F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C6DC309-2FC6-4014-9C2B-8EE12C7BB08F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30s:*:*:*:*:*:*:*",
                     matchCriteriaId: "18553F87-9928-4AE8-87D5-EB8014999E62",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "60DB85A7-54F1-4726-9D9C-07CC35621C19",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "492DABB3-66CF-47E9-92D4-518154559A7C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8C4071A-502F-46E4-80FF-C6647161A178",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "PEM module of DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a DoS vulnerability in PEM module of Huawei products due to insufficient verification. An authenticated local attacker can make processing into deadloop by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service.",
      },
      {
         lang: "es",
         value: "El módulo PEM de DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 de Huawei tiene una vulnerabilidad de denegación de servicio (DoS) debido a la verificación insuficiente. Un atacante local autenticado puede provocar que el proceso entre en un deadloop mediante certificados maliciosos. El atacante puede explotar esta vulnerabilidad para provocar una denegación de servicio.",
      },
   ],
   id: "CVE-2017-17138",
   lastModified: "2024-11-21T03:17:33.680",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 2.1,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-03-05T19:29:00.580",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-01-08 19:29
Modified
2024-11-21 02:11
Summary
Multiple Huawei Campus switches allow remote attackers to enumerate usernames via vectors involving use of SSH by the maintenance terminal.
Impacted products
Vendor Product Version
huawei s9300_firmware v200r001c00spc300
huawei s9300_firmware v200r002c00spc300
huawei s9300_firmware v200r003c00spc500
huawei s9300 -
huawei s9300e_firmware v200r001c00spc300
huawei s9300e_firmware v200r002c00spc300
huawei s9300e_firmware v200r003c00spc500
huawei s9300e -
huawei s7700_firmware v200r001c00spc300
huawei s7700_firmware v200r002c00spc300
huawei s7700_firmware v200r003c00spc500
huawei s7700 -
huawei s9700_firmware v200r001c00spc300
huawei s9700_firmware v200r002c00spc300
huawei s9700_firmware v200r003c00spc500
huawei s9700 -
huawei s5700_firmware v200r001c00spc300
huawei s5700_firmware v200r002c00spc300
huawei s5700_firmware v200r003c00spc300
huawei s5700 -
huawei s6700_firmware v200r001c00spc300
huawei s6700_firmware v200r002c00spc300
huawei s6700_firmware v200r003c00spc300
huawei s6700 -
huawei s5300_firmware v200r001c00spc300
huawei s5300_firmware v200r002c00spc300
huawei s5300_firmware v200r003c00spc300
huawei s5300 -
huawei s6300_firmware v200r001c00spc300
huawei s6300_firmware v200r002c00spc300
huawei s6300_firmware v200r003c00spc300
huawei s6300 -
huawei s2300_firmware v100r006c05
huawei s2300 -
huawei s2700_firmware v100r006c05
huawei s2700 -
huawei s3300_firmware v100r006c05
huawei s3300 -
huawei s3700_firmware v100r006c05
huawei s3700 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D1EF10E-F18B-4F3A-AA2B-25003183E19D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "54D5B323-BFB3-4A0A-B1E1-37E4DC4FF984",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "78DA2DC7-63B3-40D7-BEC7-AF81066A2733",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9300e_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB3FA8B2-A788-408C-AD24-AE5BA2501139",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300e_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F3D1698-CBF3-4C2C-B581-343FBD8E8831",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300e_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "E5752E4C-4B7D-4139-BCAE-7F52D4A235F4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9300e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B913A258-48B6-45D0-A37B-2C665DCA735C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "07A44DEA-AB17-48F4-87C1-B3B6088BCD82",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD36DBAD-B0A9-4A16-AE6A-D3949A1764D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D0B5718-9465-476F-B2FA-FFC6FB08E354",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4EE71EF-90D8-40C6-9E80-A543ED32E976",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "8C2BF2B6-915B-4F57-8C75-CD09612985F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBDBE325-B6F4-475F-B7F8-F3142F730039",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "121BEE57-945E-4368-8AE4-4A823D70D31C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "A802134B-7EC8-4935-878A-4DCD730BCD4E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEC329F7-D83F-4119-B8CA-CC819EC872CB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AF84CB7-7EC9-4978-A4F6-FD5746AF1CE9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "279D9CE4-AAEF-4EFC-8340-668CFCF47717",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D5033F0-7E4F-431A-B4EA-E5D5D1FCFE5E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "93E7A87E-E2FB-4852-9BE5-164822801822",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA5C970C-03B5-4757-B3B8-34CF1DFC3482",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D07FB95-7CE7-480A-BF2D-87017EFAE038",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CFEF08E-54C5-4D60-AFF0-37B00D6E2DDD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "7082EE3F-3174-42C2-B010-5078DC752D67",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "73796844-B30E-4040-AF4E-105AB6BA357F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CB0108A-2462-45D6-8A82-8681E8167D6C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA3C8988-A1FC-4B04-9134-F2BDDADEAFB5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s2300_firmware:v100r006c05:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B863F3A-38C5-4E36-8E71-713B12EE6889",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "17566603-275F-4E6B-B5D9-4A716EEC03DC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v100r006c05:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA7D9357-D179-4B24-A073-17BA09AEC7E9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD2CD071-58E4-4061-8217-990453213470",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s3300_firmware:v100r006c05:*:*:*:*:*:*:*",
                     matchCriteriaId: "3DBB1A49-B169-40F4-B611-C739896A2A71",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s3300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A1410A1-ADCC-474F-ABEE-F0FE48E4CD7A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s3700_firmware:v100r006c05:*:*:*:*:*:*:*",
                     matchCriteriaId: "021F224A-F28F-4192-883C-8A75898BEA84",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s3700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B7F84390-E120-406B-967D-B473EB110EA9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Multiple Huawei Campus switches allow remote attackers to enumerate usernames via vectors involving use of SSH by the maintenance terminal.",
      },
      {
         lang: "es",
         value: "Múltiples switches Huawei Campus permiten que los atacantes remotos enumeren los nombres de usuario mediante vectores que involucren el uso de SSH por el terminal de mantenimiento.",
      },
   ],
   id: "CVE-2014-5394",
   lastModified: "2024-11-21T02:11:58.220",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.9,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.0",
            },
            exploitabilityScore: 2.2,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-01-08T19:29:00.610",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/us/psirt/security-advisories/2014/hw-362701",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/69302",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/97763",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/us/psirt/security-advisories/2014/hw-362701",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/69302",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/97763",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-200",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-04-11 17:29
Modified
2024-11-21 03:14
Summary
S12700 V200R005C00, V200R006C00, V200R006C01, V200R007C00, V200R007C01, V200R007C20, V200R008C00, V200R008C06, V200R009C00, V200R010C00, S7700 V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R006C01, V200R007C00, V200R007C01, V200R008C00, V200R008C06, V200R009C00, V200R010C00, S9700 V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R006C01, V200R007C00, V200R007C01, V200R008C00, V200R009C00, V200R010C00 have an improper authorization vulnerability on Huawei switch products. The system incorrectly performs an authorization check when a normal user attempts to access certain information which is supposed to be accessed only by authenticated user. Successful exploit could cause information disclosure.
Impacted products
Vendor Product Version
huawei s12700_firmware v200r005c00
huawei s12700_firmware v200r006c00
huawei s12700_firmware v200r006c01
huawei s12700_firmware v200r007c00
huawei s12700_firmware v200r007c01
huawei s12700_firmware v200r007c20
huawei s12700_firmware v200r008c00
huawei s12700_firmware v200r008c06
huawei s12700_firmware v200r009c00
huawei s12700_firmware v200r010c00
huawei s12700 -
huawei s7700_firmware v200r001c00
huawei s7700_firmware v200r001c01
huawei s7700_firmware v200r002c00
huawei s7700_firmware v200r003c00
huawei s7700_firmware v200r005c00
huawei s7700_firmware v200r006c00
huawei s7700_firmware v200r006c01
huawei s7700_firmware v200r007c00
huawei s7700_firmware v200r007c01
huawei s7700_firmware v200r008c00
huawei s7700_firmware v200r008c06
huawei s7700_firmware v200r009c00
huawei s7700_firmware v200r010c00
huawei s7700 -
huawei s9700_firmware v200r001c00
huawei s9700_firmware v200r001c01
huawei s9700_firmware v200r002c00
huawei s9700_firmware v200r003c00
huawei s9700_firmware v200r005c00
huawei s9700_firmware v200r006c00
huawei s9700_firmware v200r006c01
huawei s9700_firmware v200r007c00
huawei s9700_firmware v200r007c01
huawei s9700_firmware v200r008c00
huawei s9700_firmware v200r009c00
huawei s9700_firmware v200r010c00
huawei s9700 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D81469B-EC6C-493D-B632-4DF821A1F304",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6F2C4C7-3438-42B8-8999-C17E45C8CF49",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r006c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "ACAB5D62-CAC9-41D0-BBBC-93E22AD8EAF5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "10CBC93B-5CF6-45BF-A90A-84B7693E27FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC4803A7-44B2-41BA-814D-151239B92CEF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "985C07E4-1E27-4191-9FB8-4714A177479D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD4C5CC9-FD60-4C64-8F88-CFC71BBEA663",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r008c06:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A787767-F56E-4930-B366-C7E103CAC1CE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B17A34EF-677D-4264-82FB-F7F582C9F56B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "933755CC-4A0B-42FB-9491-3C841059851D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F49D3EAD-1EB3-4C62-80BA-4C9C3CE0408C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "65902ABB-3EF2-4C8B-BAC1-84BC585019BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D75B012-A57D-4C6D-AB26-51D2ECC02F35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1DFF0C0-AA17-4AA1-A418-4759D1A58852",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D84F05D5-BA7D-485B-91C2-273349335CFB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF3FB3CC-2EAC-4A08-BDDC-DCACEE9FA2AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r006c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "345DA517-033D-4C94-A7F2-77C047309E2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "2377CD30-6F57-46CB-9DD1-E29458A7D928",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "D55C2AC7-FF47-4160-B524-E3E6C54612E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D79CD09-3414-4105-AD59-F3D1BAC61B7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r008c06:*:*:*:*:*:*:*",
                     matchCriteriaId: "C6712B77-1268-4A5A-B383-E51D9D51F108",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB2A3C92-C5C6-4BE6-A9F6-21C28D68C080",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "37E3F87E-EA36-41ED-8793-F6C166FFC4A7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B1F0B3D-1923-42C3-A3DB-03D11BE059D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "032E5E4D-B1B8-4659-8B62-3DC237234501",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4FB6ED15-477B-4BB5-AA94-0D7897FBD962",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "06AD9ACA-E0C3-4096-BE50-94E717CDA318",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "325D6523-A07A-48D4-AD44-CF838BD77432",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AC7E622-010C-4C5D-8AA6-D4793AFCE0E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r006c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "702A6BB8-B9D5-4160-94C9-12CF35485FC9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D78DAB13-32AA-4813-AB0A-0EA870F41183",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "38515A04-EC21-40B3-A29C-8D0A5883EA4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "36AB80F7-1BD2-4169-AC70-708CE84BB15C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "01A0EC8F-6A8A-487F-A92A-789E3789788F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C6DC309-2FC6-4014-9C2B-8EE12C7BB08F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "S12700 V200R005C00, V200R006C00, V200R006C01, V200R007C00, V200R007C01, V200R007C20, V200R008C00, V200R008C06, V200R009C00, V200R010C00, S7700 V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R006C01, V200R007C00, V200R007C01, V200R008C00, V200R008C06, V200R009C00, V200R010C00, S9700 V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R006C01, V200R007C00, V200R007C01, V200R008C00, V200R009C00, V200R010C00 have an improper authorization vulnerability on Huawei switch products. The system incorrectly performs an authorization check when a normal user attempts to access certain information which is supposed to be accessed only by authenticated user. Successful exploit could cause information disclosure.",
      },
      {
         lang: "es",
         value: "S12700 V200R005C00, V200R006C00, V200R006C01, V200R007C00, V200R007C01, V200R007C20, V200R008C00, V200R008C06, V200R009C00, V200R010C00, S7700 V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R006C01, V200R007C00, V200R007C01, V200R008C00, V200R008C06, V200R009C00, V200R010C00, S9700 V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R006C01, V200R007C00, V200R007C01, V200R008C00, V200R009C00 y V200R010C00 tienen una vulnerabilidad de autorización incorrecta en productos switch de Huawei. El sistema realiza de manera errónea una comprobación de autorización cuando un usuario normal intenta acceder a cierta información a la que se supone que solo pueden acceder los usuarios autenticados. La explotación con éxito podría resultar en una divulgación de información.",
      },
   ],
   id: "CVE-2017-15327",
   lastModified: "2024-11-21T03:14:28.293",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "NONE",
               baseScore: 4,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
               version: "3.0",
            },
            exploitabilityScore: 2.8,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-04-11T17:29:00.147",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180328-01-authentication-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180328-01-authentication-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-200",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2017-04-02 20:59
Modified
2024-11-21 03:00
Summary
Huawei S5300 with software V200R003C00, V200R007C00, V200R008C00, V200R009C00; S5700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C03, V200R007C00, V200R008C00, V200R009C00; S6300 with software V200R003C00, V200R005C00, V200R008C00, V200R009C00; S6700 with software V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R008C00, V200R009C00; S7700 with software V200R007C00, V200R008C00, V200R009C00; S9300 with software V200R007C00, V200R008C00, V200R009C00; S9700 with software V200R007C00, V200R008C00, V200R009C00; and S12700 with software V200R007C00, V200R007C01, V200R008C00, V200R009C00 allow the attacker to cause a denial of service condition by sending malformed MPLS packets.
Impacted products
Vendor Product Version
huawei s12700_firmware v200r007c00
huawei s12700_firmware v200r007c01
huawei s12700_firmware v200r008c00
huawei s12700_firmware v200r009c00
huawei s12700 -
huawei s5300_firmware v200r003c00
huawei s5300_firmware v200r007c00
huawei s5300_firmware v200r008c00
huawei s5300_firmware v200r009c00
huawei s5300 -
huawei s5700_firmware v200r001c00
huawei s5700_firmware v200r002c00
huawei s5700_firmware v200r003c00
huawei s5700_firmware v200r005c00
huawei s5700_firmware v200r005c03
huawei s5700_firmware v200r007c00
huawei s5700_firmware v200r008c00
huawei s5700_firmware v200r009c00
huawei s5700 -
huawei s6300_firmware v200r003c00
huawei s6300_firmware v200r005c00
huawei s6300_firmware v200r008c00
huawei s6300_firmware v200r009c00
huawei s6300 -
huawei s6700_firmware v200r001c00
huawei s6700_firmware v200r001c01
huawei s6700_firmware v200r002c00
huawei s6700_firmware v200r003c00
huawei s6700_firmware v200r005c00
huawei s6700_firmware v200r007c00
huawei s6700_firmware v200r008c00
huawei s6700_firmware v200r009c00
huawei s6700 -
huawei s7700_firmware v200r007c00
huawei s7700_firmware v200r008c00
huawei s7700_firmware v200r009c00
huawei s7700 -
huawei s9300_firmware v200r007c00
huawei s9300_firmware v200r008c00
huawei s9300_firmware v200r009c00
huawei s9300 -
huawei s9700_firmware v200r007c00
huawei s9700_firmware v200r008c00
huawei s9700_firmware v200r009c00
huawei s9700 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "10CBC93B-5CF6-45BF-A90A-84B7693E27FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC4803A7-44B2-41BA-814D-151239B92CEF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD4C5CC9-FD60-4C64-8F88-CFC71BBEA663",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B17A34EF-677D-4264-82FB-F7F582C9F56B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD601FFF-E623-4ADC-B286-D11B8004D7CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD6B13D4-07F3-4CB5-8194-89781E685A78",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5454BC21-A04F-4B3D-8533-2414B6E1BC8C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F31814D-5879-4FB9-BDAE-01CFC75D9AF4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CFEF08E-54C5-4D60-AFF0-37B00D6E2DDD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "336AA440-AEF4-482B-A037-8976DC38BA1A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B2DE9FE-5EC9-462E-86F0-EE772C944DFC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4907FBB8-5157-460D-9240-DD7D610C0FCC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCF23DAE-1215-41B2-88C5-4436D846266C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r005c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B18ABC1-A970-472A-A8BF-934D1180930E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "40745A01-E5AC-4207-A34F-D8E7F7231F83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "21FFF548-FBEF-468A-A8DE-1DB1B7C0B3AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "48B5A9B7-A931-4806-8AC7-302C6CA49CF1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C330A14-C941-4B28-AA9C-B78A96A9011D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "C6818ECD-730B-40D6-9108-B8540CC4BF1E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "939C73D9-E0E9-47A5-970E-6C84F5ECD2D7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B39BBA0F-8EB9-40BA-B8DF-5C735F2216A3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA3C8988-A1FC-4B04-9134-F2BDDADEAFB5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B7B7285-F4C6-415C-A948-D7612750A77D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD40F46-5E04-43F0-A2DB-0ACBEC92C53F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D6DC0AF-017E-41BC-A19D-F9AA055F5224",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "749B68B9-9F62-4E7A-AC86-F4073BA32E18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F18D9776-5CE7-4DD3-9119-7FB08A35B955",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF4AF711-D921-4261-A459-2A0780EA951F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DA5CF67-A58B-4666-B87E-712507233453",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9EA93B5-01A5-4506-9B0A-993621E6940E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "2377CD30-6F57-46CB-9DD1-E29458A7D928",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D79CD09-3414-4105-AD59-F3D1BAC61B7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB2A3C92-C5C6-4BE6-A9F6-21C28D68C080",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "886E9D1F-25FA-41FA-A64B-E42B9910D2B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E7DB9D3-BB34-49BE-8302-A054D79FE8D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FEF2710B-60F7-42A5-83AA-14589DC0358D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D78DAB13-32AA-4813-AB0A-0EA870F41183",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "36AB80F7-1BD2-4169-AC70-708CE84BB15C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "01A0EC8F-6A8A-487F-A92A-789E3789788F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei S5300 with software V200R003C00, V200R007C00, V200R008C00, V200R009C00; S5700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C03, V200R007C00, V200R008C00, V200R009C00; S6300 with software V200R003C00, V200R005C00, V200R008C00, V200R009C00; S6700 with software V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R008C00, V200R009C00; S7700 with software V200R007C00, V200R008C00, V200R009C00; S9300 with software V200R007C00, V200R008C00, V200R009C00; S9700 with software V200R007C00, V200R008C00, V200R009C00; and S12700 with software V200R007C00, V200R007C01, V200R008C00, V200R009C00 allow the attacker to cause a denial of service condition by sending malformed MPLS packets.",
      },
      {
         lang: "es",
         value: "Huawei S5300 con software V200R003C00, V200R007C00, V200R008C00, V200R009C00; S5700 con software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C03, V200R007C00, V200R008C00, V200R009C00; S6300 con software V200R003C00, V200R005C00, V200R008C00, V200R009C00; S6700 con software V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R008C00, V200R009C00; S7700 con software V200R007C00, V200R008C00, V200R009C00; S9300 con software V200R007C00, V200R008C00, V200R009C00; S9700 con software V200R007C00, V200R008C00, V200R009C00; y S12700 con software V200R007C00, V200R007C01, V200R008C00, V200R009C00 permiten al atacante provocar una condición de denegación de servicio enviando paquetes MPLS mal formados.",
      },
   ],
   id: "CVE-2016-8773",
   lastModified: "2024-11-21T03:00:01.690",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2017-04-02T20:59:01.407",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161111-01-mpls-en",
      },
      {
         source: "psirt@huawei.com",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/94285",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161111-01-mpls-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/94285",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-06-29 20:15
Modified
2024-11-21 05:49
Summary
There has a license management vulnerability in some Huawei products. An attacker with high privilege needs to perform specific operations to exploit the vulnerability on the affected device. Due to improper license management of the device, as a result, the license file can be applied and affect integrity of the device. Affected product versions include:S12700 V200R007C01,V200R007C01B102,V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S1700 V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S2700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S5700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100;S6700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100;S7700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S9700 V200R007C01,V200R007C01B102,V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10.
Impacted products
Vendor Product Version
huawei s12700_firmware v200r007c01
huawei s12700_firmware v200r007c01b102
huawei s12700_firmware v200r008c00
huawei s12700_firmware v200r010c00spc300
huawei s12700_firmware v200r011c00
huawei s12700_firmware v200r011c00spc100
huawei s12700_firmware v200r011c10
huawei s12700 -
huawei s1700_firmware v200r010c00spc300
huawei s1700_firmware v200r011c00
huawei s1700_firmware v200r011c00spc100
huawei s1700_firmware v200r011c10
huawei s1700 -
huawei s2700_firmware v200r008c00
huawei s2700_firmware v200r010c00spc300
huawei s2700_firmware v200r011c00
huawei s2700_firmware v200r011c00spc100
huawei s2700_firmware v200r011c10
huawei s2700 -
huawei s5700_firmware v200r008c00
huawei s5700_firmware v200r010c00spc300
huawei s5700_firmware v200r011c00
huawei s5700_firmware v200r011c00spc100
huawei s5700_firmware v200r011c10
huawei s5700_firmware v200r011c10spc100
huawei s5700 -
huawei s6700_firmware v200r008c00
huawei s6700_firmware v200r010c00spc300
huawei s6700_firmware v200r011c00
huawei s6700_firmware v200r011c00spc100
huawei s6700_firmware v200r011c10
huawei s6700_firmware v200r011c10spc100
huawei s6700 -
huawei s7700_firmware v200r008c00
huawei s7700_firmware v200r010c00spc300
huawei s7700_firmware v200r011c00
huawei s7700_firmware v200r011c00spc100
huawei s7700_firmware v200r011c10
huawei s7700 -
huawei s9700_firmware v200r007c01
huawei s9700_firmware v200r007c01b102
huawei s9700_firmware v200r008c00
huawei s9700_firmware v200r010c00spc300
huawei s9700_firmware v200r011c00
huawei s9700_firmware v200r011c00spc100
huawei s9700_firmware v200r011c10
huawei s9700 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC4803A7-44B2-41BA-814D-151239B92CEF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c01b102:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA273AD6-F7C0-49F3-A33F-E46B86168A98",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD4C5CC9-FD60-4C64-8F88-CFC71BBEA663",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r010c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E46ADD0-4DF7-4C87-88D6-46A2065DB5B2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r011c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB158E3E-8A26-415F-86E9-E63524EAA055",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r011c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E146F90-3E3F-4F23-81C0-0C4F36293711",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D6FF612-2F2B-4B75-8D97-86205DFCF0CF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r010c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "69FA8636-5936-4776-9DF2-1BD294796F0B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r011c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A843B78A-CDB1-45A0-BBAC-6F3D69AD84DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r011c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "A59EDC82-83AD-408E-AA8E-15E221C3B009",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "342E032C-BAE5-4F15-8BAE-84F9D9AA58D0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22FE26B5-C6D6-4A6C-8526-ED94F4F57C2C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB8FC67E-DFD3-482E-B7D6-17464885B8DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r010c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A57254C-A4F0-47D2-8A1A-029E79BE863C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r011c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9461516A-F5BB-4A52-A315-8C2B559528A0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r011c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "225A56F2-2EEB-4816-9A20-7A6E37C65FA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "20648023-4CC5-4606-BE8E-70A5C20D7BE6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD2CD071-58E4-4061-8217-990453213470",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "21FFF548-FBEF-468A-A8DE-1DB1B7C0B3AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r010c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED5093F9-8629-4DA5-AC3A-EE5FFD7A57AB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r011c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD2FEF0B-B4AC-4EDB-AD25-41F4F9DA1DAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r011c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "57E9C52D-0F60-41E5-8646-1F4D908CA82C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "AFD7EF17-710B-4363-87B7-CE1B4447BF99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r011c10spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A2FFFE5-5B4E-4040-BE25-A90D77AB53FE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DA5CF67-A58B-4666-B87E-712507233453",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r010c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "17889C1C-0187-4814-940D-5BA6DDA39ECF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r011c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "11F25342-CE07-44CD-BD61-A998DFC8EF8E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r011c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "D31F91CA-80E9-4C2A-AD61-A4FC08C8A83E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C34E6D4-67FE-4AA4-A825-9666A302F771",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r011c10spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "52947109-38C8-41A2-BC59-B43EA2343F43",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D79CD09-3414-4105-AD59-F3D1BAC61B7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r010c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "82E3273C-3C33-4880-A044-389F5CB6FECA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r011c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "749528C3-5F85-4B80-98AA-FFD5574779F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r011c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "2341D4F8-67E0-4B10-9D16-F2282D3EDBED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "26F2CC30-626B-4FEE-BDAD-6A5990DE6384",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "38515A04-EC21-40B3-A29C-8D0A5883EA4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c01b102:*:*:*:*:*:*:*",
                     matchCriteriaId: "2091CE58-DB15-4D36-ABF9-5DC94D39E358",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "36AB80F7-1BD2-4169-AC70-708CE84BB15C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r010c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "3BBC7227-051E-4244-9A63-760D0714DA35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r011c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D42D4D0E-2E0D-448E-B83D-50A1361C048B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r011c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "90A601DF-D90C-43EB-8A56-3890CF0C252D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B06663D-8499-42B9-83E1-E369F1FD0070",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "There has a license management vulnerability in some Huawei products. An attacker with high privilege needs to perform specific operations to exploit the vulnerability on the affected device. Due to improper license management of the device, as a result, the license file can be applied and affect integrity of the device. Affected product versions include:S12700 V200R007C01,V200R007C01B102,V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S1700 V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S2700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S5700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100;S6700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100;S7700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S9700 V200R007C01,V200R007C01B102,V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10.",
      },
      {
         lang: "es",
         value: "Se presenta una vulnerabilidad en la administración de licencias en algunos productos de Huawei. Un atacante con altos privilegios necesita llevar a cabo operaciones específicas para explotar la vulnerabilidad en el dispositivo afectado. Debido a la administración inapropiada de la licencia del dispositivo, como resultado, el archivo de licencia se puede aplicar y afectar a la integridad del dispositivo. Las versiones de producto afectadas son: S12700 V200R007C01,V200R007C01B102,V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S1700 V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10; S2700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S5700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100; S6700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100;S7700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10; S9700 V200R007C01,V200R007C01B102,V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10",
      },
   ],
   id: "CVE-2021-22329",
   lastModified: "2024-11-21T05:49:55.350",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "NONE",
               baseScore: 4,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:S/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 4.9,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.2,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-06-29T20:15:08.083",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210407-01-resourcemanagement-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210407-01-resourcemanagement-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2017-04-02 20:59
Modified
2024-11-21 02:19
Summary
Huawei AC6605 with software V200R001C00; AC6605 with software V200R002C00; ACU with software V200R001C00; ACU with software V200R002C00; S2300, S3300, S2700, S3700 with software V100R006C05 and earlier versions; S5300, S5700, S6300, S6700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions; S7700, S9300, S9300E, S9700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions could allow remote attackers to send a special SSH packet to the VRP device to cause a denial of service.
Impacted products
Vendor Product Version
huawei ac6605_firmware ac6605_v200r001c00
huawei ac6605_firmware ac6605_v200r002c00
huawei ac6605 -
huawei acu_firmware acu_v200r001c00
huawei acu_firmware acu_v200r002c00
huawei acu -
huawei s_series_firmware v100r006c05
huawei s2300 -
huawei s2700 -
huawei s3300 -
huawei s3700 -
huawei s5300_firmware *
huawei s5300_firmware v100r006
huawei s5300_firmware v200r001
huawei s5300_firmware v200r002
huawei s5300_firmware v200r003
huawei s5300 -
huawei s5700_firmware *
huawei s5700_firmware v100r006
huawei s5700_firmware v200r001
huawei s5700_firmware v200r002
huawei s5700_firmware v200r003
huawei s5700 -
huawei s6700_firmware *
huawei s6700_firmware v100r006
huawei s6700_firmware v200r001
huawei s6700_firmware v200r002
huawei s6700_firmware v200r003
huawei s6700 -
huawei s6300_firmware *
huawei s6300_firmware v100r006
huawei s6300_firmware v200r001
huawei s6300_firmware v200r002
huawei s6300_firmware v200r003
huawei s6300 -
huawei s7700_firmware *
huawei s7700_firmware v100r006
huawei s7700_firmware v200r001
huawei s7700_firmware v200r002
huawei s7700_firmware v200r003
huawei s7700 -
huawei s9700_firmware *
huawei s9700_firmware v100r006
huawei s9700_firmware v200r001
huawei s9700_firmware v200r002
huawei s9700_firmware v200r003
huawei s9700 -
huawei s9300_firmware *
huawei s9300_firmware v100r006
huawei s9300_firmware v200r001
huawei s9300_firmware v200r002
huawei s9300_firmware v200r003
huawei s9300 -
huawei s9300e_firmware *
huawei s9300e_firmware v100r006
huawei s9300e_firmware v200r001
huawei s9300e_firmware v200r002
huawei s9300e_firmware v200r003
huawei s9300e -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ac6605_firmware:ac6605_v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "859A83C4-3AA0-45EA-87DE-CCE978D73474",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ac6605_firmware:ac6605_v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA904391-4350-4C84-A39E-C9CE8DC78C44",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ac6605:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA1E5AE5-EBB2-4E05-A3C7-E2CA54205FF7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:acu_firmware:acu_v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "30C4DFFF-9A41-4351-B608-8CCCFFB80505",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:acu_firmware:acu_v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8BB0D86-0EFE-48D8-941E-53F574987CD8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:acu:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "60FE6911-4BC0-48D7-8E38-88BDF8E4B5F0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s_series_firmware:v100r006c05:*:*:*:*:*:*:*",
                     matchCriteriaId: "D775B6F0-99F2-4F93-ADE5-9006E511B0C3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "17566603-275F-4E6B-B5D9-4A716EEC03DC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD2CD071-58E4-4061-8217-990453213470",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s3300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A1410A1-ADCC-474F-ABEE-F0FE48E4CD7A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:huawei:s3700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B7F84390-E120-406B-967D-B473EB110EA9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E21E7C93-95A0-4685-9844-40495011C279",
                     versionEndIncluding: "v200r005c00spc300",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A7A8C30-4C01-4958-A6B3-03337B78366E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0D0E1B7-3843-4E18-88AC-D851E9231728",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "258F4E81-9B8A-4133-868D-8829098443D7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5300_firmware:v200r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "2E3CCFD9-46A6-4A56-9300-DF8E6F35446B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CFEF08E-54C5-4D60-AFF0-37B00D6E2DDD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D754D004-C6B3-458A-ADE7-F66CC7F6392E",
                     versionEndIncluding: "v200r005c00spc300",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBE6AAB7-B389-48DF-9732-38FE988DB2D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA745187-432A-4BCA-8FE6-0A1F4FDBB010",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "60AE0EC6-91F2-4058-9F1B-906F02828976",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "A59BADD8-584B-4E53-8386-4B8ADA947CFE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "174812BF-795B-4945-B637-3E0E9CFD247F",
                     versionEndIncluding: "v200r005c00spc300",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6804EC1-E774-43B9-B513-896F53AFCD2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "16289CCE-0803-4AB1-AE98-73F78580C3BE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F3C5718-DC84-456F-9816-052395BCF3FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "D82C04A8-3884-42E5-BE38-E1AAE842A759",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C42CBC6-ADE7-4B16-835C-D06FA23F47BD",
                     versionEndIncluding: "v200r005c00spc300",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B127953-86A8-495E-8868-7764F8A8C76E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8E49AF7-A906-4CB2-83E2-D263A7E852B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CFA05B8-4462-4D11-8A9F-488AF0287FF0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6300_firmware:v200r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A7E8867-76FF-4834-A6FF-08537BD6AE8E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA3C8988-A1FC-4B04-9134-F2BDDADEAFB5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A234C65E-2B24-451E-97D2-43440C072043",
                     versionEndIncluding: "v200r005c00spc300",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "C3FA00DD-61AE-44CA-B995-7BE5249F8F20",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "89C05EAD-1274-42FE-AEF3-7AD5B0DAF65D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB355FCB-9A98-49D4-878A-A6EE5DC8A3AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2047FBF-4E62-458C-8AF9-C03ED9D9309E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E05A2C5-3BF8-451C-95D3-71BEFCC08DC6",
                     versionEndIncluding: "v200r005c00spc300",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BBF657B-A249-459F-BE89-FAD3AF4AA791",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "C60B2971-FE60-4B4F-AAC1-73B9E932135D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A231837-BC55-47DF-BB64-EDD52B9901DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "7062DE16-0EDF-45B3-AF49-150581176FF2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4732A3E-C3BC-427D-B0A4-31B2B24A411F",
                     versionEndIncluding: "v200r005c00spc300",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "F32B3FFA-DD66-47A0-AB26-5CC385D898A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "C2E49E77-F8E3-40EA-BD94-5911DC93FEE1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9B9B68D-C9F2-42AB-8287-0D1744DB0DDD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FE55995-6CE6-4142-BBCF-D268D0967AE0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9300e_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA033B4D-46F1-43AD-B5A7-9AF96B3DE6A9",
                     versionEndIncluding: "v200r005c00spc300",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300e_firmware:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "3712D5B6-0D98-422F-8270-C151A2788984",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300e_firmware:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "EEACD3C6-6D1D-4070-8962-D0CD485AA754",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300e_firmware:v200r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A319D8E-17B1-4E61-B61C-596DCBF86475",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300e_firmware:v200r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "E721F5DD-8F2D-4A1C-9456-FB6476066661",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9300e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B913A258-48B6-45D0-A37B-2C665DCA735C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei AC6605 with software V200R001C00; AC6605 with software V200R002C00; ACU with software V200R001C00; ACU with software V200R002C00; S2300, S3300, S2700, S3700 with software V100R006C05 and earlier versions; S5300, S5700, S6300, S6700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions; S7700, S9300, S9300E, S9700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions could allow remote attackers to send a special SSH packet to the VRP device to cause a denial of service.",
      },
      {
         lang: "es",
         value: "Huawei AC6605 con software V200R001C00; AC6605 con software V200R002C00; ACU con software V200R001C00; ACU con software V200R002C00; S2300, S3300, S2700, S3700 con software V100R006C05 y versiones anteriores; S5300, S5700, S6300, S6700 con software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 y versiones anteriores; S7700, S9300, S9300E, S9700 con software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 y versiones anteriores podrían permitir a atacantes remotos enviar un paquete SSH especial al dispositivo VRP para provocar una denegación de servicio.",
      },
   ],
   id: "CVE-2014-8572",
   lastModified: "2024-11-21T02:19:21.723",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.8,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2017-04-02T20:59:00.423",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/hw-373182",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/hw-373182",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:17
Summary
Huawei S12700 V200R008C00, V200R009C00, S5700 V200R007C00, V200R008C00, V200R009C00, S6700 V200R008C00, V200R009C00, S7700 V200R008C00, V200R009C00, S9700 V200R008C00, V200R009C00 have a numeric errors vulnerability. An unauthenticated, remote attacker may send specific TCP messages with keychain authentication option to the affected products. Due to the improper validation of the messages, it will cause numeric errors when handling the messages. Successful exploit will cause the affected products to reset.
Impacted products
Vendor Product Version
huawei s12700_firmware v200r008c00
huawei s12700_firmware v200r009c00
huawei s12700 -
huawei s5700_firmware v200r007c00
huawei s5700_firmware v200r008c00
huawei s5700_firmware v200r009c00
huawei s5700 -
huawei s6700_firmware v200r008c00
huawei s6700_firmware v200r009c00
huawei s6700 -
huawei s7700_firmware v200r008c00
huawei s7700_firmware v200r009c00
huawei s7700 -
huawei s9700_firmware v200r008c00
huawei s9700_firmware v200r009c00
huawei s9700 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD4C5CC9-FD60-4C64-8F88-CFC71BBEA663",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B17A34EF-677D-4264-82FB-F7F582C9F56B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "40745A01-E5AC-4207-A34F-D8E7F7231F83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "21FFF548-FBEF-468A-A8DE-1DB1B7C0B3AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "48B5A9B7-A931-4806-8AC7-302C6CA49CF1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DA5CF67-A58B-4666-B87E-712507233453",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9EA93B5-01A5-4506-9B0A-993621E6940E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D79CD09-3414-4105-AD59-F3D1BAC61B7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB2A3C92-C5C6-4BE6-A9F6-21C28D68C080",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "36AB80F7-1BD2-4169-AC70-708CE84BB15C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "01A0EC8F-6A8A-487F-A92A-789E3789788F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei S12700 V200R008C00, V200R009C00, S5700 V200R007C00, V200R008C00, V200R009C00, S6700 V200R008C00, V200R009C00, S7700 V200R008C00, V200R009C00, S9700 V200R008C00, V200R009C00 have a numeric errors vulnerability. An unauthenticated, remote attacker may send specific TCP messages with keychain authentication option to the affected products. Due to the improper validation of the messages, it will cause numeric errors when handling the messages. Successful exploit will cause the affected products to reset.",
      },
      {
         lang: "es",
         value: "Huawei S12700 V200R008C00, V200R009C00, S5700 V200R007C00, V200R008C00, V200R009C00, S6700 V200R008C00, V200R009C00, S7700 V200R008C00, V200R009C00, S9700 V200R008C00 y V200R009C00 tienen una vulnerabilidad de errores numéricos. Un atacante remoto no autenticado podría enviar mensajes TCP específicos con la opción de autenticación keychain a los productos afectados. Debido a la validación indebida de los mensajes, provocará errores numéricos al gestionar los mensajes. Su explotación con éxito provocará que los productos afectados se restablezcan.",
      },
   ],
   id: "CVE-2017-17300",
   lastModified: "2024-11-21T03:17:47.220",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.8,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-02-15T16:29:03.563",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-router-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-router-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-03-09 21:29
Modified
2024-11-21 03:00
Summary
Huawei S12700 V200R007C00, V200R008C00, S5700 V200R007C00, S7700 V200R002C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, S9700 V200R007C00 have an input validation vulnerability. Due to the lack of input validation, an attacker may craft a malformed packet and send it to the device using VRP, causing the device to display additional memory data and possibly leading to sensitive information leakage.
Impacted products
Vendor Product Version
huawei s12700_firmware v200r007c00
huawei s12700_firmware v200r008c00
huawei s12700 -
huawei s5700_firmware v200r007c00
huawei s5700 -
huawei s7700_firmware v200r002c00
huawei s7700_firmware v200r005c00
huawei s7700_firmware v200r006c00
huawei s7700_firmware v200r007c00
huawei s7700_firmware v200r008c00
huawei s7700 -
huawei s9700_firmware v200r007c00
huawei s9700 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "10CBC93B-5CF6-45BF-A90A-84B7693E27FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD4C5CC9-FD60-4C64-8F88-CFC71BBEA663",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "40745A01-E5AC-4207-A34F-D8E7F7231F83",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D75B012-A57D-4C6D-AB26-51D2ECC02F35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D84F05D5-BA7D-485B-91C2-273349335CFB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF3FB3CC-2EAC-4A08-BDDC-DCACEE9FA2AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "2377CD30-6F57-46CB-9DD1-E29458A7D928",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D79CD09-3414-4105-AD59-F3D1BAC61B7E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D78DAB13-32AA-4813-AB0A-0EA870F41183",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei S12700 V200R007C00, V200R008C00, S5700 V200R007C00, S7700 V200R002C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, S9700 V200R007C00 have an input validation vulnerability. Due to the lack of input validation, an attacker may craft a malformed packet and send it to the device using VRP, causing the device to display additional memory data and possibly leading to sensitive information leakage.",
      },
      {
         lang: "es",
         value: "Huawei S12700 V200R007C00, V200R008C00; S5700 V200R007C00; S7700 V200R002C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00 y S9700 V200R007C00 tienen una vulnerabilidad de validación de entradas. Debido a una falta de validación de entradas, un atacante podría crear un paquete mal formado y enviarlo al dispositivo usando VRP, lo que provocaría que el dispositivo muestre datos de memora adicionales y, posiblemente, que se fugue información sensible.",
      },
   ],
   id: "CVE-2016-8785",
   lastModified: "2024-11-21T03:00:04.520",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
               version: "3.0",
            },
            exploitabilityScore: 2.8,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-03-09T21:29:00.377",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161228-04-vrp-en",
      },
      {
         source: "psirt@huawei.com",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/95149",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161228-04-vrp-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/95149",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2017-04-02 20:59
Modified
2024-11-21 02:19
Summary
Huawei S9300, S9303, S9306, S9312 with software V100R002; S7700, S7703, S7706, S7712 with software V100R003, V100R006, V200R001, V200R002, V200R003, V200R005; S9300E, S9303E, S9306E, S9312E with software V200R001; S9700, S9703, S9706, S9712 with software V200R002, V200R003, V200R005; S12708, S12712 with software V200R005; 5700HI, 5300HI with software V100R006, V200R001, V200R002, V200R003, V200R005; 5710EI, 5310EI with software V200R002, V200R003, V200R005; 5710HI, 5310HI with software V200R003, V200R005; 6700EI, 6300EI with software V200R005 could cause a leak of IP addresses of devices, related to unintended interface support for VRP MPLS LSP Ping.
Impacted products
Vendor Product Version
huawei s9300_firmware v100r002
huawei s9300_firmware v100r003
huawei s9300_firmware v100r006
huawei s9300_firmware v200r001
huawei s9300_firmware v200r002
huawei s9300_firmware v200r003
huawei s9300_firmware v200r005
huawei s9300 -
huawei s9303_firmware v100r002
huawei s9303_firmware v100r003
huawei s9303_firmware v100r006
huawei s9303_firmware v200r001
huawei s9303_firmware v200r002
huawei s9303_firmware v200r003
huawei s9303_firmware v200r005
huawei s9303 -
huawei s9306_firmware v100r002
huawei s9306_firmware v100r003
huawei s9306_firmware v100r006
huawei s9306_firmware v200r001
huawei s9306_firmware v200r002
huawei s9306_firmware v200r003
huawei s9306_firmware v200r005
huawei s9306 -
huawei s9312_firmware v100r002
huawei s9312_firmware v100r003
huawei s9312_firmware v100r006
huawei s9312_firmware v200r001
huawei s9312_firmware v200r002
huawei s9312_firmware v200r003
huawei s9312_firmware v200r005
huawei s9312 -
huawei s7700_firmware v100r002
huawei s7700_firmware v100r003
huawei s7700_firmware v100r006
huawei s7700_firmware v200r001
huawei s7700_firmware v200r002
huawei s7700_firmware v200r003
huawei s7700_firmware v200r005
huawei s7700 -
huawei s7703_firmware v100r002
huawei s7703_firmware v100r003
huawei s7703_firmware v100r006
huawei s7703_firmware v200r001
huawei s7703_firmware v200r002
huawei s7703_firmware v200r003
huawei s7703_firmware v200r005
huawei s7703 -
huawei s7706_firmware v100r002
huawei s7706_firmware v100r003
huawei s7706_firmware v100r006
huawei s7706_firmware v200r001
huawei s7706_firmware v200r002
huawei s7706_firmware v200r003
huawei s7706_firmware v200r005
huawei s7706 -
huawei s7712_firmware v100r002
huawei s7712_firmware v100r003
huawei s7712_firmware v100r006
huawei s7712_firmware v200r001
huawei s7712_firmware v200r002
huawei s7712_firmware v200r003
huawei s7712_firmware v200r005
huawei s7712 -
huawei s9300e_firmware v200r001
huawei s9300e_firmware v200r002
huawei s9300e_firmware v200r003
huawei s9300e_firmware v200r005
huawei s9300e -
huawei s9303e_firmware v200r001
huawei s9303e_firmware v200r002
huawei s9303e_firmware v200r003
huawei s9303e_firmware v200r005
huawei s9303e -
huawei s9306e_firmware v200r001
huawei s9306e_firmware v200r002
huawei s9306e_firmware v200r003
huawei s9306e_firmware v200r005
huawei s9306e -
huawei s9312e_firmware v200r001
huawei s9312e_firmware v200r002
huawei s9312e_firmware v200r003
huawei s9312e_firmware v200r005
huawei s9312e -
huawei s9700_firmware v200r001
huawei s9700_firmware v200r002
huawei s9700_firmware v200r003
huawei s9700_firmware v200r005
huawei s9700 -
huawei s9703_firmware v200r001
huawei s9703_firmware v200r002
huawei s9703_firmware v200r003
huawei s9703_firmware v200r005
huawei s9703 -
huawei s9706_firmware v200r001
huawei s9706_firmware v200r002
huawei s9706_firmware v200r003
huawei s9706_firmware v200r005
huawei s9706 -
huawei s9712_firmware v200r001
huawei s9712_firmware v200r002
huawei s9712_firmware v200r003
huawei s9712_firmware v200r005
huawei s9712 -
huawei s12708_firmware v200r005
huawei s12708 -
huawei s12712_firmware v200r005
huawei s12712 -
huawei 5700hi_firmware v100r006
huawei 5700hi_firmware v200r001
huawei 5700hi_firmware v200r002
huawei 5700hi_firmware v200r003
huawei 5700hi_firmware v200r005
huawei 5700hi -
huawei 5300hi_firmware v100r006
huawei 5300hi_firmware v200r001
huawei 5300hi_firmware v200r002
huawei 5300hi_firmware v200r003
huawei 5300hi_firmware v200r005
huawei 5300hi -
huawei 5710ei_firmware v200r002
huawei 5710ei_firmware v200r003
huawei 5710ei_firmware v200r005
huawei 5710ei -
huawei 5310ei_firmware v200r002
huawei 5310ei_firmware v200r003
huawei 5310ei_firmware v200r005
huawei 5310ei -
huawei 5310hi_firmware v200r003
huawei 5310hi_firmware v200r005
huawei 5310hi -
huawei 5710hi_firmware v200r003
huawei 5710hi_firmware v200r005
huawei 5710hi -
huawei 6700ei_firmware v200r005
huawei 6700ei -
huawei 6300ei_firmware v200r005
huawei 6300ei -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v100r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "2E4ABE9F-4A37-4C91-AD3B-0D69F9A9A5BB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v100r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C290447-E696-45F1-9BE3-13A26E68AF6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "F32B3FFA-DD66-47A0-AB26-5CC385D898A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "C2E49E77-F8E3-40EA-BD94-5911DC93FEE1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9B9B68D-C9F2-42AB-8287-0D1744DB0DDD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FE55995-6CE6-4142-BBCF-D268D0967AE0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300_firmware:v200r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "53C6DFC0-B11E-4620-AF49-7F6C7310C681",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9303_firmware:v100r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "18F9EF21-237F-4089-A829-80E794788CFB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9303_firmware:v100r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "28434674-16EC-4B0A-9CB7-E7FD315B6908",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9303_firmware:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "3741B6A1-BA1B-4781-AC6B-11D5C0DF0A6C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9303_firmware:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF8FFF08-BAD6-4636-A739-2D88C1716323",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9303_firmware:v200r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "9735B412-5940-4314-8037-F40AFC29B2BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9303_firmware:v200r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9409B5F-C833-42FC-A5C3-C9CA3F4D83A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9303_firmware:v200r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "B287BAC9-03FB-4288-942C-C8D173C752D6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9303:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C50224A-BE2C-4A9C-8598-538F2E56781F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9306_firmware:v100r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5061E8E-F549-4A8D-A064-1B83190C6D15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9306_firmware:v100r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A6E73A6-14CD-4775-8864-D9CD1DDCEC8F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9306_firmware:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E15BC18-676D-40F2-A5BA-225C17D25EBE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9306_firmware:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "6361A2EC-90F2-4E13-A2F2-EB14AD312555",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9306_firmware:v200r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "D83766A0-5560-4F79-B16E-4CC26D179286",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9306_firmware:v200r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2411593-B774-440D-AE17-A9CB75583F7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9306_firmware:v200r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "850EAF98-1439-4AB5-8C44-F29C195B3363",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9306:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1938E1B2-78FE-4871-9878-4915EED99382",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9312_firmware:v100r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9C99FC7-BDCA-4A62-87EE-6607811BACF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9312_firmware:v100r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD45B312-B5E4-459E-86E6-3872A0EA173B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9312_firmware:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "587DE89D-F094-475F-9155-1BC055490D8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9312_firmware:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "38B3A799-22B3-455F-833D-691BBA1F8CB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9312_firmware:v200r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "047F8EE5-BBCB-4662-ACB9-1F72F8426309",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9312_firmware:v200r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "05AFE76B-B084-49EE-839A-E46BEA4D6BAB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9312_firmware:v200r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "5477E025-1C89-4E09-AD58-0C90EA4B576E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9312:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64FC2711-49FE-4D24-AFC6-D771CC69C522",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v100r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA5D2CD-7AAC-4615-985D-82DDECCE76E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v100r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B4C85CB-92B7-4115-80B9-9BFCD7783D41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "C3FA00DD-61AE-44CA-B995-7BE5249F8F20",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "89C05EAD-1274-42FE-AEF3-7AD5B0DAF65D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB355FCB-9A98-49D4-878A-A6EE5DC8A3AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2047FBF-4E62-458C-8AF9-C03ED9D9309E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "5FFB1B7D-2C73-421D-A328-BA6BE8F08C96",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7703_firmware:v100r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B41DF15-D338-44CD-B377-BCC7A215278A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7703_firmware:v100r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "A65F3727-46D7-44D2-8F3F-693B208EFD29",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7703_firmware:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4F1BC22-58D4-4A92-9BFE-33C0FC115D60",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7703_firmware:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "F61FF0B1-CEA0-4C6A-ABE9-DCAA14CDE245",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7703_firmware:v200r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B7DCD22-4035-4624-92E0-BC36A88D3ECD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7703_firmware:v200r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6C39A84-4390-4394-913E-8472E6C66565",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7703_firmware:v200r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "B99C0238-3F5E-4B96-88A0-62711CE78A69",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7703:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1F6BDEF-D206-4B74-A5AB-CB39660AF0C5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7706_firmware:v100r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "960C4716-64CE-45B8-9FBC-0B868E2B5ACE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7706_firmware:v100r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "0CBDB620-ECDC-48FB-B3F6-FAD742CD2613",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7706_firmware:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A470A01-D34E-4ECA-AD17-9754B4BE78C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7706_firmware:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AD98367-F670-473C-BC6C-03785B485B35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7706_firmware:v200r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F02DA2E-55FE-46EB-9F4B-A6558AD397DD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7706_firmware:v200r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "02E87C94-7C05-4E92-9CD0-0E29764EFC79",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7706_firmware:v200r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "8200DB70-E61C-4C7C-B031-8731F847A4E5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7706:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "82118B4C-5A93-4707-A5D2-8ED4D9D35D4A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7712_firmware:v100r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "7906A704-AFF5-4928-BEEC-F9AEFAB5F041",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7712_firmware:v100r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "9B300B79-209D-41FD-BC67-C4E2ED435457",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7712_firmware:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "7480CDD4-2E58-48EF-AF03-6F7B1F6AAC29",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7712_firmware:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2F5A2CA-72DF-4D1F-8BDB-5F8A1BA16C16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7712_firmware:v200r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "72293619-AED3-468D-8F20-48DB8BF713BE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7712_firmware:v200r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "02D7EA5B-9B5C-4334-B52C-8D022004F816",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7712_firmware:v200r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C745EBC-D65B-4551-89A0-BE195DCFE733",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7712:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C037A63D-80B1-46F9-B626-D31BC79CE6F6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9300e_firmware:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "EEACD3C6-6D1D-4070-8962-D0CD485AA754",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300e_firmware:v200r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A319D8E-17B1-4E61-B61C-596DCBF86475",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300e_firmware:v200r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "E721F5DD-8F2D-4A1C-9456-FB6476066661",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9300e_firmware:v200r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "21EA3B3A-242D-40A4-8CC5-64E7F8488FD9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9300e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B913A258-48B6-45D0-A37B-2C665DCA735C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9303e_firmware:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "830EFD85-0B70-423E-AC77-CB524270808E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9303e_firmware:v200r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "D503F258-6276-4786-84EC-2B39213099A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9303e_firmware:v200r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB0ECDC3-B150-4C85-8E88-473BBE552C1E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9303e_firmware:v200r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "75A2BBDB-F7F2-482D-BADE-F4E299F7DACB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9303e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3934887-7583-41F1-A91C-C33B9CD112E6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9306e_firmware:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9D31135-0FC7-4BE7-972D-3CFEB601F80B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9306e_firmware:v200r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "495CD257-11EB-4DAF-B54D-0B8E40942931",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9306e_firmware:v200r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D55A13B-CD97-4E1F-8FFD-3EDC7A58DFFD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9306e_firmware:v200r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "F12BEB33-DFCD-4F82-903F-B85A7D84E99E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9306e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "797CFF70-21C6-4819-8029-692F1BE991B8",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9312e_firmware:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "58B94E82-E0A4-4746-A23C-01BC79D576F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9312e_firmware:v200r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "82B41741-2EAB-480E-945E-642FF1485B84",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9312e_firmware:v200r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB36ED60-7A83-45E4-916C-3B41AAB80320",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9312e_firmware:v200r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "D679D743-2F2F-4BBB-9D24-99FDB67C0193",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9312e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5D489B7-380C-4324-9D1B-D6DADCD7B8AE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "C60B2971-FE60-4B4F-AAC1-73B9E932135D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A231837-BC55-47DF-BB64-EDD52B9901DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "7062DE16-0EDF-45B3-AF49-150581176FF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "93AD4CF3-D38F-4CEB-932F-C0A41D667FE9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9703_firmware:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "45E7538C-9298-4D6E-8259-C9D4665CB99B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9703_firmware:v200r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5F00964-895E-46AE-B779-9F99CEFA3BC5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9703_firmware:v200r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC21B113-4D0C-49F4-A76C-73E9E18E7778",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9703_firmware:v200r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC0E00CD-6234-44A2-B194-9778B27F30A0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9703:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D03D0B22-CD88-4525-8478-16395DAA572E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9706_firmware:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E36FDF5-F32E-4F6E-9966-398122EACA2C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9706_firmware:v200r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "0BD9AF9A-F6B4-4160-B107-BF7B40A3C5F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9706_firmware:v200r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "368586D0-5B43-421F-A090-110564F2A4FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9706_firmware:v200r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FC04679-CE9C-4BD3-AA17-1558B5BEBCBB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9706:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "327CE925-B79E-4976-9241-F237EF0F0EB1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9712_firmware:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8BFED65-35FB-496B-BD3A-995A7093157D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9712_firmware:v200r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "57D476DD-6ACB-48FD-8996-DA16C87EC5B9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9712_firmware:v200r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "50329C24-D57A-4DB0-A59C-78296DE6E245",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9712_firmware:v200r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "D65D5759-3D60-4970-80A2-88CA6F91F82F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9712:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EAE95138-F465-4765-8CDE-57E919DE35B9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s12708_firmware:v200r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "434113F3-0FE1-482F-B394-DB18F9337AC8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s12708:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0493CF1-EBB7-4CC3-A39E-8E51F547F75F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s12712_firmware:v200r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "8666DB9D-894A-42AA-9684-6BCD7603BAE1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s12712:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B02B3E3-8DD8-46AF-ADDC-C01D13F32C22",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:5700hi_firmware:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "02AD87BA-50DC-41C6-A055-3A1FA1D514A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:5700hi_firmware:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "DAC61AC5-1748-4F06-8C7D-A2B062DE64B9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:5700hi_firmware:v200r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5094D91-B760-4121-A907-DD0820F90C0C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:5700hi_firmware:v200r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "33610B36-21FA-4757-A0E4-30FBA43857AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:5700hi_firmware:v200r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "B03DD111-1855-47A3-9372-EF6538B2CBAD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:5700hi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "86B082EE-7CF6-4A8F-8B87-9BC00DFAC42C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:5300hi_firmware:v100r006:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6883B9F-CADB-42F3-83A2-BE1A6AEC1D5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:5300hi_firmware:v200r001:*:*:*:*:*:*:*",
                     matchCriteriaId: "376E2A76-407F-4B63-A382-32FD2B71E2CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:5300hi_firmware:v200r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "528A8616-3F27-463D-ADFA-97FD686A2B53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:5300hi_firmware:v200r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "93EAC2F1-F66B-49EE-8320-C2E76F698AD3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:5300hi_firmware:v200r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A7B8FCB-C2E1-469F-BC79-07F521010860",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:5300hi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A033732-572F-482D-B0F0-381D25DD5AD1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:5710ei_firmware:v200r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "5307BA1F-D19C-45CC-86B9-2CEB54CC56C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:5710ei_firmware:v200r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5416746-5CB9-4E48-9295-B6D5F89FD564",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:5710ei_firmware:v200r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "5361D604-F036-4141-B47B-1E4CCD33A0AE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:5710ei:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4D70918-3521-41E7-8340-39EAB327F9D6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:5310ei_firmware:v200r002:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D822F85-35F9-42D4-A9C3-D1E3C58BAC8C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:5310ei_firmware:v200r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A22F2CE-DB2B-4DBF-8CDF-0CD11E184C9C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:5310ei_firmware:v200r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BCA98BE-37A0-46D2-8126-C4C33A08D97D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:5310ei:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "05AB8556-D45B-4BFF-A642-76E80104FCB0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:5310hi_firmware:v200r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "D09AFDF7-FB89-4F8D-818C-944197FC04D8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:5310hi_firmware:v200r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "3DFD5612-CDA6-42A8-8B8E-46B5F7E386E7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:5310hi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FEAC3AB7-F383-44DF-A398-5837938A5CDC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:5710hi_firmware:v200r003:*:*:*:*:*:*:*",
                     matchCriteriaId: "9F926BFE-9B30-4B48-B424-70E07140A95B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:5710hi_firmware:v200r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "BBBEDF11-8E87-4176-AFD9-C76F3985FE15",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:5710hi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FAA6C2B-78F6-4A89-8855-B8C69CBF32D4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:6700ei_firmware:v200r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "52D94ACF-65B6-4E0E-AF76-5D34CD28A3D0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:6700ei:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA3B98F0-70C4-4CFC-A9C4-8E7F6D3A8314",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:6300ei_firmware:v200r005:*:*:*:*:*:*:*",
                     matchCriteriaId: "937AA375-941F-48C1-BC9E-8F0487A466CA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:6300ei:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B7B3C7B-1414-40F8-A5D4-CA857866F25B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei S9300, S9303, S9306, S9312 with software V100R002; S7700, S7703, S7706, S7712 with software V100R003, V100R006, V200R001, V200R002, V200R003, V200R005; S9300E, S9303E, S9306E, S9312E with software V200R001; S9700, S9703, S9706, S9712 with software V200R002, V200R003, V200R005; S12708, S12712 with software V200R005; 5700HI, 5300HI with software V100R006, V200R001, V200R002, V200R003, V200R005; 5710EI, 5310EI with software V200R002, V200R003, V200R005; 5710HI, 5310HI with software V200R003, V200R005; 6700EI, 6300EI with software V200R005 could cause a leak of IP addresses of devices, related to unintended interface support for VRP MPLS LSP Ping.",
      },
      {
         lang: "es",
         value: "Huawei S9300, S9303, S9306, S9312 con el software V100R002; S7700, S7703, S7706, S7712 con el software V100R003, V100R006, V200R001, V200R002, V200R003, V200R005; S9300E, S9303E, S9306E, S9312E con el software V200R001; S9700, S9703, S9706, S9712 con el software V200R002, V200R003, V200R005; S12708, S12712 con el software V200R005; 5700HI, 5300HI con el software V100R006, V200R001, V200R002, V200R003, V200R005; 5710EI, 5310EI con software V200R002, V200R003, V200R005; 5710HI, 5310HI con software V200R003, V200R005; 6700EI, 6300EI con el software V200R005 podría causar una fuga de direcciones IP de los dispositivos, relacionados con el soporte de interfaz no deseada para VRP MPLS LSP Ping.",
      },
   ],
   id: "CVE-2014-8570",
   lastModified: "2024-11-21T02:19:21.450",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2017-04-02T20:59:00.343",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/hw-372145",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/hw-372145",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-200",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-03-09 21:29
Modified
2024-11-21 03:00
Summary
Huawei S12700 V200R005C00, V200R006C00, V200R007C00, V200R008C00, S5700 V200R006C00, V200R007C00, V200R008C00, S6700 V200R008C00, S7700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, S9700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00 have a denial of service (DoS) vulnerability. Due to the lack of input validation, a remote attacker may craft a malformed Resource Reservation Protocol (RSVP) packet and send it to the device, causing a few buffer overflows and occasional device restart.
Impacted products
Vendor Product Version
huawei s12700_firmware v200r005c00
huawei s12700_firmware v200r006c00
huawei s12700_firmware v200r007c00
huawei s12700_firmware v200r008c00
huawei s12700 -
huawei s5700_firmware v200r006c00
huawei s5700_firmware v200r007c00
huawei s5700_firmware v200r008c00
huawei s5700 -
huawei s6700_firmware v200r008c00
huawei s6700 -
huawei s7700_firmware v200r001c00
huawei s7700_firmware v200r002c00
huawei s7700_firmware v200r003c00
huawei s7700_firmware v200r005c00
huawei s7700_firmware v200r006c00
huawei s7700_firmware v200r007c00
huawei s7700_firmware v200r008c00
huawei s7700 -
huawei s9700_firmware v200r001c00
huawei s9700_firmware v200r002c00
huawei s9700_firmware v200r003c00
huawei s9700_firmware v200r005c00
huawei s9700_firmware v200r006c00
huawei s9700_firmware v200r007c00
huawei s9700_firmware v200r008c00
huawei s9700 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D81469B-EC6C-493D-B632-4DF821A1F304",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6F2C4C7-3438-42B8-8999-C17E45C8CF49",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "10CBC93B-5CF6-45BF-A90A-84B7693E27FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD4C5CC9-FD60-4C64-8F88-CFC71BBEA663",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5973A534-F961-4A97-B20E-994BA28AFE29",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "40745A01-E5AC-4207-A34F-D8E7F7231F83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "21FFF548-FBEF-468A-A8DE-1DB1B7C0B3AF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DA5CF67-A58B-4666-B87E-712507233453",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F49D3EAD-1EB3-4C62-80BA-4C9C3CE0408C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D75B012-A57D-4C6D-AB26-51D2ECC02F35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1DFF0C0-AA17-4AA1-A418-4759D1A58852",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D84F05D5-BA7D-485B-91C2-273349335CFB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF3FB3CC-2EAC-4A08-BDDC-DCACEE9FA2AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "2377CD30-6F57-46CB-9DD1-E29458A7D928",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D79CD09-3414-4105-AD59-F3D1BAC61B7E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B1F0B3D-1923-42C3-A3DB-03D11BE059D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4FB6ED15-477B-4BB5-AA94-0D7897FBD962",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "06AD9ACA-E0C3-4096-BE50-94E717CDA318",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "325D6523-A07A-48D4-AD44-CF838BD77432",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AC7E622-010C-4C5D-8AA6-D4793AFCE0E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D78DAB13-32AA-4813-AB0A-0EA870F41183",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "36AB80F7-1BD2-4169-AC70-708CE84BB15C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei S12700 V200R005C00, V200R006C00, V200R007C00, V200R008C00, S5700 V200R006C00, V200R007C00, V200R008C00, S6700 V200R008C00, S7700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, S9700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00 have a denial of service (DoS) vulnerability. Due to the lack of input validation, a remote attacker may craft a malformed Resource Reservation Protocol (RSVP) packet and send it to the device, causing a few buffer overflows and occasional device restart.",
      },
      {
         lang: "es",
         value: "Huawei S12700 V200R005C00, V200R006C00, V200R007C00, V200R008C00, S5700 V200R006C00, V200R007C00, V200R008C00, S6700 V200R008C00, S7700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, S9700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00 y V200R008C00 tienen una vulnerabilidad de denegación de servicio (DoS). Debido a la falta de validación de entradas, un atacante remoto podría manipular un paquete RSVP (Resource Reservation Protocol) mal formado y enviarlo al dispositivo, lo que provocaría unos pocos desbordamientos de búfer y reincios ocasionales del dispositivo.",
      },
   ],
   id: "CVE-2016-8786",
   lastModified: "2024-11-21T03:00:04.643",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.8,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-03-09T21:29:00.440",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161228-01-rsvp-en",
      },
      {
         source: "psirt@huawei.com",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/95139",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161228-01-rsvp-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/95139",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-12-13 15:15
Modified
2024-11-21 04:34
Summary
There is a weak algorithm vulnerability in some Huawei products. The affected products use weak algorithms by default. Attackers may exploit the vulnerability to cause information leaks.
Impacted products
Vendor Product Version
huawei s12700_firmware v200r007c00
huawei s12700_firmware v200r007c01
huawei s12700_firmware v200r007c20
huawei s12700_firmware v200r008c00
huawei s12700_firmware v200r010c00
huawei s12700_firmware v200r011c10
huawei s12700_firmware v200r012c00
huawei s12700 -
huawei s1700_firmware v200r006c10
huawei s1700_firmware v200r010c00
huawei s1700_firmware v200r011c10
huawei s1700_firmware v200r012c00
huawei s1700_firmware v200r012c20
huawei s1700 -
huawei s2700_firmware v200r006c00
huawei s2700_firmware v200r006c10
huawei s2700_firmware v200r007c00
huawei s2700_firmware v200r008c00
huawei s2700_firmware v200r010c00
huawei s2700_firmware v200r011c00
huawei s2700_firmware v200r011c10
huawei s2700_firmware v200r012c00
huawei s2700 -
huawei s5700_firmware v200r005c00
huawei s5700_firmware v200r005c02
huawei s5700_firmware v200r005c03
huawei s5700_firmware v200r006c00
huawei s5700_firmware v200r007c00
huawei s5700_firmware v200r008c00
huawei s5700_firmware v200r010c00
huawei s5700_firmware v200r011c00
huawei s5700_firmware v200r011c10
huawei s5700_firmware v200r012c00
huawei s5700_firmware v200r012c20
huawei s5700 -
huawei s6700_firmware v200r005c00
huawei s6700_firmware v200r005c01
huawei s6700_firmware v200r005c02
huawei s6700_firmware v200r008c00
huawei s6700_firmware v200r010c00
huawei s6700_firmware v200r011c00
huawei s6700_firmware v200r011c10
huawei s6700_firmware v200r012c00
huawei s6700 -
huawei s7700_firmware v200r006c00
huawei s7700_firmware v200r007c00
huawei s7700_firmware v200r008c00
huawei s7700_firmware v200r010c00
huawei s7700_firmware v200r011c10
huawei s7700_firmware v200r012c00
huawei s7700 -
huawei s9700_firmware v200r006c00
huawei s9700_firmware v200r007c00
huawei s9700_firmware v200r007c01
huawei s9700_firmware v200r008c00
huawei s9700_firmware v200r010c00
huawei s9700_firmware v200r011c10
huawei s9700_firmware v200r012c00
huawei s9700 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "10CBC93B-5CF6-45BF-A90A-84B7693E27FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC4803A7-44B2-41BA-814D-151239B92CEF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "985C07E4-1E27-4191-9FB8-4714A177479D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD4C5CC9-FD60-4C64-8F88-CFC71BBEA663",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "933755CC-4A0B-42FB-9491-3C841059851D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D6FF612-2F2B-4B75-8D97-86205DFCF0CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r012c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDC385D3-E82B-454B-A131-971F3B830EC9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "410E8DAA-E961-46E1-96E2-3AC4B40D8359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "099E36B0-125F-4B3F-8D4A-01F8882CF53B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "342E032C-BAE5-4F15-8BAE-84F9D9AA58D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r012c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC439F55-11AB-42D2-B891-C6C5D62FF5F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r012c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF8C93E3-C155-47D2-A927-D4D4F17BA494",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22FE26B5-C6D6-4A6C-8526-ED94F4F57C2C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "193FCE7A-C793-446B-9C39-20597FA7BC70",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC1D26AA-09DF-49DA-930F-A2EAEA486361",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E364889D-CDEE-4D8C-82E5-6D5BC3DD768A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB8FC67E-DFD3-482E-B7D6-17464885B8DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5561195B-7385-4175-9D29-77E95E4E9AB6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r011c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9461516A-F5BB-4A52-A315-8C2B559528A0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "20648023-4CC5-4606-BE8E-70A5C20D7BE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r012c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1449504A-662C-403C-85AF-CCB5219CE976",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD2CD071-58E4-4061-8217-990453213470",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCF23DAE-1215-41B2-88C5-4436D846266C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r005c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB33B908-085C-43C6-B8B7-25BBF3614C9E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r005c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B18ABC1-A970-472A-A8BF-934D1180930E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5973A534-F961-4A97-B20E-994BA28AFE29",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "40745A01-E5AC-4207-A34F-D8E7F7231F83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "21FFF548-FBEF-468A-A8DE-1DB1B7C0B3AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA744621-893C-4F7E-80A1-66559BC6D6F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r011c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD2FEF0B-B4AC-4EDB-AD25-41F4F9DA1DAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "AFD7EF17-710B-4363-87B7-CE1B4447BF99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r012c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "17CDA635-A9E7-4678-8970-22DFC028BAF7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r012c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B80F5B3-147A-46E3-9306-70052511A6D2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F18D9776-5CE7-4DD3-9119-7FB08A35B955",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r005c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4979AA8-0D8E-4F37-A7DC-709BE4821D51",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r005c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "898AC16A-8F4E-4709-A3B4-DE74FFB91130",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DA5CF67-A58B-4666-B87E-712507233453",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "91E52545-B12E-43EC-B132-28FA2E511316",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r011c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "11F25342-CE07-44CD-BD61-A998DFC8EF8E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C34E6D4-67FE-4AA4-A825-9666A302F771",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r012c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA68BF50-9118-445D-B778-E60812E67B98",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF3FB3CC-2EAC-4A08-BDDC-DCACEE9FA2AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "2377CD30-6F57-46CB-9DD1-E29458A7D928",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D79CD09-3414-4105-AD59-F3D1BAC61B7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "37E3F87E-EA36-41ED-8793-F6C166FFC4A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "26F2CC30-626B-4FEE-BDAD-6A5990DE6384",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r012c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D43F5AE6-A4CD-4C45-A8A4-D5B064FE7C27",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AC7E622-010C-4C5D-8AA6-D4793AFCE0E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D78DAB13-32AA-4813-AB0A-0EA870F41183",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "38515A04-EC21-40B3-A29C-8D0A5883EA4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "36AB80F7-1BD2-4169-AC70-708CE84BB15C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C6DC309-2FC6-4014-9C2B-8EE12C7BB08F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B06663D-8499-42B9-83E1-E369F1FD0070",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r012c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B299A06-5D99-43A8-ACF3-4D79174C536E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "There is a weak algorithm vulnerability in some Huawei products. The affected products use weak algorithms by default. Attackers may exploit the vulnerability to cause information leaks.",
      },
      {
         lang: "es",
         value: "Se presenta una vulnerabilidad de algoritmo débil en algunos productos Huawei. Los productos afectados utilizan algoritmos débiles por defecto. Los atacantes pueden explotar la vulnerabilidad para causar filtrados de información.",
      },
   ],
   id: "CVE-2019-19397",
   lastModified: "2024-11-21T04:34:43.150",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-12-13T15:15:11.113",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-01-vrp-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-01-vrp-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}