Search criteria
27 vulnerabilities found for secospace_antiddos8000_firmware by huawei
FKIE_CVE-2020-1864
Vulnerability from fkie_nvd - Published: 2020-03-20 15:15 - Updated: 2024-11-21 05:11
Severity ?
Summary
Some Huawei products have a security vulnerability due to improper authentication. A remote attacker needs to obtain some information and forge the peer device to send specific packets to the affected device. Due to the improper implementation of the authentication function, attackers can exploit the vulnerability to connect to affected devices and execute a series of commands.Affected product versions include:Secospace AntiDDoS8000 versions V500R001C00,V500R001C20,V500R001C60,V500R005C00.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| huawei | secospace_antiddos8000_firmware | v500r001c00 | |
| huawei | secospace_antiddos8000_firmware | v500r001c20 | |
| huawei | secospace_antiddos8000_firmware | v500r001c60 | |
| huawei | secospace_antiddos8000_firmware | v500r005c00 | |
| huawei | secospace_antiddos8000 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c00:*:*:*:*:*:*:*",
"matchCriteriaId": "7CA7ED4D-0BDB-4535-B121-F6D75D809D2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "315EE2BA-475E-4937-BD81-7CD79AA2E377",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c60:*:*:*:*:*:*:*",
"matchCriteriaId": "D44C6818-A25F-439C-873C-57CA6DFE4B91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "EF2F8FA9-D98F-4B2B-922F-B1A3D111253A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:secospace_antiddos8000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EE75ACF-D29C-4846-932D-FB9C84E1D35F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Some Huawei products have a security vulnerability due to improper authentication. A remote attacker needs to obtain some information and forge the peer device to send specific packets to the affected device. Due to the improper implementation of the authentication function, attackers can exploit the vulnerability to connect to affected devices and execute a series of commands.Affected product versions include:Secospace AntiDDoS8000 versions V500R001C00,V500R001C20,V500R001C60,V500R005C00."
},
{
"lang": "es",
"value": "Algunos productos de Huawei presentan una vulnerabilidad de seguridad debido a una autenticaci\u00f3n inapropiada. Un atacante remoto necesita obtener cierta informaci\u00f3n y falsificar el dispositivo peer para enviar paquetes espec\u00edficos hacia el dispositivo afectado. Debido a la implementaci\u00f3n inapropiada de la funci\u00f3n de autenticaci\u00f3n, los atacantes pueden explotar la vulnerabilidad para conectar con los dispositivos afectados y ejecutar una serie de comandos. Las versiones afectadas del producto incluyen: Secospace AntiDDoS8000 versiones V500R001C00, V500R001C20, V500R001C60, V500R005C00."
}
],
"id": "CVE-2020-1864",
"lastModified": "2024-11-21T05:11:30.427",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-03-20T15:15:14.247",
"references": [
{
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200318-01-authentication-en"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200318-01-authentication-en"
}
],
"sourceIdentifier": "psirt@huawei.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2019-5304
Vulnerability from fkie_nvd - Published: 2020-01-03 15:15 - Updated: 2024-11-21 04:44
Severity ?
Summary
Some Huawei products have a buffer error vulnerability. An unauthenticated, remote attacker could send specific MPLS Echo Request messages to the target products. Due to insufficient input validation of some parameters in the messages, successful exploit may cause the device to reset.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*",
"matchCriteriaId": "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*",
"matchCriteriaId": "5DD9E894-321E-4A61-9DA6-677042DDD739",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*",
"matchCriteriaId": "79DA91B4-77A6-4A37-8799-5E548184D49C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c50:*:*:*:*:*:*:*",
"matchCriteriaId": "14AE26C9-C434-4EFB-A1E6-64563BFAA389",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0CFDB51-BF44-4433-AB2A-CFF553F8D640",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r003c01:*:*:*:*:*:*:*",
"matchCriteriaId": "4FFC3539-5078-4E8E-AA32-F81945EB12FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r005c20:*:*:*:*:*:*:*",
"matchCriteriaId": "1F8934C1-9162-4C52-A0FC-6B2914E93304",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*",
"matchCriteriaId": "CFE416CD-53B5-4E08-BB30-682887740C3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*",
"matchCriteriaId": "F64071E5-6ACD-4E51-9162-B0FF3DC08E07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*",
"matchCriteriaId": "C623D44E-463B-49A3-81F8-AD219E035B09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r008c50:*:*:*:*:*:*:*",
"matchCriteriaId": "75E27982-56E6-4A6F-9124-34C7420FDDE1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D4BA4150-8CA8-48BF-9D45-ABC8AC710060",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r003c01:*:*:*:*:*:*:*",
"matchCriteriaId": "1426C52B-72BB-4EA3-ABF6-ED14B13404B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r005c20:*:*:*:*:*:*:*",
"matchCriteriaId": "3BC1D978-9DA1-4165-A66C-2D274B188C88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
"matchCriteriaId": "EBB60F62-0715-4C1E-B352-A3D61B56E2AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
"matchCriteriaId": "D125153E-FE39-49A7-95AA-9482C78E7114",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
"matchCriteriaId": "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c50:*:*:*:*:*:*:*",
"matchCriteriaId": "DF226F5B-7BF8-4475-8C0C-91E2E43C6E53",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B053C248-3CC2-476D-95A7-90EDD8EAAD69",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r003c01:*:*:*:*:*:*:*",
"matchCriteriaId": "2D2DBE3C-873E-4620-B438-3187054EBD6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r005c20:*:*:*:*:*:*:*",
"matchCriteriaId": "BDFC3878-5A1D-4846-B4F9-3D1FC1DBCF5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*",
"matchCriteriaId": "C0D92A6F-B30C-4E09-91FC-9C7FFF375710",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*",
"matchCriteriaId": "455D7A4E-523E-40C8-958D-59D128F3E797",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*",
"matchCriteriaId": "6B64AE02-D345-4628-A086-7C63C255707C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r008c50:*:*:*:*:*:*:*",
"matchCriteriaId": "25AB058D-C4EB-416F-ACD3-B6ACC2BD83AA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*",
"matchCriteriaId": "526371A8-11FE-4D00-AFBB-8E867A320B27",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r003c01:*:*:*:*:*:*:*",
"matchCriteriaId": "B1868FD9-8FC3-4051-8F22-F2BDF48854A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r005c20:*:*:*:*:*:*:*",
"matchCriteriaId": "4403DAD1-90B3-44EC-8A34-64D6E321170B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10:*:*:*:*:*:*:*",
"matchCriteriaId": "72BC8C3E-420F-49D1-9E58-98E4E23A024F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*",
"matchCriteriaId": "787AC5E3-CE88-491D-8211-BAB11112019D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*",
"matchCriteriaId": "868602DB-D063-4BE4-A02B-936433CD8231",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c50:*:*:*:*:*:*:*",
"matchCriteriaId": "C194C888-308D-4301-A277-598AD954010E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r005c20:*:*:*:*:*:*:*",
"matchCriteriaId": "372E2136-95CE-4833-B4AF-306F0807BA79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*",
"matchCriteriaId": "85A72083-717F-4C71-A2D7-62E1C64FEE94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*",
"matchCriteriaId": "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*",
"matchCriteriaId": "A685289C-08B1-43D4-9970-84A7FC75E54B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r008c50:*:*:*:*:*:*:*",
"matchCriteriaId": "2D609298-9ACE-4726-AD04-6765D8F2C374",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*",
"matchCriteriaId": "137A007D-A498-483F-8B4F-DCA118B25F11",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r003c01:*:*:*:*:*:*:*",
"matchCriteriaId": "798A67F0-A357-48AC-97FB-D1EA03B932D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r005c20:*:*:*:*:*:*:*",
"matchCriteriaId": "629DF7DD-4900-41CB-B257-7DE20A9B9DFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*",
"matchCriteriaId": "A7C77ADC-2511-4630-B5F5-F2991EA39E0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*",
"matchCriteriaId": "622686BB-9302-449F-9351-75B189D1B184",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*",
"matchCriteriaId": "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r008c50:*:*:*:*:*:*:*",
"matchCriteriaId": "A1ED9DF8-A444-4684-932D-12B4B2F98736",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r003c01:*:*:*:*:*:*:*",
"matchCriteriaId": "D0BFABDC-1D81-4FA0-BA60-E3AC9680941F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r005c20:*:*:*:*:*:*:*",
"matchCriteriaId": "17586781-04AB-4285-BCA2-5DB13B8D94E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
"matchCriteriaId": "C7114E20-407A-4B1C-9FCE-FF367B50E0E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
"matchCriteriaId": "BE9B95EB-A848-4311-8500-9C909784393E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
"matchCriteriaId": "BE2EC4F9-EB14-4628-9F89-34168BBD6A56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c50:*:*:*:*:*:*:*",
"matchCriteriaId": "C736642A-6B32-458B-AF12-FD45534BEA60",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r003c01:*:*:*:*:*:*:*",
"matchCriteriaId": "7E941177-EB4C-4EFB-930C-D2205A94D828",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r005c20:*:*:*:*:*:*:*",
"matchCriteriaId": "36DE9947-C096-4B7F-8F3E-748DEFC677C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*",
"matchCriteriaId": "2F042B27-F875-4BA3-9002-E5ADC544208B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*",
"matchCriteriaId": "F377CE1E-77A7-447F-B692-A54682A26BB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*",
"matchCriteriaId": "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r008c50:*:*:*:*:*:*:*",
"matchCriteriaId": "64CC27CC-EE60-46DE-91CE-6C83AF1F7B3A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "50662078-4827-4706-AE29-170E2239C5AE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r003c01:*:*:*:*:*:*:*",
"matchCriteriaId": "F6C5B4A6-CB18-4481-A5A2-EE9ABC82D89D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r005c20:*:*:*:*:*:*:*",
"matchCriteriaId": "A8A20ED1-7138-4FD0-BA2B-637D41739603",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
"matchCriteriaId": "32119825-AF22-44AA-8D04-1FAACF9E2E89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
"matchCriteriaId": "B897F931-00B2-4FDF-90CE-5077416E42BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c50:*:*:*:*:*:*:*",
"matchCriteriaId": "3409C0D7-74AF-46AD-9E93-9D1F187C291F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5862E1A5-0222-4059-B9D7-716A6D0EB8CC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r003c01:*:*:*:*:*:*:*",
"matchCriteriaId": "C7653DC1-2293-4420-BC2A-2DC0FF2210E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r005c20:*:*:*:*:*:*:*",
"matchCriteriaId": "3C10C07E-5194-4EAB-9AC8-DB87CE52F5FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*",
"matchCriteriaId": "DB9A3444-A485-4B87-B910-F3DA5C8E5D74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*",
"matchCriteriaId": "9752658E-3CF5-4D9E-98FB-D15FD892479C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*",
"matchCriteriaId": "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c50:*:*:*:*:*:*:*",
"matchCriteriaId": "4FD70804-3A07-4C82-806B-5F5CA075ABF1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9309E1AA-0C4E-422C-9307-A8DD0AE5D576",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*",
"matchCriteriaId": "26CFB676-658E-4DEF-8C29-13CA633D7270",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*",
"matchCriteriaId": "7D395DD8-E338-457E-A4E6-D3A08DE1B571",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*",
"matchCriteriaId": "6E52BCED-46D1-4ED9-9A8A-41AA4B88A1AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ar3600_firmware:v200r008c50:*:*:*:*:*:*:*",
"matchCriteriaId": "52BBC28A-2A50-402F-B3CA-03718789F503",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D30DC2EA-1F76-4CA6-BAC2-8DC796BE50B1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*",
"matchCriteriaId": "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "1A8E1096-F070-4CE9-B2B4-6368890706A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*",
"matchCriteriaId": "F46A81BE-C125-4CAE-8EE1-23177FE0C21E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
"matchCriteriaId": "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "1856722C-597D-495D-AFCC-21E5FF6F2359",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
"matchCriteriaId": "728A7B78-6E19-4656-848F-269DB955070C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E054182-CE33-45E3-8595-159A75BA5162",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "CDC040A6-3E38-4B21-9779-67CF66FDC6B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
"matchCriteriaId": "946F5FF7-412F-40F9-A492-DE8E11E7B919",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE8CA649-7AE1-497C-869B-B4DD315F342C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r005c20:*:*:*:*:*:*:*",
"matchCriteriaId": "A321DABC-2B17-4B32-AF63-944476C0E68D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*",
"matchCriteriaId": "BE7A0E2C-8383-443D-8625-77CBC53D2140",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*",
"matchCriteriaId": "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*",
"matchCriteriaId": "DA500A69-F8E4-46A8-9B46-F318F9110C3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c50:*:*:*:*:*:*:*",
"matchCriteriaId": "F75C6A63-E42C-4D42-9E66-F561D9B67D8B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6224ECC-6949-4204-94D1-C7374C142A50",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "DCF23DAE-1215-41B2-88C5-4436D846266C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r005c02:*:*:*:*:*:*:*",
"matchCriteriaId": "CB33B908-085C-43C6-B8B7-25BBF3614C9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r005c03:*:*:*:*:*:*:*",
"matchCriteriaId": "5B18ABC1-A970-472A-A8BF-934D1180930E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
"matchCriteriaId": "5973A534-F961-4A97-B20E-994BA28AFE29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
"matchCriteriaId": "40745A01-E5AC-4207-A34F-D8E7F7231F83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
"matchCriteriaId": "21FFF548-FBEF-468A-A8DE-1DB1B7C0B3AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r010c00:*:*:*:*:*:*:*",
"matchCriteriaId": "FA744621-893C-4F7E-80A1-66559BC6D6F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r011c00:*:*:*:*:*:*:*",
"matchCriteriaId": "DD2FEF0B-B4AC-4EDB-AD25-41F4F9DA1DAA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E22D3CFF-3353-4EE2-8933-84F395469D0D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:s6700_firmware:v200r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "F18D9776-5CE7-4DD3-9119-7FB08A35B955",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:s6700_firmware:v200r005c01:*:*:*:*:*:*:*",
"matchCriteriaId": "F4979AA8-0D8E-4F37-A7DC-709BE4821D51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:s6700_firmware:v200r005c02:*:*:*:*:*:*:*",
"matchCriteriaId": "898AC16A-8F4E-4709-A3B4-DE74FFB91130",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
"matchCriteriaId": "8DA5CF67-A58B-4666-B87E-712507233453",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:s6700_firmware:v200r010c00:*:*:*:*:*:*:*",
"matchCriteriaId": "91E52545-B12E-43EC-B132-28FA2E511316",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:s6700_firmware:v200r011c00:*:*:*:*:*:*:*",
"matchCriteriaId": "11F25342-CE07-44CD-BD61-A998DFC8EF8E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA7AC10D-B0DD-4206-8642-134DDD585C06",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r003c01:*:*:*:*:*:*:*",
"matchCriteriaId": "DE6E21C6-B5EF-4879-A5D6-4C63276B2EBF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r005c20:*:*:*:*:*:*:*",
"matchCriteriaId": "98DCADD0-8E0D-4241-AB94-32233C46790E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*",
"matchCriteriaId": "5DF1DFD2-5337-45CA-A1A9-2E6622536027",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*",
"matchCriteriaId": "B319F31F-94D7-468F-8F71-96F40867AEA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*",
"matchCriteriaId": "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r008c50:*:*:*:*:*:*:*",
"matchCriteriaId": "D578E607-CF83-4121-8AF9-EF1DBE5FE42F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r003c01:*:*:*:*:*:*:*",
"matchCriteriaId": "B1731F76-5FE7-4B09-8696-096D0C21CD79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r005c20:*:*:*:*:*:*:*",
"matchCriteriaId": "9C897138-887E-4CD9-B4D2-A8D5DAA851DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*",
"matchCriteriaId": "D485D5E3-3819-4F3A-B841-ACB6253ACF2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*",
"matchCriteriaId": "D10EBBF2-8F03-472C-96DB-C72E426E4E38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*",
"matchCriteriaId": "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r008c50:*:*:*:*:*:*:*",
"matchCriteriaId": "D672376C-4256-4CFB-A515-56E31A6706AB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9BAF601C-B8EC-42F5-95F4-274F8492F57E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r003c01:*:*:*:*:*:*:*",
"matchCriteriaId": "83FEA92D-9EE0-4AE7-9BC6-563F1887BF0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r005c20:*:*:*:*:*:*:*",
"matchCriteriaId": "202E709E-CC7D-44AF-A63F-30A6A738F5EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*",
"matchCriteriaId": "309B9B0E-3639-4913-9DE4-9D4DAE6B0065",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*",
"matchCriteriaId": "4619CF2C-AB5D-475A-ACF6-61EE02306F7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*",
"matchCriteriaId": "E497D97B-F044-4F9A-84B0-378978FBDC58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r008c50:*:*:*:*:*:*:*",
"matchCriteriaId": "43BAC724-4E88-4E3B-9F95-8086D68CADA9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43681AE7-5C12-4772-85A9-0A10177C6CFD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "315EE2BA-475E-4937-BD81-7CD79AA2E377",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c60:*:*:*:*:*:*:*",
"matchCriteriaId": "D44C6818-A25F-439C-873C-57CA6DFE4B91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "EF2F8FA9-D98F-4B2B-922F-B1A3D111253A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:secospace_antiddos8000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EE75ACF-D29C-4846-932D-FB9C84E1D35F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
"matchCriteriaId": "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "B3983A57-2F07-4D21-9093-1DFEAB310E26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
"matchCriteriaId": "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*",
"matchCriteriaId": "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE469876-F873-4705-9760-097AE840A818",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Some Huawei products have a buffer error vulnerability. An unauthenticated, remote attacker could send specific MPLS Echo Request messages to the target products. Due to insufficient input validation of some parameters in the messages, successful exploit may cause the device to reset."
},
{
"lang": "es",
"value": "Algunos productos de Huawei tienen una vulnerabilidad de error de b\u00fafer. Un atacante remoto no identificado podr\u00eda enviar mensajes MPLS Echo Request espec\u00edficos hacia los productos de destino. Debido a una insuficiente comprobaci\u00f3n de entrada de algunos par\u00e1metros en los mensajes, una explotaci\u00f3n con \u00e9xito puede causar que el dispositivo se reinicie."
}
],
"id": "CVE-2019-5304",
"lastModified": "2024-11-21T04:44:42.770",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-01-03T15:15:11.993",
"references": [
{
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200102-01-buffer-en"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200102-01-buffer-en"
}
],
"sourceIdentifier": "psirt@huawei.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-120"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2019-5256
Vulnerability from fkie_nvd - Published: 2019-12-13 23:15 - Updated: 2024-11-21 04:44
Severity ?
Summary
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have a null pointer dereference vulnerability. The system dereferences a pointer that it expects to be valid, but is NULL. A local attacker could exploit this vulnerability by sending crafted parameters. A successful exploit could cause a denial of service and the process reboot.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ap2000_firmware:v200r005c30:*:*:*:*:*:*:*",
"matchCriteriaId": "B0036EB0-2E93-45E8-BFC6-00C254075F52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ap2000_firmware:v200r006c10:*:*:*:*:*:*:*",
"matchCriteriaId": "BFAEA83D-A929-4039-8792-AAB6191E7990",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ap2000_firmware:v200r006c20:*:*:*:*:*:*:*",
"matchCriteriaId": "C51D8548-6514-42CB-8557-BB7F971BF773",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ap2000_firmware:v200r007c10:*:*:*:*:*:*:*",
"matchCriteriaId": "1405158C-0B15-4D8D-B81A-C75B4586F7CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ap2000_firmware:v200r007c20:*:*:*:*:*:*:*",
"matchCriteriaId": "BD3D740E-F15F-4891-9059-E38A8F539FC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ap2000_firmware:v200r008c00:*:*:*:*:*:*:*",
"matchCriteriaId": "EECB7991-8CED-4DC6-9FB4-A8F5133583FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ap2000_firmware:v200r008c10:*:*:*:*:*:*:*",
"matchCriteriaId": "89C3653F-4AD5-4529-97C2-EFD3CC8B675C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ap2000_firmware:v200r009c00:*:*:*:*:*:*:*",
"matchCriteriaId": "63DE29FC-8571-41A7-95E5-05A760042F67",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ap2000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B7B5DEF1-5211-4843-BB26-103F7F3A2451",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "6619E377-0840-429D-A6C3-4A931811C12D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "23AEEF30-B626-4E84-A285-6E2A27F8994D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
"matchCriteriaId": "D92C5F28-9E62-421D-9ADB-50297AB29617",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
"matchCriteriaId": "12EE2BF6-880D-4A2F-8C25-6E3241DAE8DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "9ADACE38-43C3-412B-9911-AC6F9AD70299",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "E1190010-5B7D-4238-AE9A-6B0E5A95F4C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "FF6897E9-791E-4FE1-BF13-06E12326152D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "E71B6952-3ADF-45E9-A7E5-C0CCEDF43661",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
"matchCriteriaId": "15403867-09B3-4A36-88B0-A063D9E3673B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "16495210-738B-454B-87FA-DDCD3A85A463",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
"matchCriteriaId": "18DF99D5-6DEE-4872-AA00-F36E04D94DB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "F3D8BAB3-FC11-445D-A9AF-0378A36478B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c30:*:*:*:*:*:*:*",
"matchCriteriaId": "1EB4588F-67BA-46AC-90BE-746071779A0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c30spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "6B3B4756-9FA2-4911-97BA-9EA9EEC1BE4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c30spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "CF2C610B-142D-4BC7-9D50-A8827E37378A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "4206BD23-9583-460B-AC2D-9C562E1CC36A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c30spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "4060AF02-76A0-401A-95FA-241E4F1553C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c30spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "CEAFE113-89D6-439D-942E-2B4C0E753164",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c50:*:*:*:*:*:*:*",
"matchCriteriaId": "83CC5640-CDFD-4F7A-9ED6-96FCB0A63E58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c50pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "62D53945-D259-4C20-AE0E-BC4940E55B1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c80:*:*:*:*:*:*:*",
"matchCriteriaId": "5D61947E-9847-4BF7-8DBD-2FE13DA2476A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "14BCD5D2-C2B8-4FE2-945B-C55C84A25A66",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ips:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2B9F8312-6BEB-4334-A56E-B6C78F18C47A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "F8401A77-C046-4B00-B102-1188150A4299",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "B7BA9381-E9DD-4C5E-8CDE-418FC3E65967",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "1B7A1419-9F83-4937-A0E5-B0C897A58BFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
"matchCriteriaId": "71C0C6F0-44C2-4424-BE4A-1E8008C91DD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
"matchCriteriaId": "15963AA2-A849-47FD-BCD7-4CACACB20686",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "D09FB28D-6CA5-4BC3-8E30-F516EE1B23CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "069A3589-D8B9-4901-90F4-036428334F87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "6F376395-2A80-47E3-8AD0-46D55B6E4EF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "754F694C-757D-40BB-8854-D7940B5E0666",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
"matchCriteriaId": "B59A0FF2-DEDE-44E4-B4F6-3E718BF8C72A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "3782563A-3A4A-4823-817B-B6B01298F8B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
"matchCriteriaId": "7056C4BD-4A05-4C22-8964-A62C0CED3702",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "EAE25CE5-8431-4AE6-AE6B-199BEEE564F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c00:*:*:*:*:*:*:*",
"matchCriteriaId": "2245A997-F394-49B7-8BF6-57A9B1EC8731",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c00spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "F15C389E-1280-4E27-989A-E9CEC2FBC7F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c00spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "0A9693E6-D988-4FAC-AFA6-5B06FBE14175",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c00spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "D03F984B-399A-425F-8ADE-138637FD9246",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c00spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "5C0E365B-07E3-4971-BEFF-C2A825D49A15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c00spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "8A2F1EB8-A556-4BC7-A4D9-1CD549468CAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c10:*:*:*:*:*:*:*",
"matchCriteriaId": "22AF8105-E0F6-4284-A2CD-3D393F7A3386",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c10pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "7986A4EA-B908-4C7B-A419-63766A95D0D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c30:*:*:*:*:*:*:*",
"matchCriteriaId": "CFEF6777-327D-4ACB-9E63-3E6D0E1CEF57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c30pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "4BEB21F6-0CE9-4498-9409-43C4C57CAFEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "20862015-772A-4E26-9EFB-6E24CCABFC1F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ngfw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE88F4A1-3184-447D-990C-87EE39316D82",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "68837186-E482-40E9-8F40-75B2E0AA10D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "CCFBC7B3-5886-4982-8200-8062236CB760",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
"matchCriteriaId": "B01CA368-6476-49AB-8CE1-090F7DAA5842",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
"matchCriteriaId": "B0D493EC-C5C8-444B-BCA6-227D047AAB06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "1856722C-597D-495D-AFCC-21E5FF6F2359",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "80CC85C8-F102-4E5F-BAD3-9658D87CE953",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "BB63DB6A-7D35-4FD2-9707-C38098CB004E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "CD3921D5-81A0-4700-A302-7F4C276D4ABE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
"matchCriteriaId": "B9975E43-DEAF-4738-AB02-EADA280D69E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "B3D1AB25-9A98-46F9-853C-574CDE7E6677",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
"matchCriteriaId": "85BBD592-7528-4CAA-AA4F-6A6B0BEC785A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "DAFC740E-19B2-4F35-935D-56B87C73CA82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
"matchCriteriaId": "728A7B78-6E19-4656-848F-269DB955070C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "90628E91-F95D-47A8-A580-1B0A5BDE3E3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "2316F625-3ABE-49B8-AFBE-50858E2EBCD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "42C2CAD1-543D-47E2-9B12-6B2E8538C8DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "C44F7CB4-B353-4A1F-8AC9-206A5058B6EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "9C6A9790-ACA0-4BD5-9EDE-BA9619309343",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*",
"matchCriteriaId": "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "C2C3BA92-67AA-49C9-B1B3-562B875DDFB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c80:*:*:*:*:*:*:*",
"matchCriteriaId": "90CC612C-820C-4A6E-ABA8-4DE8E4E050AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "A3462B41-1DC4-4451-9575-F81C52F7A23C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E054182-CE33-45E3-8595-159A75BA5162",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "68435D97-592E-4633-BE7D-E8C47D89CD7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "64CD24E9-2CE1-4006-A281-90B4373CFC4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
"matchCriteriaId": "F22A4D97-365C-4259-9E54-77053798FD17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
"matchCriteriaId": "A19E9912-4CBD-4734-9E2F-F4262FDE7DEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "CDC040A6-3E38-4B21-9779-67CF66FDC6B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "9038E75D-50F4-4849-BD2C-8846A353B53E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "992C3880-BDBE-4CE1-8F9C-C2E488EC56E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "0545D687-6670-41B4-A1B1-1048879658B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
"matchCriteriaId": "B573FC8A-39A8-4256-97B7-1E85CA7260DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "59DC9D0D-9AF8-42DE-8B40-DA4764FBC92D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
"matchCriteriaId": "FAD2D344-EFF9-4EA8-B387-2C80FC70DC44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
"matchCriteriaId": "946F5FF7-412F-40F9-A492-DE8E11E7B919",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "5485B45E-A4CB-4177-89C7-02F18875C8C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "8116853E-1381-4CA9-A23D-FDC8D14F4987",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "F9FE889E-58A9-4D93-8054-7B845C44BDA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "0FED9D6D-98F0-4C91-994F-E11A8ED65F29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "70449EC6-AD48-4B39-9D35-7B4C5ABC498D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*",
"matchCriteriaId": "678FFB3B-C6E1-4694-B51C-D56E26B53E1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "4AEE2D42-BCFF-4C9D-9C11-6A013E671179",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c80:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF85B0A-2737-4CF8-9535-E38EA164395A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "9AC093ED-A979-4484-B758-1C16DF2D6030",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE8CA649-7AE1-497C-869B-B4DD315F342C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*",
"matchCriteriaId": "1D5066C9-7581-4284-AF23-0782870B2F03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "441C141E-5C9F-44D9-91A7-9E0426339810",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6800_firmware:v500r001c80:*:*:*:*:*:*:*",
"matchCriteriaId": "825F695B-F709-466C-BC05-B1C505991EFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "D6FCA659-5DF8-44EA-91B6-A80FBB68322A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "875441DD-575F-4F4D-A6BD-23C38641D330",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r005c03:*:*:*:*:*:*:*",
"matchCriteriaId": "5B18ABC1-A970-472A-A8BF-934D1180930E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E22D3CFF-3353-4EE2-8933-84F395469D0D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "FC6AFAC9-2A17-41D9-879F-8615305801BB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46EE0FA6-7E53-488F-81A7-B2C906D65552",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "BAF6142E-A559-412B-ADC5-06AC2362D762",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C80D3BB-868B-461C-B97A-9C94C9F80858",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "5770C48B-2E2B-4A9F-A3CC-7100B0951F74",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DDD8D36D-A4F2-4423-B57E-E9933710201E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:semg9811_firmware:v500r002c20:*:*:*:*:*:*:*",
"matchCriteriaId": "317EDE28-2FFF-4E62-9C1E-BF94935EA640",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:semg9811_firmware:v500r002c30:*:*:*:*:*:*:*",
"matchCriteriaId": "237CCC4D-23B6-460E-B88F-5DBB2F5DFF83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:semg9811_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "45E9ED50-031B-48F9-AD89-8596D8A6B551",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*",
"matchCriteriaId": "219AF4A5-4134-4265-BF69-C340665714F1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c00:*:*:*:*:*:*:*",
"matchCriteriaId": "7CA7ED4D-0BDB-4535-B121-F6D75D809D2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "D30EA2A4-706B-482F-8F6C-17CA052F83BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "49619863-C103-4ED1-A6EA-01F50E8B5DB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "F9C4FDC6-996A-4637-9E56-6E9E3ECD4D74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c00spc600:*:*:*:*:*:*:*",
"matchCriteriaId": "DBB99786-E0CC-4826-BB9C-A4A6B65ED3B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c00spc700:*:*:*:*:*:*:*",
"matchCriteriaId": "0ABB8D4E-74F0-47D8-949C-B1464F8467E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
"matchCriteriaId": "5C6CA5A8-E5AD-424A-8B9A-E114041D05EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "50774D2C-24F2-4C31-B594-38889084F222",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c20spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "0C8B61BC-A730-4644-8DD1-DE1B5FD868E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c20spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "2B2E6F99-BCED-41D3-A0CF-0960231A6681",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c20spc600:*:*:*:*:*:*:*",
"matchCriteriaId": "531D1E98-03A5-4EF4-B1E7-8761E0F1A025",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c60spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "A8306070-D264-41F0-9587-A10DFF11BACB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c60spc101:*:*:*:*:*:*:*",
"matchCriteriaId": "43B2388F-8C1C-4820-ABF8-7B5B98E9E604",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c60spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "D237F1A9-4A04-453A-A68C-DB6E9ABA3DE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c60spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "A23EAC3C-BB82-42B0-B731-63CCDBB20AB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "F9D6F845-5213-405A-B414-5AA31BF2B6ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c60spc600:*:*:*:*:*:*:*",
"matchCriteriaId": "82356358-FC77-4F13-9834-C28894589838",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "EF2F8FA9-D98F-4B2B-922F-B1A3D111253A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "CEEB9E7C-4798-4D8B-8C6D-4ED9402F2F8A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:secospace_antiddos8000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EE75ACF-D29C-4846-932D-FB9C84E1D35F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "7D088C48-A439-42DA-B4A7-018F7E25C557",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "4EBD6055-1957-476B-A4D0-977B41488256",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "439CB65D-401E-4566-92E1-6434A1A9DC56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "327AC408-B751-4E73-B1E3-AFD5B9EA3DBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
"matchCriteriaId": "6E546CF7-8F50-4884-84E4-845E3AEEAEB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
"matchCriteriaId": "F637A262-F7CE-43E9-89DD-A3FA2D1A22B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "8BBE3431-EBFA-4C4A-97B1-6384869FD197",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "3ACA5F47-A215-40D5-A8F0-16FF8AF51FDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc101:*:*:*:*:*:*:*",
"matchCriteriaId": "D9A01CAB-F734-474E-B2D6-72CC4FAFD316",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "9F11B551-9147-4DCA-8FEF-0874EEB83984",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
"matchCriteriaId": "B3048F85-AE72-4B2D-AC6B-314E6768D2FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "C9429428-8612-4845-97DD-BB21F536D5C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
"matchCriteriaId": "47C6A570-E932-441A-ADA9-F2B8C3B76974",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "3DAB40CB-963C-4BDE-B45C-F23708A37F8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
"matchCriteriaId": "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "9CC72B38-32E1-4E9C-AE9D-8A468EB7F76F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "3A310A9A-5523-487F-B616-BAC98F0ABCBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "3D8E3300-4E1E-433A-87D9-983F9C1CE2B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "0CC93088-5265-4C8A-B468-1B55CA7716B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "9A0A449E-8E35-4D68-B975-17D27D486F10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*",
"matchCriteriaId": "64E335D2-FE4B-4316-8827-4741EC9AA674",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "D22733CC-1F63-47E2-9E81-225061DC50C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c80:*:*:*:*:*:*:*",
"matchCriteriaId": "3EC5407A-FAFF-4B09-AB3A-65510DFD4510",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c80pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "D64425C0-F31B-4DD5-A4BA-5F46300865A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "68E9D32D-46F1-495B-BF83-308DFF8822F8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "673728BB-BD7D-42D4-A781-A66416CAE57F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "A28D1553-532B-4A19-A3E4-2301DA1334B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "3095F561-6B8B-48F0-BF0E-11FDD8135AF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "73B17639-2CB8-44B4-AF5F-E09567AFED37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
"matchCriteriaId": "0E963401-E680-47C7-82CE-7F80254C5BA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
"matchCriteriaId": "4D888E88-D444-4BD5-AFEA-479EAC71E12F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "B3983A57-2F07-4D21-9093-1DFEAB310E26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "0B7BA85B-9D77-44C2-B91D-5C8FC20B25A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "40798CE9-F011-4A81-B299-9F15ED1C94E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc101:*:*:*:*:*:*:*",
"matchCriteriaId": "4B566B18-15AF-4D81-B708-4DF02B974208",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "2ED44F95-064A-4E85-A030-B15E88FBEAB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
"matchCriteriaId": "F5F8C8BA-20CE-4F4B-AB13-EDF7D53F6218",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "136C075A-0069-4CA3-9174-C17B538398EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
"matchCriteriaId": "01CBA56A-4786-4D70-A1C0-CE4FE7A5DB03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "C1CE9D09-77BB-4376-9067-44AD8F717E62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
"matchCriteriaId": "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "46AC2623-CC04-4907-9D74-A97BA7CD7E1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "FF58FA6C-FDF6-4687-AEB2-28513B10A393",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "2FA2444C-EE5E-4DFC-A9F8-4744059EF7DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "CB1D0B82-E6BB-4C9A-8EE9-6D463D763E5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "5ABCBF28-73E0-40B5-8F52-7D9DF47F7953",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*",
"matchCriteriaId": "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "ECFF4642-867A-45FF-A09F-CCE4F5737A34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c80:*:*:*:*:*:*:*",
"matchCriteriaId": "E6A44500-3128-4A34-B639-28824BF60CED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c80pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "A1C1C6DE-2CB9-41AD-ADF8-D0E70440A9C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "D6C14DF5-42F7-470F-B3DD-52B5A0770EC0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "D10A0733-814F-4A5E-8030-3390D5C47136",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "49107773-A583-418A-B2F4-D93D9C6B78D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10spc201:*:*:*:*:*:*:*",
"matchCriteriaId": "7F47573C-1BA0-47FD-97CB-DCF6FBC7FDBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "D8A00F4C-A885-466D-8047-4BE68EEDF306",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "CDD79510-E829-4ADC-96D4-EA8072F192AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
"matchCriteriaId": "E990766D-FBD4-404E-A783-3D2D0BC210F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc050:*:*:*:*:*:*:*",
"matchCriteriaId": "07BF0A47-08A3-4AF2-99A8-70273044BA1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc090:*:*:*:*:*:*:*",
"matchCriteriaId": "07EF0617-C5DF-4143-BA10-236386339037",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "3E8FC65E-DD9E-4179-84D4-9BC78E70AC27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "E7C39533-D4AF-47CA-9EFD-8C69AA3E5B61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "9EC55D6F-A02A-4BE6-A25D-83C89BB3F1B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
"matchCriteriaId": "13593E94-606F-42EF-9253-4FED0F109B2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "76B53D29-9848-43A1-948B-2F468BFBEDD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "4A6C40FB-306E-4461-879D-F8BE8F4BC20F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc101:*:*:*:*:*:*:*",
"matchCriteriaId": "AA6E88F3-6B23-4868-8487-0A1172D10DE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "06C078DB-743F-4E37-A435-8FF79DA908DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "F0EE488E-AB7D-4945-8D97-37BF2CA14505",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "C723D96F-7D16-4167-B3D8-382C6A59265B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
"matchCriteriaId": "6D04B355-93F0-44FB-AAD4-33D91B19A55B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "CEC19D43-B5B6-41A5-A36E-C79F32695E62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*",
"matchCriteriaId": "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "73CEF009-33BC-4F61-9C43-F01BE6DE87F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "0052905E-E993-461B-B6F5-0639AEDD4CB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "BE9DEB2E-5C45-47A8-96FA-88F6699262E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "7412661D-D8CB-4F2C-ADDF-C4D3358E94CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "D8B5B46D-F733-438A-8615-93E4855205D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
"matchCriteriaId": "B80E521E-1BFB-405E-9F8E-4A0734731FD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "3E8CABA6-DE36-4C65-9BDC-F8BD9A37012C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc601:*:*:*:*:*:*:*",
"matchCriteriaId": "8D8546A4-6952-4220-87E6-D08245856B63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*",
"matchCriteriaId": "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "DE76FD2A-807F-4176-8F13-32BCE257AA25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50spc009:*:*:*:*:*:*:*",
"matchCriteriaId": "75E9A883-E128-4E73-A1C7-321A5AF13F14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "35BC6F88-3506-4F68-ACFE-F24C9DAC0E9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "1C9E8E40-8E4D-4A3C-84DF-64EA74D3A6F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "55914156-2029-4C67-BAF9-958C2867783C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "1746EBB4-9823-4817-B8D9-E17122F19EEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "880E7D7A-8F10-4E5F-B129-39525E2FF5D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60:*:*:*:*:*:*:*",
"matchCriteriaId": "F6AACFD2-9C9D-49E3-A911-0CF58F863EE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "5C7E8D01-8697-4ABE-A217-81BF0BC32FEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "260A0F9E-FC3C-4469-9D6F-83A524C43213",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "03C9B67D-479B-4C6A-9657-C38C194B5CB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "B6007060-5364-46B0-A516-1A889F938E00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "79433751-9777-412C-A305-FF64EAEBFA32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "5226BD96-2B00-469B-AADD-CD0541610BBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c80:*:*:*:*:*:*:*",
"matchCriteriaId": "C0F5C89A-DA13-46D1-BDCF-0BD94F7B7861",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c80pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "248B2C91-E319-4D93-9CBC-06DF257A7820",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "391BFC6B-9AE6-49D7-855A-CB94AD1EE5C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "4DB3FD6B-0EE4-4467-8BAE-AE52FB2906EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00spc102:*:*:*:*:*:*:*",
"matchCriteriaId": "97525BE5-4537-45D2-9D2E-4D65D08B688B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE469876-F873-4705-9760-097AE840A818",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c10:*:*:*:*:*:*:*",
"matchCriteriaId": "92766749-AF9B-4AAD-8D1C-44F021F5332D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c10spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "2372745A-F764-4E31-8B6A-A58EE61E0C87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c10spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "03B183EF-BCB9-4FD1-8C52-16236175D250",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "D60C4269-BE98-4381-8197-4787E09AD870",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "8BD628CE-01BC-4E84-ADB8-2BE63EF08983",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "2C4A975B-0CB1-4EF0-920F-E58F14F42047",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c20spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "FA31E611-AA6F-4BB6-A817-344E658D1474",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c20spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "58F41C73-1166-4EF2-8048-5C95452A51B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c20spc600:*:*:*:*:*:*:*",
"matchCriteriaId": "62F4668E-54A1-42DE-9DBD-83B1F4DE353A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r003c00:*:*:*:*:*:*:*",
"matchCriteriaId": "778A61F5-661E-4B41-B08D-C623957BEEE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r003c00spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "DF6B4AEC-B3D4-4D9A-885A-85FE4BFD44A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "89960F41-C9A0-46E2-8953-0BECE3001835",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "7055F93D-6C68-4482-A8D1-C4DCC0F587C1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:usg6000v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88E8A1C0-CD02-4D4E-8DFC-0E03CF914C68",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c50spc700:*:*:*:*:*:*:*",
"matchCriteriaId": "C07026F7-772B-4B8F-BCAB-45E8F8803EF0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:espace_u1981:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C7BD4D80-D901-4082-B74D-A1D0CC24CA9F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have a null pointer dereference vulnerability. The system dereferences a pointer that it expects to be valid, but is NULL. A local attacker could exploit this vulnerability by sending crafted parameters. A successful exploit could cause a denial of service and the process reboot."
},
{
"lang": "es",
"value": "Ciertos productos de Huawei (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981), tienen una vulnerabilidad de desreferencia del puntero. El sistema desreferencia un puntero que espera ser v\u00e1lido, pero es NULL. Un atacante local podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de par\u00e1metros especialmente dise\u00f1ados. Una explotaci\u00f3n con \u00e9xito podr\u00eda causar una denegaci\u00f3n de servicio y reiniciar el proceso."
}
],
"id": "CVE-2019-5256",
"lastModified": "2024-11-21T04:44:37.107",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-12-13T23:15:11.817",
"references": [
{
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
],
"sourceIdentifier": "psirt@huawei.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-476"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2019-5258
Vulnerability from fkie_nvd - Published: 2019-12-13 23:15 - Updated: 2024-11-21 04:44
Severity ?
Summary
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have a buffer overflow vulnerability. An attacker who logs in to the board may send crafted messages from the internal network port or tamper with inter-process message packets to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the affected board to be abnormal.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ap2000_firmware:v200r005c30:*:*:*:*:*:*:*",
"matchCriteriaId": "B0036EB0-2E93-45E8-BFC6-00C254075F52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ap2000_firmware:v200r006c10:*:*:*:*:*:*:*",
"matchCriteriaId": "BFAEA83D-A929-4039-8792-AAB6191E7990",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ap2000_firmware:v200r006c20:*:*:*:*:*:*:*",
"matchCriteriaId": "C51D8548-6514-42CB-8557-BB7F971BF773",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ap2000_firmware:v200r007c10:*:*:*:*:*:*:*",
"matchCriteriaId": "1405158C-0B15-4D8D-B81A-C75B4586F7CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ap2000_firmware:v200r007c20:*:*:*:*:*:*:*",
"matchCriteriaId": "BD3D740E-F15F-4891-9059-E38A8F539FC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ap2000_firmware:v200r008c00:*:*:*:*:*:*:*",
"matchCriteriaId": "EECB7991-8CED-4DC6-9FB4-A8F5133583FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ap2000_firmware:v200r008c10:*:*:*:*:*:*:*",
"matchCriteriaId": "89C3653F-4AD5-4529-97C2-EFD3CC8B675C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ap2000_firmware:v200r009c00:*:*:*:*:*:*:*",
"matchCriteriaId": "63DE29FC-8571-41A7-95E5-05A760042F67",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ap2000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B7B5DEF1-5211-4843-BB26-103F7F3A2451",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "6619E377-0840-429D-A6C3-4A931811C12D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "23AEEF30-B626-4E84-A285-6E2A27F8994D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
"matchCriteriaId": "D92C5F28-9E62-421D-9ADB-50297AB29617",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
"matchCriteriaId": "12EE2BF6-880D-4A2F-8C25-6E3241DAE8DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "9ADACE38-43C3-412B-9911-AC6F9AD70299",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "E1190010-5B7D-4238-AE9A-6B0E5A95F4C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "FF6897E9-791E-4FE1-BF13-06E12326152D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "E71B6952-3ADF-45E9-A7E5-C0CCEDF43661",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
"matchCriteriaId": "15403867-09B3-4A36-88B0-A063D9E3673B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "16495210-738B-454B-87FA-DDCD3A85A463",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
"matchCriteriaId": "18DF99D5-6DEE-4872-AA00-F36E04D94DB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "F3D8BAB3-FC11-445D-A9AF-0378A36478B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c30:*:*:*:*:*:*:*",
"matchCriteriaId": "1EB4588F-67BA-46AC-90BE-746071779A0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c30spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "6B3B4756-9FA2-4911-97BA-9EA9EEC1BE4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c30spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "CF2C610B-142D-4BC7-9D50-A8827E37378A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "4206BD23-9583-460B-AC2D-9C562E1CC36A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c30spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "4060AF02-76A0-401A-95FA-241E4F1553C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c30spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "CEAFE113-89D6-439D-942E-2B4C0E753164",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c50:*:*:*:*:*:*:*",
"matchCriteriaId": "83CC5640-CDFD-4F7A-9ED6-96FCB0A63E58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c50pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "62D53945-D259-4C20-AE0E-BC4940E55B1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c80:*:*:*:*:*:*:*",
"matchCriteriaId": "5D61947E-9847-4BF7-8DBD-2FE13DA2476A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "14BCD5D2-C2B8-4FE2-945B-C55C84A25A66",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ips:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2B9F8312-6BEB-4334-A56E-B6C78F18C47A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "F8401A77-C046-4B00-B102-1188150A4299",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "B7BA9381-E9DD-4C5E-8CDE-418FC3E65967",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "1B7A1419-9F83-4937-A0E5-B0C897A58BFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
"matchCriteriaId": "71C0C6F0-44C2-4424-BE4A-1E8008C91DD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
"matchCriteriaId": "15963AA2-A849-47FD-BCD7-4CACACB20686",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "D09FB28D-6CA5-4BC3-8E30-F516EE1B23CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "069A3589-D8B9-4901-90F4-036428334F87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "6F376395-2A80-47E3-8AD0-46D55B6E4EF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "754F694C-757D-40BB-8854-D7940B5E0666",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
"matchCriteriaId": "B59A0FF2-DEDE-44E4-B4F6-3E718BF8C72A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "3782563A-3A4A-4823-817B-B6B01298F8B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
"matchCriteriaId": "7056C4BD-4A05-4C22-8964-A62C0CED3702",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "EAE25CE5-8431-4AE6-AE6B-199BEEE564F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c00:*:*:*:*:*:*:*",
"matchCriteriaId": "2245A997-F394-49B7-8BF6-57A9B1EC8731",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c00spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "F15C389E-1280-4E27-989A-E9CEC2FBC7F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c00spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "0A9693E6-D988-4FAC-AFA6-5B06FBE14175",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c00spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "D03F984B-399A-425F-8ADE-138637FD9246",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c00spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "5C0E365B-07E3-4971-BEFF-C2A825D49A15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c00spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "8A2F1EB8-A556-4BC7-A4D9-1CD549468CAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c10:*:*:*:*:*:*:*",
"matchCriteriaId": "22AF8105-E0F6-4284-A2CD-3D393F7A3386",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c10pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "7986A4EA-B908-4C7B-A419-63766A95D0D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c30:*:*:*:*:*:*:*",
"matchCriteriaId": "CFEF6777-327D-4ACB-9E63-3E6D0E1CEF57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c30pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "4BEB21F6-0CE9-4498-9409-43C4C57CAFEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "20862015-772A-4E26-9EFB-6E24CCABFC1F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ngfw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE88F4A1-3184-447D-990C-87EE39316D82",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "68837186-E482-40E9-8F40-75B2E0AA10D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "CCFBC7B3-5886-4982-8200-8062236CB760",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
"matchCriteriaId": "B01CA368-6476-49AB-8CE1-090F7DAA5842",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
"matchCriteriaId": "B0D493EC-C5C8-444B-BCA6-227D047AAB06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "1856722C-597D-495D-AFCC-21E5FF6F2359",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "80CC85C8-F102-4E5F-BAD3-9658D87CE953",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "BB63DB6A-7D35-4FD2-9707-C38098CB004E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "CD3921D5-81A0-4700-A302-7F4C276D4ABE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
"matchCriteriaId": "B9975E43-DEAF-4738-AB02-EADA280D69E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "B3D1AB25-9A98-46F9-853C-574CDE7E6677",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
"matchCriteriaId": "85BBD592-7528-4CAA-AA4F-6A6B0BEC785A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "DAFC740E-19B2-4F35-935D-56B87C73CA82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
"matchCriteriaId": "728A7B78-6E19-4656-848F-269DB955070C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "90628E91-F95D-47A8-A580-1B0A5BDE3E3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "2316F625-3ABE-49B8-AFBE-50858E2EBCD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "42C2CAD1-543D-47E2-9B12-6B2E8538C8DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "C44F7CB4-B353-4A1F-8AC9-206A5058B6EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "9C6A9790-ACA0-4BD5-9EDE-BA9619309343",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*",
"matchCriteriaId": "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "C2C3BA92-67AA-49C9-B1B3-562B875DDFB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c80:*:*:*:*:*:*:*",
"matchCriteriaId": "90CC612C-820C-4A6E-ABA8-4DE8E4E050AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "A3462B41-1DC4-4451-9575-F81C52F7A23C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E054182-CE33-45E3-8595-159A75BA5162",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "68435D97-592E-4633-BE7D-E8C47D89CD7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "64CD24E9-2CE1-4006-A281-90B4373CFC4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
"matchCriteriaId": "F22A4D97-365C-4259-9E54-77053798FD17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
"matchCriteriaId": "A19E9912-4CBD-4734-9E2F-F4262FDE7DEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "CDC040A6-3E38-4B21-9779-67CF66FDC6B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "9038E75D-50F4-4849-BD2C-8846A353B53E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "992C3880-BDBE-4CE1-8F9C-C2E488EC56E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "0545D687-6670-41B4-A1B1-1048879658B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
"matchCriteriaId": "B573FC8A-39A8-4256-97B7-1E85CA7260DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "59DC9D0D-9AF8-42DE-8B40-DA4764FBC92D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
"matchCriteriaId": "FAD2D344-EFF9-4EA8-B387-2C80FC70DC44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
"matchCriteriaId": "946F5FF7-412F-40F9-A492-DE8E11E7B919",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "5485B45E-A4CB-4177-89C7-02F18875C8C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "8116853E-1381-4CA9-A23D-FDC8D14F4987",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "F9FE889E-58A9-4D93-8054-7B845C44BDA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "0FED9D6D-98F0-4C91-994F-E11A8ED65F29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "70449EC6-AD48-4B39-9D35-7B4C5ABC498D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*",
"matchCriteriaId": "678FFB3B-C6E1-4694-B51C-D56E26B53E1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "4AEE2D42-BCFF-4C9D-9C11-6A013E671179",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c80:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF85B0A-2737-4CF8-9535-E38EA164395A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "9AC093ED-A979-4484-B758-1C16DF2D6030",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE8CA649-7AE1-497C-869B-B4DD315F342C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*",
"matchCriteriaId": "1D5066C9-7581-4284-AF23-0782870B2F03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "441C141E-5C9F-44D9-91A7-9E0426339810",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6800_firmware:v500r001c80:*:*:*:*:*:*:*",
"matchCriteriaId": "825F695B-F709-466C-BC05-B1C505991EFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "D6FCA659-5DF8-44EA-91B6-A80FBB68322A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "875441DD-575F-4F4D-A6BD-23C38641D330",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r005c03:*:*:*:*:*:*:*",
"matchCriteriaId": "5B18ABC1-A970-472A-A8BF-934D1180930E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E22D3CFF-3353-4EE2-8933-84F395469D0D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "FC6AFAC9-2A17-41D9-879F-8615305801BB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46EE0FA6-7E53-488F-81A7-B2C906D65552",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "BAF6142E-A559-412B-ADC5-06AC2362D762",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C80D3BB-868B-461C-B97A-9C94C9F80858",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "5770C48B-2E2B-4A9F-A3CC-7100B0951F74",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DDD8D36D-A4F2-4423-B57E-E9933710201E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:semg9811_firmware:v500r002c20:*:*:*:*:*:*:*",
"matchCriteriaId": "317EDE28-2FFF-4E62-9C1E-BF94935EA640",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:semg9811_firmware:v500r002c30:*:*:*:*:*:*:*",
"matchCriteriaId": "237CCC4D-23B6-460E-B88F-5DBB2F5DFF83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:semg9811_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "45E9ED50-031B-48F9-AD89-8596D8A6B551",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*",
"matchCriteriaId": "219AF4A5-4134-4265-BF69-C340665714F1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c00:*:*:*:*:*:*:*",
"matchCriteriaId": "7CA7ED4D-0BDB-4535-B121-F6D75D809D2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "D30EA2A4-706B-482F-8F6C-17CA052F83BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "49619863-C103-4ED1-A6EA-01F50E8B5DB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "F9C4FDC6-996A-4637-9E56-6E9E3ECD4D74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c00spc600:*:*:*:*:*:*:*",
"matchCriteriaId": "DBB99786-E0CC-4826-BB9C-A4A6B65ED3B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c00spc700:*:*:*:*:*:*:*",
"matchCriteriaId": "0ABB8D4E-74F0-47D8-949C-B1464F8467E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
"matchCriteriaId": "5C6CA5A8-E5AD-424A-8B9A-E114041D05EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "50774D2C-24F2-4C31-B594-38889084F222",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c20spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "0C8B61BC-A730-4644-8DD1-DE1B5FD868E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c20spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "2B2E6F99-BCED-41D3-A0CF-0960231A6681",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c20spc600:*:*:*:*:*:*:*",
"matchCriteriaId": "531D1E98-03A5-4EF4-B1E7-8761E0F1A025",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c60spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "A8306070-D264-41F0-9587-A10DFF11BACB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c60spc101:*:*:*:*:*:*:*",
"matchCriteriaId": "43B2388F-8C1C-4820-ABF8-7B5B98E9E604",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c60spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "D237F1A9-4A04-453A-A68C-DB6E9ABA3DE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c60spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "A23EAC3C-BB82-42B0-B731-63CCDBB20AB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "F9D6F845-5213-405A-B414-5AA31BF2B6ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c60spc600:*:*:*:*:*:*:*",
"matchCriteriaId": "82356358-FC77-4F13-9834-C28894589838",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "EF2F8FA9-D98F-4B2B-922F-B1A3D111253A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "CEEB9E7C-4798-4D8B-8C6D-4ED9402F2F8A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:secospace_antiddos8000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EE75ACF-D29C-4846-932D-FB9C84E1D35F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "7D088C48-A439-42DA-B4A7-018F7E25C557",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "4EBD6055-1957-476B-A4D0-977B41488256",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "439CB65D-401E-4566-92E1-6434A1A9DC56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "327AC408-B751-4E73-B1E3-AFD5B9EA3DBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
"matchCriteriaId": "6E546CF7-8F50-4884-84E4-845E3AEEAEB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
"matchCriteriaId": "F637A262-F7CE-43E9-89DD-A3FA2D1A22B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "8BBE3431-EBFA-4C4A-97B1-6384869FD197",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "3ACA5F47-A215-40D5-A8F0-16FF8AF51FDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc101:*:*:*:*:*:*:*",
"matchCriteriaId": "D9A01CAB-F734-474E-B2D6-72CC4FAFD316",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "9F11B551-9147-4DCA-8FEF-0874EEB83984",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
"matchCriteriaId": "B3048F85-AE72-4B2D-AC6B-314E6768D2FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "C9429428-8612-4845-97DD-BB21F536D5C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
"matchCriteriaId": "47C6A570-E932-441A-ADA9-F2B8C3B76974",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "3DAB40CB-963C-4BDE-B45C-F23708A37F8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
"matchCriteriaId": "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "9CC72B38-32E1-4E9C-AE9D-8A468EB7F76F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "3A310A9A-5523-487F-B616-BAC98F0ABCBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "3D8E3300-4E1E-433A-87D9-983F9C1CE2B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "0CC93088-5265-4C8A-B468-1B55CA7716B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "9A0A449E-8E35-4D68-B975-17D27D486F10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*",
"matchCriteriaId": "64E335D2-FE4B-4316-8827-4741EC9AA674",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "D22733CC-1F63-47E2-9E81-225061DC50C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c80:*:*:*:*:*:*:*",
"matchCriteriaId": "3EC5407A-FAFF-4B09-AB3A-65510DFD4510",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c80pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "D64425C0-F31B-4DD5-A4BA-5F46300865A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "68E9D32D-46F1-495B-BF83-308DFF8822F8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "673728BB-BD7D-42D4-A781-A66416CAE57F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "A28D1553-532B-4A19-A3E4-2301DA1334B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "3095F561-6B8B-48F0-BF0E-11FDD8135AF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "73B17639-2CB8-44B4-AF5F-E09567AFED37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
"matchCriteriaId": "0E963401-E680-47C7-82CE-7F80254C5BA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
"matchCriteriaId": "4D888E88-D444-4BD5-AFEA-479EAC71E12F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "B3983A57-2F07-4D21-9093-1DFEAB310E26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "0B7BA85B-9D77-44C2-B91D-5C8FC20B25A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "40798CE9-F011-4A81-B299-9F15ED1C94E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc101:*:*:*:*:*:*:*",
"matchCriteriaId": "4B566B18-15AF-4D81-B708-4DF02B974208",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "2ED44F95-064A-4E85-A030-B15E88FBEAB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
"matchCriteriaId": "F5F8C8BA-20CE-4F4B-AB13-EDF7D53F6218",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "136C075A-0069-4CA3-9174-C17B538398EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
"matchCriteriaId": "01CBA56A-4786-4D70-A1C0-CE4FE7A5DB03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "C1CE9D09-77BB-4376-9067-44AD8F717E62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
"matchCriteriaId": "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "46AC2623-CC04-4907-9D74-A97BA7CD7E1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "FF58FA6C-FDF6-4687-AEB2-28513B10A393",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "2FA2444C-EE5E-4DFC-A9F8-4744059EF7DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "CB1D0B82-E6BB-4C9A-8EE9-6D463D763E5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "5ABCBF28-73E0-40B5-8F52-7D9DF47F7953",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*",
"matchCriteriaId": "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "ECFF4642-867A-45FF-A09F-CCE4F5737A34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c80:*:*:*:*:*:*:*",
"matchCriteriaId": "E6A44500-3128-4A34-B639-28824BF60CED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c80pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "A1C1C6DE-2CB9-41AD-ADF8-D0E70440A9C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "D6C14DF5-42F7-470F-B3DD-52B5A0770EC0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "D10A0733-814F-4A5E-8030-3390D5C47136",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "49107773-A583-418A-B2F4-D93D9C6B78D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10spc201:*:*:*:*:*:*:*",
"matchCriteriaId": "7F47573C-1BA0-47FD-97CB-DCF6FBC7FDBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "D8A00F4C-A885-466D-8047-4BE68EEDF306",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "CDD79510-E829-4ADC-96D4-EA8072F192AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
"matchCriteriaId": "E990766D-FBD4-404E-A783-3D2D0BC210F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc050:*:*:*:*:*:*:*",
"matchCriteriaId": "07BF0A47-08A3-4AF2-99A8-70273044BA1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc090:*:*:*:*:*:*:*",
"matchCriteriaId": "07EF0617-C5DF-4143-BA10-236386339037",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "3E8FC65E-DD9E-4179-84D4-9BC78E70AC27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "E7C39533-D4AF-47CA-9EFD-8C69AA3E5B61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "9EC55D6F-A02A-4BE6-A25D-83C89BB3F1B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
"matchCriteriaId": "13593E94-606F-42EF-9253-4FED0F109B2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "76B53D29-9848-43A1-948B-2F468BFBEDD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "4A6C40FB-306E-4461-879D-F8BE8F4BC20F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc101:*:*:*:*:*:*:*",
"matchCriteriaId": "AA6E88F3-6B23-4868-8487-0A1172D10DE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "06C078DB-743F-4E37-A435-8FF79DA908DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "F0EE488E-AB7D-4945-8D97-37BF2CA14505",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "C723D96F-7D16-4167-B3D8-382C6A59265B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
"matchCriteriaId": "6D04B355-93F0-44FB-AAD4-33D91B19A55B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "CEC19D43-B5B6-41A5-A36E-C79F32695E62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*",
"matchCriteriaId": "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "73CEF009-33BC-4F61-9C43-F01BE6DE87F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "0052905E-E993-461B-B6F5-0639AEDD4CB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "BE9DEB2E-5C45-47A8-96FA-88F6699262E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "7412661D-D8CB-4F2C-ADDF-C4D3358E94CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "D8B5B46D-F733-438A-8615-93E4855205D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
"matchCriteriaId": "B80E521E-1BFB-405E-9F8E-4A0734731FD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "3E8CABA6-DE36-4C65-9BDC-F8BD9A37012C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc601:*:*:*:*:*:*:*",
"matchCriteriaId": "8D8546A4-6952-4220-87E6-D08245856B63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*",
"matchCriteriaId": "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "DE76FD2A-807F-4176-8F13-32BCE257AA25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50spc009:*:*:*:*:*:*:*",
"matchCriteriaId": "75E9A883-E128-4E73-A1C7-321A5AF13F14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "35BC6F88-3506-4F68-ACFE-F24C9DAC0E9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "1C9E8E40-8E4D-4A3C-84DF-64EA74D3A6F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "55914156-2029-4C67-BAF9-958C2867783C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "1746EBB4-9823-4817-B8D9-E17122F19EEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "880E7D7A-8F10-4E5F-B129-39525E2FF5D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60:*:*:*:*:*:*:*",
"matchCriteriaId": "F6AACFD2-9C9D-49E3-A911-0CF58F863EE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "5C7E8D01-8697-4ABE-A217-81BF0BC32FEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "260A0F9E-FC3C-4469-9D6F-83A524C43213",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "03C9B67D-479B-4C6A-9657-C38C194B5CB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "B6007060-5364-46B0-A516-1A889F938E00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "79433751-9777-412C-A305-FF64EAEBFA32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "5226BD96-2B00-469B-AADD-CD0541610BBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c80:*:*:*:*:*:*:*",
"matchCriteriaId": "C0F5C89A-DA13-46D1-BDCF-0BD94F7B7861",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c80pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "248B2C91-E319-4D93-9CBC-06DF257A7820",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "391BFC6B-9AE6-49D7-855A-CB94AD1EE5C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "4DB3FD6B-0EE4-4467-8BAE-AE52FB2906EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00spc102:*:*:*:*:*:*:*",
"matchCriteriaId": "97525BE5-4537-45D2-9D2E-4D65D08B688B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE469876-F873-4705-9760-097AE840A818",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c10:*:*:*:*:*:*:*",
"matchCriteriaId": "92766749-AF9B-4AAD-8D1C-44F021F5332D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c10spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "2372745A-F764-4E31-8B6A-A58EE61E0C87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c10spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "03B183EF-BCB9-4FD1-8C52-16236175D250",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "D60C4269-BE98-4381-8197-4787E09AD870",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "8BD628CE-01BC-4E84-ADB8-2BE63EF08983",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "2C4A975B-0CB1-4EF0-920F-E58F14F42047",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c20spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "FA31E611-AA6F-4BB6-A817-344E658D1474",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c20spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "58F41C73-1166-4EF2-8048-5C95452A51B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c20spc600:*:*:*:*:*:*:*",
"matchCriteriaId": "62F4668E-54A1-42DE-9DBD-83B1F4DE353A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r003c00:*:*:*:*:*:*:*",
"matchCriteriaId": "778A61F5-661E-4B41-B08D-C623957BEEE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r003c00spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "DF6B4AEC-B3D4-4D9A-885A-85FE4BFD44A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "89960F41-C9A0-46E2-8953-0BECE3001835",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "7055F93D-6C68-4482-A8D1-C4DCC0F587C1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:usg6000v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88E8A1C0-CD02-4D4E-8DFC-0E03CF914C68",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c50spc700:*:*:*:*:*:*:*",
"matchCriteriaId": "C07026F7-772B-4B8F-BCAB-45E8F8803EF0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:espace_u1981:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C7BD4D80-D901-4082-B74D-A1D0CC24CA9F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have a buffer overflow vulnerability. An attacker who logs in to the board may send crafted messages from the internal network port or tamper with inter-process message packets to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the affected board to be abnormal."
},
{
"lang": "es",
"value": "Ciertos productos de Huawei (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981), tienen una vulnerabilidad de desbordamiento de b\u00fafer. Un atacante que inicie sesi\u00f3n en la tarjeta puede enviar mensajes especialmente dise\u00f1ados desde el puerto de red interno o manipular los paquetes de mensajes entre procesos para explotar esta vulnerabilidad. Debido a una comprobaci\u00f3n insuficiente del mensaje, una explotaci\u00f3n con \u00e9xito puede causar que la tarjeta afectada sea anormal."
}
],
"id": "CVE-2019-5258",
"lastModified": "2024-11-21T04:44:37.467",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-12-13T23:15:11.973",
"references": [
{
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
],
"sourceIdentifier": "psirt@huawei.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-120"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2019-5254
Vulnerability from fkie_nvd - Published: 2019-12-13 23:15 - Updated: 2024-11-21 04:44
Severity ?
Summary
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board may send crafted messages from the internal network port or tamper with inter-process message packets to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the affected board to be abnormal.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ap2000_firmware:v200r005c30:*:*:*:*:*:*:*",
"matchCriteriaId": "B0036EB0-2E93-45E8-BFC6-00C254075F52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ap2000_firmware:v200r006c10:*:*:*:*:*:*:*",
"matchCriteriaId": "BFAEA83D-A929-4039-8792-AAB6191E7990",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ap2000_firmware:v200r006c20:*:*:*:*:*:*:*",
"matchCriteriaId": "C51D8548-6514-42CB-8557-BB7F971BF773",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ap2000_firmware:v200r007c10:*:*:*:*:*:*:*",
"matchCriteriaId": "1405158C-0B15-4D8D-B81A-C75B4586F7CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ap2000_firmware:v200r007c20:*:*:*:*:*:*:*",
"matchCriteriaId": "BD3D740E-F15F-4891-9059-E38A8F539FC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ap2000_firmware:v200r008c00:*:*:*:*:*:*:*",
"matchCriteriaId": "EECB7991-8CED-4DC6-9FB4-A8F5133583FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ap2000_firmware:v200r008c10:*:*:*:*:*:*:*",
"matchCriteriaId": "89C3653F-4AD5-4529-97C2-EFD3CC8B675C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ap2000_firmware:v200r009c00:*:*:*:*:*:*:*",
"matchCriteriaId": "63DE29FC-8571-41A7-95E5-05A760042F67",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ap2000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B7B5DEF1-5211-4843-BB26-103F7F3A2451",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "6619E377-0840-429D-A6C3-4A931811C12D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "23AEEF30-B626-4E84-A285-6E2A27F8994D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
"matchCriteriaId": "D92C5F28-9E62-421D-9ADB-50297AB29617",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
"matchCriteriaId": "12EE2BF6-880D-4A2F-8C25-6E3241DAE8DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "9ADACE38-43C3-412B-9911-AC6F9AD70299",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "E1190010-5B7D-4238-AE9A-6B0E5A95F4C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "FF6897E9-791E-4FE1-BF13-06E12326152D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "E71B6952-3ADF-45E9-A7E5-C0CCEDF43661",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
"matchCriteriaId": "15403867-09B3-4A36-88B0-A063D9E3673B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "16495210-738B-454B-87FA-DDCD3A85A463",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
"matchCriteriaId": "18DF99D5-6DEE-4872-AA00-F36E04D94DB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "F3D8BAB3-FC11-445D-A9AF-0378A36478B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c30:*:*:*:*:*:*:*",
"matchCriteriaId": "1EB4588F-67BA-46AC-90BE-746071779A0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c30spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "6B3B4756-9FA2-4911-97BA-9EA9EEC1BE4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c30spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "CF2C610B-142D-4BC7-9D50-A8827E37378A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "4206BD23-9583-460B-AC2D-9C562E1CC36A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c30spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "4060AF02-76A0-401A-95FA-241E4F1553C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c30spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "CEAFE113-89D6-439D-942E-2B4C0E753164",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c50:*:*:*:*:*:*:*",
"matchCriteriaId": "83CC5640-CDFD-4F7A-9ED6-96FCB0A63E58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c50pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "62D53945-D259-4C20-AE0E-BC4940E55B1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c80:*:*:*:*:*:*:*",
"matchCriteriaId": "5D61947E-9847-4BF7-8DBD-2FE13DA2476A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "14BCD5D2-C2B8-4FE2-945B-C55C84A25A66",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ips:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2B9F8312-6BEB-4334-A56E-B6C78F18C47A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "F8401A77-C046-4B00-B102-1188150A4299",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "B7BA9381-E9DD-4C5E-8CDE-418FC3E65967",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "1B7A1419-9F83-4937-A0E5-B0C897A58BFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
"matchCriteriaId": "71C0C6F0-44C2-4424-BE4A-1E8008C91DD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
"matchCriteriaId": "15963AA2-A849-47FD-BCD7-4CACACB20686",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "D09FB28D-6CA5-4BC3-8E30-F516EE1B23CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "069A3589-D8B9-4901-90F4-036428334F87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "6F376395-2A80-47E3-8AD0-46D55B6E4EF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "754F694C-757D-40BB-8854-D7940B5E0666",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
"matchCriteriaId": "B59A0FF2-DEDE-44E4-B4F6-3E718BF8C72A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "3782563A-3A4A-4823-817B-B6B01298F8B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
"matchCriteriaId": "7056C4BD-4A05-4C22-8964-A62C0CED3702",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "EAE25CE5-8431-4AE6-AE6B-199BEEE564F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c00:*:*:*:*:*:*:*",
"matchCriteriaId": "2245A997-F394-49B7-8BF6-57A9B1EC8731",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c00spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "F15C389E-1280-4E27-989A-E9CEC2FBC7F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c00spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "0A9693E6-D988-4FAC-AFA6-5B06FBE14175",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c00spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "D03F984B-399A-425F-8ADE-138637FD9246",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c00spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "5C0E365B-07E3-4971-BEFF-C2A825D49A15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c00spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "8A2F1EB8-A556-4BC7-A4D9-1CD549468CAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c10:*:*:*:*:*:*:*",
"matchCriteriaId": "22AF8105-E0F6-4284-A2CD-3D393F7A3386",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c10pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "7986A4EA-B908-4C7B-A419-63766A95D0D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c30:*:*:*:*:*:*:*",
"matchCriteriaId": "CFEF6777-327D-4ACB-9E63-3E6D0E1CEF57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c30pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "4BEB21F6-0CE9-4498-9409-43C4C57CAFEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "20862015-772A-4E26-9EFB-6E24CCABFC1F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ngfw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE88F4A1-3184-447D-990C-87EE39316D82",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "68837186-E482-40E9-8F40-75B2E0AA10D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "CCFBC7B3-5886-4982-8200-8062236CB760",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
"matchCriteriaId": "B01CA368-6476-49AB-8CE1-090F7DAA5842",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
"matchCriteriaId": "B0D493EC-C5C8-444B-BCA6-227D047AAB06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "1856722C-597D-495D-AFCC-21E5FF6F2359",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "80CC85C8-F102-4E5F-BAD3-9658D87CE953",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "BB63DB6A-7D35-4FD2-9707-C38098CB004E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "CD3921D5-81A0-4700-A302-7F4C276D4ABE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
"matchCriteriaId": "B9975E43-DEAF-4738-AB02-EADA280D69E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "B3D1AB25-9A98-46F9-853C-574CDE7E6677",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
"matchCriteriaId": "85BBD592-7528-4CAA-AA4F-6A6B0BEC785A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "DAFC740E-19B2-4F35-935D-56B87C73CA82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
"matchCriteriaId": "728A7B78-6E19-4656-848F-269DB955070C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "90628E91-F95D-47A8-A580-1B0A5BDE3E3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "2316F625-3ABE-49B8-AFBE-50858E2EBCD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "42C2CAD1-543D-47E2-9B12-6B2E8538C8DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "C44F7CB4-B353-4A1F-8AC9-206A5058B6EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "9C6A9790-ACA0-4BD5-9EDE-BA9619309343",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*",
"matchCriteriaId": "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "C2C3BA92-67AA-49C9-B1B3-562B875DDFB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c80:*:*:*:*:*:*:*",
"matchCriteriaId": "90CC612C-820C-4A6E-ABA8-4DE8E4E050AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "A3462B41-1DC4-4451-9575-F81C52F7A23C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E054182-CE33-45E3-8595-159A75BA5162",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "68435D97-592E-4633-BE7D-E8C47D89CD7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "64CD24E9-2CE1-4006-A281-90B4373CFC4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
"matchCriteriaId": "F22A4D97-365C-4259-9E54-77053798FD17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
"matchCriteriaId": "A19E9912-4CBD-4734-9E2F-F4262FDE7DEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "CDC040A6-3E38-4B21-9779-67CF66FDC6B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "9038E75D-50F4-4849-BD2C-8846A353B53E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "992C3880-BDBE-4CE1-8F9C-C2E488EC56E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "0545D687-6670-41B4-A1B1-1048879658B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
"matchCriteriaId": "B573FC8A-39A8-4256-97B7-1E85CA7260DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "59DC9D0D-9AF8-42DE-8B40-DA4764FBC92D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
"matchCriteriaId": "FAD2D344-EFF9-4EA8-B387-2C80FC70DC44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
"matchCriteriaId": "946F5FF7-412F-40F9-A492-DE8E11E7B919",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "5485B45E-A4CB-4177-89C7-02F18875C8C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "8116853E-1381-4CA9-A23D-FDC8D14F4987",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "F9FE889E-58A9-4D93-8054-7B845C44BDA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "0FED9D6D-98F0-4C91-994F-E11A8ED65F29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "70449EC6-AD48-4B39-9D35-7B4C5ABC498D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*",
"matchCriteriaId": "678FFB3B-C6E1-4694-B51C-D56E26B53E1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "4AEE2D42-BCFF-4C9D-9C11-6A013E671179",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c80:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF85B0A-2737-4CF8-9535-E38EA164395A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "9AC093ED-A979-4484-B758-1C16DF2D6030",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE8CA649-7AE1-497C-869B-B4DD315F342C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*",
"matchCriteriaId": "1D5066C9-7581-4284-AF23-0782870B2F03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "441C141E-5C9F-44D9-91A7-9E0426339810",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6800_firmware:v500r001c80:*:*:*:*:*:*:*",
"matchCriteriaId": "825F695B-F709-466C-BC05-B1C505991EFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "D6FCA659-5DF8-44EA-91B6-A80FBB68322A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "875441DD-575F-4F4D-A6BD-23C38641D330",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r005c03:*:*:*:*:*:*:*",
"matchCriteriaId": "5B18ABC1-A970-472A-A8BF-934D1180930E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E22D3CFF-3353-4EE2-8933-84F395469D0D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "FC6AFAC9-2A17-41D9-879F-8615305801BB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46EE0FA6-7E53-488F-81A7-B2C906D65552",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "BAF6142E-A559-412B-ADC5-06AC2362D762",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C80D3BB-868B-461C-B97A-9C94C9F80858",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "5770C48B-2E2B-4A9F-A3CC-7100B0951F74",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DDD8D36D-A4F2-4423-B57E-E9933710201E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:semg9811_firmware:v500r002c20:*:*:*:*:*:*:*",
"matchCriteriaId": "317EDE28-2FFF-4E62-9C1E-BF94935EA640",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:semg9811_firmware:v500r002c30:*:*:*:*:*:*:*",
"matchCriteriaId": "237CCC4D-23B6-460E-B88F-5DBB2F5DFF83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:semg9811_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "45E9ED50-031B-48F9-AD89-8596D8A6B551",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*",
"matchCriteriaId": "219AF4A5-4134-4265-BF69-C340665714F1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c00:*:*:*:*:*:*:*",
"matchCriteriaId": "7CA7ED4D-0BDB-4535-B121-F6D75D809D2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "D30EA2A4-706B-482F-8F6C-17CA052F83BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "49619863-C103-4ED1-A6EA-01F50E8B5DB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "F9C4FDC6-996A-4637-9E56-6E9E3ECD4D74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c00spc600:*:*:*:*:*:*:*",
"matchCriteriaId": "DBB99786-E0CC-4826-BB9C-A4A6B65ED3B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c00spc700:*:*:*:*:*:*:*",
"matchCriteriaId": "0ABB8D4E-74F0-47D8-949C-B1464F8467E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
"matchCriteriaId": "5C6CA5A8-E5AD-424A-8B9A-E114041D05EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "50774D2C-24F2-4C31-B594-38889084F222",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c20spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "0C8B61BC-A730-4644-8DD1-DE1B5FD868E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c20spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "2B2E6F99-BCED-41D3-A0CF-0960231A6681",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c20spc600:*:*:*:*:*:*:*",
"matchCriteriaId": "531D1E98-03A5-4EF4-B1E7-8761E0F1A025",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c60spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "A8306070-D264-41F0-9587-A10DFF11BACB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c60spc101:*:*:*:*:*:*:*",
"matchCriteriaId": "43B2388F-8C1C-4820-ABF8-7B5B98E9E604",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c60spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "D237F1A9-4A04-453A-A68C-DB6E9ABA3DE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c60spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "A23EAC3C-BB82-42B0-B731-63CCDBB20AB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "F9D6F845-5213-405A-B414-5AA31BF2B6ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c60spc600:*:*:*:*:*:*:*",
"matchCriteriaId": "82356358-FC77-4F13-9834-C28894589838",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "EF2F8FA9-D98F-4B2B-922F-B1A3D111253A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "CEEB9E7C-4798-4D8B-8C6D-4ED9402F2F8A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:secospace_antiddos8000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EE75ACF-D29C-4846-932D-FB9C84E1D35F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "7D088C48-A439-42DA-B4A7-018F7E25C557",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "4EBD6055-1957-476B-A4D0-977B41488256",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "439CB65D-401E-4566-92E1-6434A1A9DC56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "327AC408-B751-4E73-B1E3-AFD5B9EA3DBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
"matchCriteriaId": "6E546CF7-8F50-4884-84E4-845E3AEEAEB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
"matchCriteriaId": "F637A262-F7CE-43E9-89DD-A3FA2D1A22B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "8BBE3431-EBFA-4C4A-97B1-6384869FD197",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "3ACA5F47-A215-40D5-A8F0-16FF8AF51FDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc101:*:*:*:*:*:*:*",
"matchCriteriaId": "D9A01CAB-F734-474E-B2D6-72CC4FAFD316",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "9F11B551-9147-4DCA-8FEF-0874EEB83984",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
"matchCriteriaId": "B3048F85-AE72-4B2D-AC6B-314E6768D2FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "C9429428-8612-4845-97DD-BB21F536D5C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
"matchCriteriaId": "47C6A570-E932-441A-ADA9-F2B8C3B76974",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "3DAB40CB-963C-4BDE-B45C-F23708A37F8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
"matchCriteriaId": "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "9CC72B38-32E1-4E9C-AE9D-8A468EB7F76F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "3A310A9A-5523-487F-B616-BAC98F0ABCBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "3D8E3300-4E1E-433A-87D9-983F9C1CE2B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "0CC93088-5265-4C8A-B468-1B55CA7716B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "9A0A449E-8E35-4D68-B975-17D27D486F10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*",
"matchCriteriaId": "64E335D2-FE4B-4316-8827-4741EC9AA674",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "D22733CC-1F63-47E2-9E81-225061DC50C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c80:*:*:*:*:*:*:*",
"matchCriteriaId": "3EC5407A-FAFF-4B09-AB3A-65510DFD4510",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c80pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "D64425C0-F31B-4DD5-A4BA-5F46300865A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "68E9D32D-46F1-495B-BF83-308DFF8822F8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "673728BB-BD7D-42D4-A781-A66416CAE57F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "A28D1553-532B-4A19-A3E4-2301DA1334B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "3095F561-6B8B-48F0-BF0E-11FDD8135AF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "73B17639-2CB8-44B4-AF5F-E09567AFED37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
"matchCriteriaId": "0E963401-E680-47C7-82CE-7F80254C5BA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
"matchCriteriaId": "4D888E88-D444-4BD5-AFEA-479EAC71E12F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "B3983A57-2F07-4D21-9093-1DFEAB310E26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "0B7BA85B-9D77-44C2-B91D-5C8FC20B25A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "40798CE9-F011-4A81-B299-9F15ED1C94E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc101:*:*:*:*:*:*:*",
"matchCriteriaId": "4B566B18-15AF-4D81-B708-4DF02B974208",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "2ED44F95-064A-4E85-A030-B15E88FBEAB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
"matchCriteriaId": "F5F8C8BA-20CE-4F4B-AB13-EDF7D53F6218",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "136C075A-0069-4CA3-9174-C17B538398EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
"matchCriteriaId": "01CBA56A-4786-4D70-A1C0-CE4FE7A5DB03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "C1CE9D09-77BB-4376-9067-44AD8F717E62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
"matchCriteriaId": "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "46AC2623-CC04-4907-9D74-A97BA7CD7E1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "FF58FA6C-FDF6-4687-AEB2-28513B10A393",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "2FA2444C-EE5E-4DFC-A9F8-4744059EF7DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "CB1D0B82-E6BB-4C9A-8EE9-6D463D763E5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "5ABCBF28-73E0-40B5-8F52-7D9DF47F7953",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*",
"matchCriteriaId": "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "ECFF4642-867A-45FF-A09F-CCE4F5737A34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c80:*:*:*:*:*:*:*",
"matchCriteriaId": "E6A44500-3128-4A34-B639-28824BF60CED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c80pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "A1C1C6DE-2CB9-41AD-ADF8-D0E70440A9C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "D6C14DF5-42F7-470F-B3DD-52B5A0770EC0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "D10A0733-814F-4A5E-8030-3390D5C47136",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "49107773-A583-418A-B2F4-D93D9C6B78D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10spc201:*:*:*:*:*:*:*",
"matchCriteriaId": "7F47573C-1BA0-47FD-97CB-DCF6FBC7FDBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "D8A00F4C-A885-466D-8047-4BE68EEDF306",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "CDD79510-E829-4ADC-96D4-EA8072F192AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
"matchCriteriaId": "E990766D-FBD4-404E-A783-3D2D0BC210F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc050:*:*:*:*:*:*:*",
"matchCriteriaId": "07BF0A47-08A3-4AF2-99A8-70273044BA1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc090:*:*:*:*:*:*:*",
"matchCriteriaId": "07EF0617-C5DF-4143-BA10-236386339037",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "3E8FC65E-DD9E-4179-84D4-9BC78E70AC27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "E7C39533-D4AF-47CA-9EFD-8C69AA3E5B61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "9EC55D6F-A02A-4BE6-A25D-83C89BB3F1B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
"matchCriteriaId": "13593E94-606F-42EF-9253-4FED0F109B2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "76B53D29-9848-43A1-948B-2F468BFBEDD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "4A6C40FB-306E-4461-879D-F8BE8F4BC20F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc101:*:*:*:*:*:*:*",
"matchCriteriaId": "AA6E88F3-6B23-4868-8487-0A1172D10DE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "06C078DB-743F-4E37-A435-8FF79DA908DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "F0EE488E-AB7D-4945-8D97-37BF2CA14505",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "C723D96F-7D16-4167-B3D8-382C6A59265B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
"matchCriteriaId": "6D04B355-93F0-44FB-AAD4-33D91B19A55B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "CEC19D43-B5B6-41A5-A36E-C79F32695E62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*",
"matchCriteriaId": "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "73CEF009-33BC-4F61-9C43-F01BE6DE87F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "0052905E-E993-461B-B6F5-0639AEDD4CB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "BE9DEB2E-5C45-47A8-96FA-88F6699262E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "7412661D-D8CB-4F2C-ADDF-C4D3358E94CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "D8B5B46D-F733-438A-8615-93E4855205D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
"matchCriteriaId": "B80E521E-1BFB-405E-9F8E-4A0734731FD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "3E8CABA6-DE36-4C65-9BDC-F8BD9A37012C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc601:*:*:*:*:*:*:*",
"matchCriteriaId": "8D8546A4-6952-4220-87E6-D08245856B63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*",
"matchCriteriaId": "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "DE76FD2A-807F-4176-8F13-32BCE257AA25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50spc009:*:*:*:*:*:*:*",
"matchCriteriaId": "75E9A883-E128-4E73-A1C7-321A5AF13F14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "35BC6F88-3506-4F68-ACFE-F24C9DAC0E9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "1C9E8E40-8E4D-4A3C-84DF-64EA74D3A6F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "55914156-2029-4C67-BAF9-958C2867783C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "1746EBB4-9823-4817-B8D9-E17122F19EEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "880E7D7A-8F10-4E5F-B129-39525E2FF5D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60:*:*:*:*:*:*:*",
"matchCriteriaId": "F6AACFD2-9C9D-49E3-A911-0CF58F863EE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "5C7E8D01-8697-4ABE-A217-81BF0BC32FEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "260A0F9E-FC3C-4469-9D6F-83A524C43213",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "03C9B67D-479B-4C6A-9657-C38C194B5CB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "B6007060-5364-46B0-A516-1A889F938E00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "79433751-9777-412C-A305-FF64EAEBFA32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "5226BD96-2B00-469B-AADD-CD0541610BBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c80:*:*:*:*:*:*:*",
"matchCriteriaId": "C0F5C89A-DA13-46D1-BDCF-0BD94F7B7861",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c80pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "248B2C91-E319-4D93-9CBC-06DF257A7820",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "391BFC6B-9AE6-49D7-855A-CB94AD1EE5C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "4DB3FD6B-0EE4-4467-8BAE-AE52FB2906EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00spc102:*:*:*:*:*:*:*",
"matchCriteriaId": "97525BE5-4537-45D2-9D2E-4D65D08B688B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE469876-F873-4705-9760-097AE840A818",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c10:*:*:*:*:*:*:*",
"matchCriteriaId": "92766749-AF9B-4AAD-8D1C-44F021F5332D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c10spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "2372745A-F764-4E31-8B6A-A58EE61E0C87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c10spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "03B183EF-BCB9-4FD1-8C52-16236175D250",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "D60C4269-BE98-4381-8197-4787E09AD870",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "8BD628CE-01BC-4E84-ADB8-2BE63EF08983",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "2C4A975B-0CB1-4EF0-920F-E58F14F42047",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c20spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "FA31E611-AA6F-4BB6-A817-344E658D1474",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c20spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "58F41C73-1166-4EF2-8048-5C95452A51B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c20spc600:*:*:*:*:*:*:*",
"matchCriteriaId": "62F4668E-54A1-42DE-9DBD-83B1F4DE353A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r003c00:*:*:*:*:*:*:*",
"matchCriteriaId": "778A61F5-661E-4B41-B08D-C623957BEEE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r003c00spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "DF6B4AEC-B3D4-4D9A-885A-85FE4BFD44A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "89960F41-C9A0-46E2-8953-0BECE3001835",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "7055F93D-6C68-4482-A8D1-C4DCC0F587C1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:usg6000v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88E8A1C0-CD02-4D4E-8DFC-0E03CF914C68",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c50spc700:*:*:*:*:*:*:*",
"matchCriteriaId": "C07026F7-772B-4B8F-BCAB-45E8F8803EF0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:espace_u1981:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C7BD4D80-D901-4082-B74D-A1D0CC24CA9F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board may send crafted messages from the internal network port or tamper with inter-process message packets to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the affected board to be abnormal."
},
{
"lang": "es",
"value": "Ciertos productos de Huawei (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981), tienen una vulnerabilidad de lectura fuera de l\u00edmites. Un atacante que inicie sesi\u00f3n en la tarjeta puede enviar mensajes especialmente dise\u00f1ados desde el puerto de red interno o manipular los paquetes de mensajes entre procesos para explotar esta vulnerabilidad. Debido a una comprobaci\u00f3n insuficiente del mensaje, una explotaci\u00f3n con \u00e9xito puede causar que la tarjeta afectada sea anormal."
}
],
"id": "CVE-2019-5254",
"lastModified": "2024-11-21T04:44:36.743",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-12-13T23:15:11.660",
"references": [
{
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
],
"sourceIdentifier": "psirt@huawei.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2019-5255
Vulnerability from fkie_nvd - Published: 2019-12-13 23:15 - Updated: 2024-11-21 04:44
Severity ?
Summary
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have a DoS vulnerability. An attacker may send crafted messages from a FTP client to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the system out-of-bounds read and result in a denial of service condition of the affected service.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ap2000_firmware:v200r005c30:*:*:*:*:*:*:*",
"matchCriteriaId": "B0036EB0-2E93-45E8-BFC6-00C254075F52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ap2000_firmware:v200r006c10:*:*:*:*:*:*:*",
"matchCriteriaId": "BFAEA83D-A929-4039-8792-AAB6191E7990",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ap2000_firmware:v200r006c20:*:*:*:*:*:*:*",
"matchCriteriaId": "C51D8548-6514-42CB-8557-BB7F971BF773",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ap2000_firmware:v200r007c10:*:*:*:*:*:*:*",
"matchCriteriaId": "1405158C-0B15-4D8D-B81A-C75B4586F7CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ap2000_firmware:v200r007c20:*:*:*:*:*:*:*",
"matchCriteriaId": "BD3D740E-F15F-4891-9059-E38A8F539FC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ap2000_firmware:v200r008c00:*:*:*:*:*:*:*",
"matchCriteriaId": "EECB7991-8CED-4DC6-9FB4-A8F5133583FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ap2000_firmware:v200r008c10:*:*:*:*:*:*:*",
"matchCriteriaId": "89C3653F-4AD5-4529-97C2-EFD3CC8B675C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ap2000_firmware:v200r009c00:*:*:*:*:*:*:*",
"matchCriteriaId": "63DE29FC-8571-41A7-95E5-05A760042F67",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ap2000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B7B5DEF1-5211-4843-BB26-103F7F3A2451",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "6619E377-0840-429D-A6C3-4A931811C12D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "23AEEF30-B626-4E84-A285-6E2A27F8994D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
"matchCriteriaId": "D92C5F28-9E62-421D-9ADB-50297AB29617",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
"matchCriteriaId": "12EE2BF6-880D-4A2F-8C25-6E3241DAE8DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "9ADACE38-43C3-412B-9911-AC6F9AD70299",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "E1190010-5B7D-4238-AE9A-6B0E5A95F4C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "FF6897E9-791E-4FE1-BF13-06E12326152D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "E71B6952-3ADF-45E9-A7E5-C0CCEDF43661",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
"matchCriteriaId": "15403867-09B3-4A36-88B0-A063D9E3673B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "16495210-738B-454B-87FA-DDCD3A85A463",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
"matchCriteriaId": "18DF99D5-6DEE-4872-AA00-F36E04D94DB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "F3D8BAB3-FC11-445D-A9AF-0378A36478B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c30:*:*:*:*:*:*:*",
"matchCriteriaId": "1EB4588F-67BA-46AC-90BE-746071779A0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c30spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "6B3B4756-9FA2-4911-97BA-9EA9EEC1BE4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c30spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "CF2C610B-142D-4BC7-9D50-A8827E37378A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "4206BD23-9583-460B-AC2D-9C562E1CC36A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c30spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "4060AF02-76A0-401A-95FA-241E4F1553C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c30spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "CEAFE113-89D6-439D-942E-2B4C0E753164",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c50:*:*:*:*:*:*:*",
"matchCriteriaId": "83CC5640-CDFD-4F7A-9ED6-96FCB0A63E58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c50pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "62D53945-D259-4C20-AE0E-BC4940E55B1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c80:*:*:*:*:*:*:*",
"matchCriteriaId": "5D61947E-9847-4BF7-8DBD-2FE13DA2476A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "14BCD5D2-C2B8-4FE2-945B-C55C84A25A66",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ips:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2B9F8312-6BEB-4334-A56E-B6C78F18C47A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "F8401A77-C046-4B00-B102-1188150A4299",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "B7BA9381-E9DD-4C5E-8CDE-418FC3E65967",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "1B7A1419-9F83-4937-A0E5-B0C897A58BFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
"matchCriteriaId": "71C0C6F0-44C2-4424-BE4A-1E8008C91DD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
"matchCriteriaId": "15963AA2-A849-47FD-BCD7-4CACACB20686",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "D09FB28D-6CA5-4BC3-8E30-F516EE1B23CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "069A3589-D8B9-4901-90F4-036428334F87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "6F376395-2A80-47E3-8AD0-46D55B6E4EF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "754F694C-757D-40BB-8854-D7940B5E0666",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
"matchCriteriaId": "B59A0FF2-DEDE-44E4-B4F6-3E718BF8C72A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "3782563A-3A4A-4823-817B-B6B01298F8B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
"matchCriteriaId": "7056C4BD-4A05-4C22-8964-A62C0CED3702",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "EAE25CE5-8431-4AE6-AE6B-199BEEE564F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c00:*:*:*:*:*:*:*",
"matchCriteriaId": "2245A997-F394-49B7-8BF6-57A9B1EC8731",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c00spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "F15C389E-1280-4E27-989A-E9CEC2FBC7F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c00spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "0A9693E6-D988-4FAC-AFA6-5B06FBE14175",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c00spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "D03F984B-399A-425F-8ADE-138637FD9246",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c00spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "5C0E365B-07E3-4971-BEFF-C2A825D49A15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c00spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "8A2F1EB8-A556-4BC7-A4D9-1CD549468CAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c10:*:*:*:*:*:*:*",
"matchCriteriaId": "22AF8105-E0F6-4284-A2CD-3D393F7A3386",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c10pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "7986A4EA-B908-4C7B-A419-63766A95D0D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c30:*:*:*:*:*:*:*",
"matchCriteriaId": "CFEF6777-327D-4ACB-9E63-3E6D0E1CEF57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c30pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "4BEB21F6-0CE9-4498-9409-43C4C57CAFEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "20862015-772A-4E26-9EFB-6E24CCABFC1F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ngfw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE88F4A1-3184-447D-990C-87EE39316D82",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "68837186-E482-40E9-8F40-75B2E0AA10D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "CCFBC7B3-5886-4982-8200-8062236CB760",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
"matchCriteriaId": "B01CA368-6476-49AB-8CE1-090F7DAA5842",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
"matchCriteriaId": "B0D493EC-C5C8-444B-BCA6-227D047AAB06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "1856722C-597D-495D-AFCC-21E5FF6F2359",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "80CC85C8-F102-4E5F-BAD3-9658D87CE953",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "BB63DB6A-7D35-4FD2-9707-C38098CB004E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "CD3921D5-81A0-4700-A302-7F4C276D4ABE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
"matchCriteriaId": "B9975E43-DEAF-4738-AB02-EADA280D69E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "B3D1AB25-9A98-46F9-853C-574CDE7E6677",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
"matchCriteriaId": "85BBD592-7528-4CAA-AA4F-6A6B0BEC785A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "DAFC740E-19B2-4F35-935D-56B87C73CA82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
"matchCriteriaId": "728A7B78-6E19-4656-848F-269DB955070C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "90628E91-F95D-47A8-A580-1B0A5BDE3E3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "2316F625-3ABE-49B8-AFBE-50858E2EBCD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "42C2CAD1-543D-47E2-9B12-6B2E8538C8DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "C44F7CB4-B353-4A1F-8AC9-206A5058B6EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "9C6A9790-ACA0-4BD5-9EDE-BA9619309343",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*",
"matchCriteriaId": "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "C2C3BA92-67AA-49C9-B1B3-562B875DDFB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c80:*:*:*:*:*:*:*",
"matchCriteriaId": "90CC612C-820C-4A6E-ABA8-4DE8E4E050AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "A3462B41-1DC4-4451-9575-F81C52F7A23C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E054182-CE33-45E3-8595-159A75BA5162",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "68435D97-592E-4633-BE7D-E8C47D89CD7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "64CD24E9-2CE1-4006-A281-90B4373CFC4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
"matchCriteriaId": "F22A4D97-365C-4259-9E54-77053798FD17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
"matchCriteriaId": "A19E9912-4CBD-4734-9E2F-F4262FDE7DEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "CDC040A6-3E38-4B21-9779-67CF66FDC6B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "9038E75D-50F4-4849-BD2C-8846A353B53E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "992C3880-BDBE-4CE1-8F9C-C2E488EC56E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "0545D687-6670-41B4-A1B1-1048879658B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
"matchCriteriaId": "B573FC8A-39A8-4256-97B7-1E85CA7260DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "59DC9D0D-9AF8-42DE-8B40-DA4764FBC92D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
"matchCriteriaId": "FAD2D344-EFF9-4EA8-B387-2C80FC70DC44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
"matchCriteriaId": "946F5FF7-412F-40F9-A492-DE8E11E7B919",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "5485B45E-A4CB-4177-89C7-02F18875C8C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "8116853E-1381-4CA9-A23D-FDC8D14F4987",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "F9FE889E-58A9-4D93-8054-7B845C44BDA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "0FED9D6D-98F0-4C91-994F-E11A8ED65F29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "70449EC6-AD48-4B39-9D35-7B4C5ABC498D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*",
"matchCriteriaId": "678FFB3B-C6E1-4694-B51C-D56E26B53E1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "4AEE2D42-BCFF-4C9D-9C11-6A013E671179",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c80:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF85B0A-2737-4CF8-9535-E38EA164395A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "9AC093ED-A979-4484-B758-1C16DF2D6030",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE8CA649-7AE1-497C-869B-B4DD315F342C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*",
"matchCriteriaId": "1D5066C9-7581-4284-AF23-0782870B2F03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "441C141E-5C9F-44D9-91A7-9E0426339810",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6800_firmware:v500r001c80:*:*:*:*:*:*:*",
"matchCriteriaId": "825F695B-F709-466C-BC05-B1C505991EFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "D6FCA659-5DF8-44EA-91B6-A80FBB68322A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "875441DD-575F-4F4D-A6BD-23C38641D330",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r005c03:*:*:*:*:*:*:*",
"matchCriteriaId": "5B18ABC1-A970-472A-A8BF-934D1180930E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E22D3CFF-3353-4EE2-8933-84F395469D0D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "FC6AFAC9-2A17-41D9-879F-8615305801BB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46EE0FA6-7E53-488F-81A7-B2C906D65552",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "BAF6142E-A559-412B-ADC5-06AC2362D762",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C80D3BB-868B-461C-B97A-9C94C9F80858",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "5770C48B-2E2B-4A9F-A3CC-7100B0951F74",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DDD8D36D-A4F2-4423-B57E-E9933710201E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:semg9811_firmware:v500r002c20:*:*:*:*:*:*:*",
"matchCriteriaId": "317EDE28-2FFF-4E62-9C1E-BF94935EA640",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:semg9811_firmware:v500r002c30:*:*:*:*:*:*:*",
"matchCriteriaId": "237CCC4D-23B6-460E-B88F-5DBB2F5DFF83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:semg9811_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "45E9ED50-031B-48F9-AD89-8596D8A6B551",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*",
"matchCriteriaId": "219AF4A5-4134-4265-BF69-C340665714F1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c00:*:*:*:*:*:*:*",
"matchCriteriaId": "7CA7ED4D-0BDB-4535-B121-F6D75D809D2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "D30EA2A4-706B-482F-8F6C-17CA052F83BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "49619863-C103-4ED1-A6EA-01F50E8B5DB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "F9C4FDC6-996A-4637-9E56-6E9E3ECD4D74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c00spc600:*:*:*:*:*:*:*",
"matchCriteriaId": "DBB99786-E0CC-4826-BB9C-A4A6B65ED3B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c00spc700:*:*:*:*:*:*:*",
"matchCriteriaId": "0ABB8D4E-74F0-47D8-949C-B1464F8467E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
"matchCriteriaId": "5C6CA5A8-E5AD-424A-8B9A-E114041D05EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "50774D2C-24F2-4C31-B594-38889084F222",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c20spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "0C8B61BC-A730-4644-8DD1-DE1B5FD868E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c20spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "2B2E6F99-BCED-41D3-A0CF-0960231A6681",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c20spc600:*:*:*:*:*:*:*",
"matchCriteriaId": "531D1E98-03A5-4EF4-B1E7-8761E0F1A025",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c60spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "A8306070-D264-41F0-9587-A10DFF11BACB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c60spc101:*:*:*:*:*:*:*",
"matchCriteriaId": "43B2388F-8C1C-4820-ABF8-7B5B98E9E604",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c60spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "D237F1A9-4A04-453A-A68C-DB6E9ABA3DE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c60spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "A23EAC3C-BB82-42B0-B731-63CCDBB20AB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "F9D6F845-5213-405A-B414-5AA31BF2B6ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c60spc600:*:*:*:*:*:*:*",
"matchCriteriaId": "82356358-FC77-4F13-9834-C28894589838",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "EF2F8FA9-D98F-4B2B-922F-B1A3D111253A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "CEEB9E7C-4798-4D8B-8C6D-4ED9402F2F8A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:secospace_antiddos8000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EE75ACF-D29C-4846-932D-FB9C84E1D35F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "7D088C48-A439-42DA-B4A7-018F7E25C557",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "4EBD6055-1957-476B-A4D0-977B41488256",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "439CB65D-401E-4566-92E1-6434A1A9DC56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "327AC408-B751-4E73-B1E3-AFD5B9EA3DBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
"matchCriteriaId": "6E546CF7-8F50-4884-84E4-845E3AEEAEB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
"matchCriteriaId": "F637A262-F7CE-43E9-89DD-A3FA2D1A22B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "8BBE3431-EBFA-4C4A-97B1-6384869FD197",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "3ACA5F47-A215-40D5-A8F0-16FF8AF51FDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc101:*:*:*:*:*:*:*",
"matchCriteriaId": "D9A01CAB-F734-474E-B2D6-72CC4FAFD316",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "9F11B551-9147-4DCA-8FEF-0874EEB83984",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
"matchCriteriaId": "B3048F85-AE72-4B2D-AC6B-314E6768D2FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "C9429428-8612-4845-97DD-BB21F536D5C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
"matchCriteriaId": "47C6A570-E932-441A-ADA9-F2B8C3B76974",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "3DAB40CB-963C-4BDE-B45C-F23708A37F8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
"matchCriteriaId": "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "9CC72B38-32E1-4E9C-AE9D-8A468EB7F76F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "3A310A9A-5523-487F-B616-BAC98F0ABCBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "3D8E3300-4E1E-433A-87D9-983F9C1CE2B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "0CC93088-5265-4C8A-B468-1B55CA7716B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "9A0A449E-8E35-4D68-B975-17D27D486F10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*",
"matchCriteriaId": "64E335D2-FE4B-4316-8827-4741EC9AA674",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "D22733CC-1F63-47E2-9E81-225061DC50C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c80:*:*:*:*:*:*:*",
"matchCriteriaId": "3EC5407A-FAFF-4B09-AB3A-65510DFD4510",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c80pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "D64425C0-F31B-4DD5-A4BA-5F46300865A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "68E9D32D-46F1-495B-BF83-308DFF8822F8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "673728BB-BD7D-42D4-A781-A66416CAE57F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "A28D1553-532B-4A19-A3E4-2301DA1334B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "3095F561-6B8B-48F0-BF0E-11FDD8135AF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "73B17639-2CB8-44B4-AF5F-E09567AFED37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
"matchCriteriaId": "0E963401-E680-47C7-82CE-7F80254C5BA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
"matchCriteriaId": "4D888E88-D444-4BD5-AFEA-479EAC71E12F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "B3983A57-2F07-4D21-9093-1DFEAB310E26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "0B7BA85B-9D77-44C2-B91D-5C8FC20B25A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "40798CE9-F011-4A81-B299-9F15ED1C94E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc101:*:*:*:*:*:*:*",
"matchCriteriaId": "4B566B18-15AF-4D81-B708-4DF02B974208",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "2ED44F95-064A-4E85-A030-B15E88FBEAB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
"matchCriteriaId": "F5F8C8BA-20CE-4F4B-AB13-EDF7D53F6218",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "136C075A-0069-4CA3-9174-C17B538398EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
"matchCriteriaId": "01CBA56A-4786-4D70-A1C0-CE4FE7A5DB03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "C1CE9D09-77BB-4376-9067-44AD8F717E62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
"matchCriteriaId": "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "46AC2623-CC04-4907-9D74-A97BA7CD7E1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "FF58FA6C-FDF6-4687-AEB2-28513B10A393",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "2FA2444C-EE5E-4DFC-A9F8-4744059EF7DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "CB1D0B82-E6BB-4C9A-8EE9-6D463D763E5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "5ABCBF28-73E0-40B5-8F52-7D9DF47F7953",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*",
"matchCriteriaId": "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "ECFF4642-867A-45FF-A09F-CCE4F5737A34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c80:*:*:*:*:*:*:*",
"matchCriteriaId": "E6A44500-3128-4A34-B639-28824BF60CED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c80pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "A1C1C6DE-2CB9-41AD-ADF8-D0E70440A9C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "D6C14DF5-42F7-470F-B3DD-52B5A0770EC0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "D10A0733-814F-4A5E-8030-3390D5C47136",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "49107773-A583-418A-B2F4-D93D9C6B78D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10spc201:*:*:*:*:*:*:*",
"matchCriteriaId": "7F47573C-1BA0-47FD-97CB-DCF6FBC7FDBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "D8A00F4C-A885-466D-8047-4BE68EEDF306",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "CDD79510-E829-4ADC-96D4-EA8072F192AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
"matchCriteriaId": "E990766D-FBD4-404E-A783-3D2D0BC210F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc050:*:*:*:*:*:*:*",
"matchCriteriaId": "07BF0A47-08A3-4AF2-99A8-70273044BA1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc090:*:*:*:*:*:*:*",
"matchCriteriaId": "07EF0617-C5DF-4143-BA10-236386339037",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "3E8FC65E-DD9E-4179-84D4-9BC78E70AC27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "E7C39533-D4AF-47CA-9EFD-8C69AA3E5B61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "9EC55D6F-A02A-4BE6-A25D-83C89BB3F1B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
"matchCriteriaId": "13593E94-606F-42EF-9253-4FED0F109B2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "76B53D29-9848-43A1-948B-2F468BFBEDD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "4A6C40FB-306E-4461-879D-F8BE8F4BC20F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc101:*:*:*:*:*:*:*",
"matchCriteriaId": "AA6E88F3-6B23-4868-8487-0A1172D10DE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "06C078DB-743F-4E37-A435-8FF79DA908DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "F0EE488E-AB7D-4945-8D97-37BF2CA14505",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "C723D96F-7D16-4167-B3D8-382C6A59265B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
"matchCriteriaId": "6D04B355-93F0-44FB-AAD4-33D91B19A55B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "CEC19D43-B5B6-41A5-A36E-C79F32695E62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*",
"matchCriteriaId": "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "73CEF009-33BC-4F61-9C43-F01BE6DE87F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "0052905E-E993-461B-B6F5-0639AEDD4CB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "BE9DEB2E-5C45-47A8-96FA-88F6699262E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "7412661D-D8CB-4F2C-ADDF-C4D3358E94CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "D8B5B46D-F733-438A-8615-93E4855205D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
"matchCriteriaId": "B80E521E-1BFB-405E-9F8E-4A0734731FD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "3E8CABA6-DE36-4C65-9BDC-F8BD9A37012C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc601:*:*:*:*:*:*:*",
"matchCriteriaId": "8D8546A4-6952-4220-87E6-D08245856B63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*",
"matchCriteriaId": "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "DE76FD2A-807F-4176-8F13-32BCE257AA25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50spc009:*:*:*:*:*:*:*",
"matchCriteriaId": "75E9A883-E128-4E73-A1C7-321A5AF13F14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "35BC6F88-3506-4F68-ACFE-F24C9DAC0E9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "1C9E8E40-8E4D-4A3C-84DF-64EA74D3A6F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "55914156-2029-4C67-BAF9-958C2867783C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "1746EBB4-9823-4817-B8D9-E17122F19EEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "880E7D7A-8F10-4E5F-B129-39525E2FF5D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60:*:*:*:*:*:*:*",
"matchCriteriaId": "F6AACFD2-9C9D-49E3-A911-0CF58F863EE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "5C7E8D01-8697-4ABE-A217-81BF0BC32FEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "260A0F9E-FC3C-4469-9D6F-83A524C43213",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "03C9B67D-479B-4C6A-9657-C38C194B5CB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "B6007060-5364-46B0-A516-1A889F938E00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "79433751-9777-412C-A305-FF64EAEBFA32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "5226BD96-2B00-469B-AADD-CD0541610BBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c80:*:*:*:*:*:*:*",
"matchCriteriaId": "C0F5C89A-DA13-46D1-BDCF-0BD94F7B7861",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c80pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "248B2C91-E319-4D93-9CBC-06DF257A7820",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "391BFC6B-9AE6-49D7-855A-CB94AD1EE5C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "4DB3FD6B-0EE4-4467-8BAE-AE52FB2906EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00spc102:*:*:*:*:*:*:*",
"matchCriteriaId": "97525BE5-4537-45D2-9D2E-4D65D08B688B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE469876-F873-4705-9760-097AE840A818",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c10:*:*:*:*:*:*:*",
"matchCriteriaId": "92766749-AF9B-4AAD-8D1C-44F021F5332D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c10spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "2372745A-F764-4E31-8B6A-A58EE61E0C87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c10spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "03B183EF-BCB9-4FD1-8C52-16236175D250",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "D60C4269-BE98-4381-8197-4787E09AD870",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "8BD628CE-01BC-4E84-ADB8-2BE63EF08983",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "2C4A975B-0CB1-4EF0-920F-E58F14F42047",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c20spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "FA31E611-AA6F-4BB6-A817-344E658D1474",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c20spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "58F41C73-1166-4EF2-8048-5C95452A51B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c20spc600:*:*:*:*:*:*:*",
"matchCriteriaId": "62F4668E-54A1-42DE-9DBD-83B1F4DE353A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r003c00:*:*:*:*:*:*:*",
"matchCriteriaId": "778A61F5-661E-4B41-B08D-C623957BEEE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r003c00spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "DF6B4AEC-B3D4-4D9A-885A-85FE4BFD44A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "89960F41-C9A0-46E2-8953-0BECE3001835",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "7055F93D-6C68-4482-A8D1-C4DCC0F587C1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:usg6000v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88E8A1C0-CD02-4D4E-8DFC-0E03CF914C68",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c50spc700:*:*:*:*:*:*:*",
"matchCriteriaId": "C07026F7-772B-4B8F-BCAB-45E8F8803EF0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:espace_u1981:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C7BD4D80-D901-4082-B74D-A1D0CC24CA9F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have a DoS vulnerability. An attacker may send crafted messages from a FTP client to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the system out-of-bounds read and result in a denial of service condition of the affected service."
},
{
"lang": "es",
"value": "Ciertos productos de Huawei (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981), tienen una vulnerabilidad de DoS. Un atacante puede enviar mensajes especialmente dise\u00f1ados desde un cliente FTP para explotar esta vulnerabilidad. Debido a una comprobaci\u00f3n insuficiente del mensaje, una explotaci\u00f3n con \u00e9xito puede causar que el sistema lea fuera de los l\u00edmites y resulte en una condici\u00f3n de denegaci\u00f3n de servicio del servicio afectado."
}
],
"id": "CVE-2019-5255",
"lastModified": "2024-11-21T04:44:36.930",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-12-13T23:15:11.723",
"references": [
{
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
],
"sourceIdentifier": "psirt@huawei.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2019-5257
Vulnerability from fkie_nvd - Published: 2019-12-13 23:15 - Updated: 2024-11-21 04:44
Severity ?
Summary
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace) have a resource management vulnerability. An attacker who logs in to the board may send crafted messages from the internal network.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ap2000_firmware:v200r005c30:*:*:*:*:*:*:*",
"matchCriteriaId": "B0036EB0-2E93-45E8-BFC6-00C254075F52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ap2000_firmware:v200r006c10:*:*:*:*:*:*:*",
"matchCriteriaId": "BFAEA83D-A929-4039-8792-AAB6191E7990",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ap2000_firmware:v200r006c20:*:*:*:*:*:*:*",
"matchCriteriaId": "C51D8548-6514-42CB-8557-BB7F971BF773",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ap2000_firmware:v200r007c10:*:*:*:*:*:*:*",
"matchCriteriaId": "1405158C-0B15-4D8D-B81A-C75B4586F7CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ap2000_firmware:v200r007c20:*:*:*:*:*:*:*",
"matchCriteriaId": "BD3D740E-F15F-4891-9059-E38A8F539FC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ap2000_firmware:v200r008c00:*:*:*:*:*:*:*",
"matchCriteriaId": "EECB7991-8CED-4DC6-9FB4-A8F5133583FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ap2000_firmware:v200r008c10:*:*:*:*:*:*:*",
"matchCriteriaId": "89C3653F-4AD5-4529-97C2-EFD3CC8B675C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ap2000_firmware:v200r009c00:*:*:*:*:*:*:*",
"matchCriteriaId": "63DE29FC-8571-41A7-95E5-05A760042F67",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ap2000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B7B5DEF1-5211-4843-BB26-103F7F3A2451",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "6619E377-0840-429D-A6C3-4A931811C12D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "23AEEF30-B626-4E84-A285-6E2A27F8994D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
"matchCriteriaId": "D92C5F28-9E62-421D-9ADB-50297AB29617",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
"matchCriteriaId": "12EE2BF6-880D-4A2F-8C25-6E3241DAE8DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "9ADACE38-43C3-412B-9911-AC6F9AD70299",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "E1190010-5B7D-4238-AE9A-6B0E5A95F4C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "FF6897E9-791E-4FE1-BF13-06E12326152D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "E71B6952-3ADF-45E9-A7E5-C0CCEDF43661",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
"matchCriteriaId": "15403867-09B3-4A36-88B0-A063D9E3673B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "16495210-738B-454B-87FA-DDCD3A85A463",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
"matchCriteriaId": "18DF99D5-6DEE-4872-AA00-F36E04D94DB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "F3D8BAB3-FC11-445D-A9AF-0378A36478B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c30:*:*:*:*:*:*:*",
"matchCriteriaId": "1EB4588F-67BA-46AC-90BE-746071779A0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c30spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "6B3B4756-9FA2-4911-97BA-9EA9EEC1BE4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c30spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "CF2C610B-142D-4BC7-9D50-A8827E37378A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "4206BD23-9583-460B-AC2D-9C562E1CC36A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c30spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "4060AF02-76A0-401A-95FA-241E4F1553C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c30spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "CEAFE113-89D6-439D-942E-2B4C0E753164",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c50:*:*:*:*:*:*:*",
"matchCriteriaId": "83CC5640-CDFD-4F7A-9ED6-96FCB0A63E58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c50pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "62D53945-D259-4C20-AE0E-BC4940E55B1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r001c80:*:*:*:*:*:*:*",
"matchCriteriaId": "5D61947E-9847-4BF7-8DBD-2FE13DA2476A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ips_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "14BCD5D2-C2B8-4FE2-945B-C55C84A25A66",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ips:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2B9F8312-6BEB-4334-A56E-B6C78F18C47A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "F8401A77-C046-4B00-B102-1188150A4299",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "B7BA9381-E9DD-4C5E-8CDE-418FC3E65967",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "1B7A1419-9F83-4937-A0E5-B0C897A58BFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
"matchCriteriaId": "71C0C6F0-44C2-4424-BE4A-1E8008C91DD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
"matchCriteriaId": "15963AA2-A849-47FD-BCD7-4CACACB20686",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "D09FB28D-6CA5-4BC3-8E30-F516EE1B23CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "069A3589-D8B9-4901-90F4-036428334F87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "6F376395-2A80-47E3-8AD0-46D55B6E4EF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "754F694C-757D-40BB-8854-D7940B5E0666",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
"matchCriteriaId": "B59A0FF2-DEDE-44E4-B4F6-3E718BF8C72A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "3782563A-3A4A-4823-817B-B6B01298F8B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
"matchCriteriaId": "7056C4BD-4A05-4C22-8964-A62C0CED3702",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "EAE25CE5-8431-4AE6-AE6B-199BEEE564F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c00:*:*:*:*:*:*:*",
"matchCriteriaId": "2245A997-F394-49B7-8BF6-57A9B1EC8731",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c00spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "F15C389E-1280-4E27-989A-E9CEC2FBC7F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c00spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "0A9693E6-D988-4FAC-AFA6-5B06FBE14175",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c00spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "D03F984B-399A-425F-8ADE-138637FD9246",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c00spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "5C0E365B-07E3-4971-BEFF-C2A825D49A15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c00spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "8A2F1EB8-A556-4BC7-A4D9-1CD549468CAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c10:*:*:*:*:*:*:*",
"matchCriteriaId": "22AF8105-E0F6-4284-A2CD-3D393F7A3386",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c10pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "7986A4EA-B908-4C7B-A419-63766A95D0D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c30:*:*:*:*:*:*:*",
"matchCriteriaId": "CFEF6777-327D-4ACB-9E63-3E6D0E1CEF57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r002c30pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "4BEB21F6-0CE9-4498-9409-43C4C57CAFEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ngfw_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "20862015-772A-4E26-9EFB-6E24CCABFC1F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ngfw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE88F4A1-3184-447D-990C-87EE39316D82",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "68837186-E482-40E9-8F40-75B2E0AA10D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "CCFBC7B3-5886-4982-8200-8062236CB760",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
"matchCriteriaId": "B01CA368-6476-49AB-8CE1-090F7DAA5842",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
"matchCriteriaId": "B0D493EC-C5C8-444B-BCA6-227D047AAB06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "1856722C-597D-495D-AFCC-21E5FF6F2359",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "80CC85C8-F102-4E5F-BAD3-9658D87CE953",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "BB63DB6A-7D35-4FD2-9707-C38098CB004E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "CD3921D5-81A0-4700-A302-7F4C276D4ABE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
"matchCriteriaId": "B9975E43-DEAF-4738-AB02-EADA280D69E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "B3D1AB25-9A98-46F9-853C-574CDE7E6677",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
"matchCriteriaId": "85BBD592-7528-4CAA-AA4F-6A6B0BEC785A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "DAFC740E-19B2-4F35-935D-56B87C73CA82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
"matchCriteriaId": "728A7B78-6E19-4656-848F-269DB955070C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "90628E91-F95D-47A8-A580-1B0A5BDE3E3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "2316F625-3ABE-49B8-AFBE-50858E2EBCD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "42C2CAD1-543D-47E2-9B12-6B2E8538C8DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "C44F7CB4-B353-4A1F-8AC9-206A5058B6EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "9C6A9790-ACA0-4BD5-9EDE-BA9619309343",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*",
"matchCriteriaId": "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "C2C3BA92-67AA-49C9-B1B3-562B875DDFB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c80:*:*:*:*:*:*:*",
"matchCriteriaId": "90CC612C-820C-4A6E-ABA8-4DE8E4E050AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "A3462B41-1DC4-4451-9575-F81C52F7A23C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E054182-CE33-45E3-8595-159A75BA5162",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "68435D97-592E-4633-BE7D-E8C47D89CD7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "64CD24E9-2CE1-4006-A281-90B4373CFC4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
"matchCriteriaId": "F22A4D97-365C-4259-9E54-77053798FD17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
"matchCriteriaId": "A19E9912-4CBD-4734-9E2F-F4262FDE7DEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "CDC040A6-3E38-4B21-9779-67CF66FDC6B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "9038E75D-50F4-4849-BD2C-8846A353B53E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "992C3880-BDBE-4CE1-8F9C-C2E488EC56E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "0545D687-6670-41B4-A1B1-1048879658B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
"matchCriteriaId": "B573FC8A-39A8-4256-97B7-1E85CA7260DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "59DC9D0D-9AF8-42DE-8B40-DA4764FBC92D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
"matchCriteriaId": "FAD2D344-EFF9-4EA8-B387-2C80FC70DC44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
"matchCriteriaId": "946F5FF7-412F-40F9-A492-DE8E11E7B919",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "5485B45E-A4CB-4177-89C7-02F18875C8C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "8116853E-1381-4CA9-A23D-FDC8D14F4987",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "F9FE889E-58A9-4D93-8054-7B845C44BDA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "0FED9D6D-98F0-4C91-994F-E11A8ED65F29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "70449EC6-AD48-4B39-9D35-7B4C5ABC498D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*",
"matchCriteriaId": "678FFB3B-C6E1-4694-B51C-D56E26B53E1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "4AEE2D42-BCFF-4C9D-9C11-6A013E671179",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c80:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF85B0A-2737-4CF8-9535-E38EA164395A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "9AC093ED-A979-4484-B758-1C16DF2D6030",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE8CA649-7AE1-497C-869B-B4DD315F342C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*",
"matchCriteriaId": "1D5066C9-7581-4284-AF23-0782870B2F03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "441C141E-5C9F-44D9-91A7-9E0426339810",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6800_firmware:v500r001c80:*:*:*:*:*:*:*",
"matchCriteriaId": "825F695B-F709-466C-BC05-B1C505991EFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "D6FCA659-5DF8-44EA-91B6-A80FBB68322A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "875441DD-575F-4F4D-A6BD-23C38641D330",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r005c03:*:*:*:*:*:*:*",
"matchCriteriaId": "5B18ABC1-A970-472A-A8BF-934D1180930E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E22D3CFF-3353-4EE2-8933-84F395469D0D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "FC6AFAC9-2A17-41D9-879F-8615305801BB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46EE0FA6-7E53-488F-81A7-B2C906D65552",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "BAF6142E-A559-412B-ADC5-06AC2362D762",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C80D3BB-868B-461C-B97A-9C94C9F80858",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "5770C48B-2E2B-4A9F-A3CC-7100B0951F74",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DDD8D36D-A4F2-4423-B57E-E9933710201E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:semg9811_firmware:v500r002c20:*:*:*:*:*:*:*",
"matchCriteriaId": "317EDE28-2FFF-4E62-9C1E-BF94935EA640",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:semg9811_firmware:v500r002c30:*:*:*:*:*:*:*",
"matchCriteriaId": "237CCC4D-23B6-460E-B88F-5DBB2F5DFF83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:semg9811_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "45E9ED50-031B-48F9-AD89-8596D8A6B551",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*",
"matchCriteriaId": "219AF4A5-4134-4265-BF69-C340665714F1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c00:*:*:*:*:*:*:*",
"matchCriteriaId": "7CA7ED4D-0BDB-4535-B121-F6D75D809D2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "D30EA2A4-706B-482F-8F6C-17CA052F83BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "49619863-C103-4ED1-A6EA-01F50E8B5DB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "F9C4FDC6-996A-4637-9E56-6E9E3ECD4D74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c00spc600:*:*:*:*:*:*:*",
"matchCriteriaId": "DBB99786-E0CC-4826-BB9C-A4A6B65ED3B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c00spc700:*:*:*:*:*:*:*",
"matchCriteriaId": "0ABB8D4E-74F0-47D8-949C-B1464F8467E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
"matchCriteriaId": "5C6CA5A8-E5AD-424A-8B9A-E114041D05EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "50774D2C-24F2-4C31-B594-38889084F222",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c20spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "0C8B61BC-A730-4644-8DD1-DE1B5FD868E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c20spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "2B2E6F99-BCED-41D3-A0CF-0960231A6681",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c20spc600:*:*:*:*:*:*:*",
"matchCriteriaId": "531D1E98-03A5-4EF4-B1E7-8761E0F1A025",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c60spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "A8306070-D264-41F0-9587-A10DFF11BACB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c60spc101:*:*:*:*:*:*:*",
"matchCriteriaId": "43B2388F-8C1C-4820-ABF8-7B5B98E9E604",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c60spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "D237F1A9-4A04-453A-A68C-DB6E9ABA3DE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c60spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "A23EAC3C-BB82-42B0-B731-63CCDBB20AB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "F9D6F845-5213-405A-B414-5AA31BF2B6ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c60spc600:*:*:*:*:*:*:*",
"matchCriteriaId": "82356358-FC77-4F13-9834-C28894589838",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "EF2F8FA9-D98F-4B2B-922F-B1A3D111253A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "CEEB9E7C-4798-4D8B-8C6D-4ED9402F2F8A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:secospace_antiddos8000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EE75ACF-D29C-4846-932D-FB9C84E1D35F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "7D088C48-A439-42DA-B4A7-018F7E25C557",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "4EBD6055-1957-476B-A4D0-977B41488256",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "439CB65D-401E-4566-92E1-6434A1A9DC56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "327AC408-B751-4E73-B1E3-AFD5B9EA3DBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
"matchCriteriaId": "6E546CF7-8F50-4884-84E4-845E3AEEAEB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
"matchCriteriaId": "F637A262-F7CE-43E9-89DD-A3FA2D1A22B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "8BBE3431-EBFA-4C4A-97B1-6384869FD197",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "3ACA5F47-A215-40D5-A8F0-16FF8AF51FDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc101:*:*:*:*:*:*:*",
"matchCriteriaId": "D9A01CAB-F734-474E-B2D6-72CC4FAFD316",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "9F11B551-9147-4DCA-8FEF-0874EEB83984",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
"matchCriteriaId": "B3048F85-AE72-4B2D-AC6B-314E6768D2FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "C9429428-8612-4845-97DD-BB21F536D5C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
"matchCriteriaId": "47C6A570-E932-441A-ADA9-F2B8C3B76974",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "3DAB40CB-963C-4BDE-B45C-F23708A37F8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
"matchCriteriaId": "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "9CC72B38-32E1-4E9C-AE9D-8A468EB7F76F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "3A310A9A-5523-487F-B616-BAC98F0ABCBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "3D8E3300-4E1E-433A-87D9-983F9C1CE2B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "0CC93088-5265-4C8A-B468-1B55CA7716B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "9A0A449E-8E35-4D68-B975-17D27D486F10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*",
"matchCriteriaId": "64E335D2-FE4B-4316-8827-4741EC9AA674",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "D22733CC-1F63-47E2-9E81-225061DC50C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c80:*:*:*:*:*:*:*",
"matchCriteriaId": "3EC5407A-FAFF-4B09-AB3A-65510DFD4510",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c80pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "D64425C0-F31B-4DD5-A4BA-5F46300865A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "68E9D32D-46F1-495B-BF83-308DFF8822F8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "673728BB-BD7D-42D4-A781-A66416CAE57F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "A28D1553-532B-4A19-A3E4-2301DA1334B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "3095F561-6B8B-48F0-BF0E-11FDD8135AF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "73B17639-2CB8-44B4-AF5F-E09567AFED37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
"matchCriteriaId": "0E963401-E680-47C7-82CE-7F80254C5BA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
"matchCriteriaId": "4D888E88-D444-4BD5-AFEA-479EAC71E12F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "B3983A57-2F07-4D21-9093-1DFEAB310E26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "0B7BA85B-9D77-44C2-B91D-5C8FC20B25A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "40798CE9-F011-4A81-B299-9F15ED1C94E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc101:*:*:*:*:*:*:*",
"matchCriteriaId": "4B566B18-15AF-4D81-B708-4DF02B974208",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "2ED44F95-064A-4E85-A030-B15E88FBEAB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
"matchCriteriaId": "F5F8C8BA-20CE-4F4B-AB13-EDF7D53F6218",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "136C075A-0069-4CA3-9174-C17B538398EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
"matchCriteriaId": "01CBA56A-4786-4D70-A1C0-CE4FE7A5DB03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "C1CE9D09-77BB-4376-9067-44AD8F717E62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
"matchCriteriaId": "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "46AC2623-CC04-4907-9D74-A97BA7CD7E1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "FF58FA6C-FDF6-4687-AEB2-28513B10A393",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "2FA2444C-EE5E-4DFC-A9F8-4744059EF7DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "CB1D0B82-E6BB-4C9A-8EE9-6D463D763E5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "5ABCBF28-73E0-40B5-8F52-7D9DF47F7953",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*",
"matchCriteriaId": "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "ECFF4642-867A-45FF-A09F-CCE4F5737A34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c80:*:*:*:*:*:*:*",
"matchCriteriaId": "E6A44500-3128-4A34-B639-28824BF60CED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c80pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "A1C1C6DE-2CB9-41AD-ADF8-D0E70440A9C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "D6C14DF5-42F7-470F-B3DD-52B5A0770EC0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "D10A0733-814F-4A5E-8030-3390D5C47136",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "49107773-A583-418A-B2F4-D93D9C6B78D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10spc201:*:*:*:*:*:*:*",
"matchCriteriaId": "7F47573C-1BA0-47FD-97CB-DCF6FBC7FDBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "D8A00F4C-A885-466D-8047-4BE68EEDF306",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "CDD79510-E829-4ADC-96D4-EA8072F192AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
"matchCriteriaId": "E990766D-FBD4-404E-A783-3D2D0BC210F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc050:*:*:*:*:*:*:*",
"matchCriteriaId": "07BF0A47-08A3-4AF2-99A8-70273044BA1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc090:*:*:*:*:*:*:*",
"matchCriteriaId": "07EF0617-C5DF-4143-BA10-236386339037",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "3E8FC65E-DD9E-4179-84D4-9BC78E70AC27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "E7C39533-D4AF-47CA-9EFD-8C69AA3E5B61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "9EC55D6F-A02A-4BE6-A25D-83C89BB3F1B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
"matchCriteriaId": "13593E94-606F-42EF-9253-4FED0F109B2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "76B53D29-9848-43A1-948B-2F468BFBEDD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "4A6C40FB-306E-4461-879D-F8BE8F4BC20F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc101:*:*:*:*:*:*:*",
"matchCriteriaId": "AA6E88F3-6B23-4868-8487-0A1172D10DE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "06C078DB-743F-4E37-A435-8FF79DA908DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "F0EE488E-AB7D-4945-8D97-37BF2CA14505",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "C723D96F-7D16-4167-B3D8-382C6A59265B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
"matchCriteriaId": "6D04B355-93F0-44FB-AAD4-33D91B19A55B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "CEC19D43-B5B6-41A5-A36E-C79F32695E62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*",
"matchCriteriaId": "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "73CEF009-33BC-4F61-9C43-F01BE6DE87F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "0052905E-E993-461B-B6F5-0639AEDD4CB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "BE9DEB2E-5C45-47A8-96FA-88F6699262E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "7412661D-D8CB-4F2C-ADDF-C4D3358E94CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "D8B5B46D-F733-438A-8615-93E4855205D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
"matchCriteriaId": "B80E521E-1BFB-405E-9F8E-4A0734731FD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "3E8CABA6-DE36-4C65-9BDC-F8BD9A37012C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc601:*:*:*:*:*:*:*",
"matchCriteriaId": "8D8546A4-6952-4220-87E6-D08245856B63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*",
"matchCriteriaId": "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "DE76FD2A-807F-4176-8F13-32BCE257AA25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50spc009:*:*:*:*:*:*:*",
"matchCriteriaId": "75E9A883-E128-4E73-A1C7-321A5AF13F14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "35BC6F88-3506-4F68-ACFE-F24C9DAC0E9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "1C9E8E40-8E4D-4A3C-84DF-64EA74D3A6F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "55914156-2029-4C67-BAF9-958C2867783C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "1746EBB4-9823-4817-B8D9-E17122F19EEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "880E7D7A-8F10-4E5F-B129-39525E2FF5D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60:*:*:*:*:*:*:*",
"matchCriteriaId": "F6AACFD2-9C9D-49E3-A911-0CF58F863EE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "5C7E8D01-8697-4ABE-A217-81BF0BC32FEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc100pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "260A0F9E-FC3C-4469-9D6F-83A524C43213",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "03C9B67D-479B-4C6A-9657-C38C194B5CB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc200pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "B6007060-5364-46B0-A516-1A889F938E00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "79433751-9777-412C-A305-FF64EAEBFA32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "5226BD96-2B00-469B-AADD-CD0541610BBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c80:*:*:*:*:*:*:*",
"matchCriteriaId": "C0F5C89A-DA13-46D1-BDCF-0BD94F7B7861",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c80pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "248B2C91-E319-4D93-9CBC-06DF257A7820",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "391BFC6B-9AE6-49D7-855A-CB94AD1EE5C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "4DB3FD6B-0EE4-4467-8BAE-AE52FB2906EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00spc102:*:*:*:*:*:*:*",
"matchCriteriaId": "97525BE5-4537-45D2-9D2E-4D65D08B688B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE469876-F873-4705-9760-097AE840A818",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c10:*:*:*:*:*:*:*",
"matchCriteriaId": "92766749-AF9B-4AAD-8D1C-44F021F5332D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c10spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "2372745A-F764-4E31-8B6A-A58EE61E0C87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c10spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "03B183EF-BCB9-4FD1-8C52-16236175D250",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "D60C4269-BE98-4381-8197-4787E09AD870",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "8BD628CE-01BC-4E84-ADB8-2BE63EF08983",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "2C4A975B-0CB1-4EF0-920F-E58F14F42047",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c20spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "FA31E611-AA6F-4BB6-A817-344E658D1474",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c20spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "58F41C73-1166-4EF2-8048-5C95452A51B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c20spc600:*:*:*:*:*:*:*",
"matchCriteriaId": "62F4668E-54A1-42DE-9DBD-83B1F4DE353A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r003c00:*:*:*:*:*:*:*",
"matchCriteriaId": "778A61F5-661E-4B41-B08D-C623957BEEE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r003c00spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "DF6B4AEC-B3D4-4D9A-885A-85FE4BFD44A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r005c00:*:*:*:*:*:*:*",
"matchCriteriaId": "89960F41-C9A0-46E2-8953-0BECE3001835",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:usg6000v_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "7055F93D-6C68-4482-A8D1-C4DCC0F587C1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:usg6000v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88E8A1C0-CD02-4D4E-8DFC-0E03CF914C68",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c50spc700:*:*:*:*:*:*:*",
"matchCriteriaId": "C07026F7-772B-4B8F-BCAB-45E8F8803EF0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:espace_u1981:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C7BD4D80-D901-4082-B74D-A1D0CC24CA9F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace) have a resource management vulnerability. An attacker who logs in to the board may send crafted messages from the internal network."
},
{
"lang": "es",
"value": "Ciertos productos Huawei (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace), tienen una vulnerabilidad de gesti\u00f3n de recursos. Un atacante que inicia sesi\u00f3n en la tarjeta puede enviar mensajes especialmente dise\u00f1ados desde la red interna."
}
],
"id": "CVE-2019-5257",
"lastModified": "2024-11-21T04:44:37.290",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-12-13T23:15:11.910",
"references": [
{
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
],
"sourceIdentifier": "psirt@huawei.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-120"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2017-17164
Vulnerability from fkie_nvd - Published: 2018-02-15 16:29 - Updated: 2024-11-21 03:17
Severity ?
Summary
Huawei Secospace AntiDDoS8000 V500R001C20SPC500 have a memory leak vulnerability due to memory don't be released when the system open some function. An attacker could exploit it to cause memory leak, which may further lead to system exceptions.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| huawei | secospace_antiddos8000_firmware | v500r001c20spc500 | |
| huawei | secospace_antiddos8000 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c20spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "2B2E6F99-BCED-41D3-A0CF-0960231A6681",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:secospace_antiddos8000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EE75ACF-D29C-4846-932D-FB9C84E1D35F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Huawei Secospace AntiDDoS8000 V500R001C20SPC500 have a memory leak vulnerability due to memory don\u0027t be released when the system open some function. An attacker could exploit it to cause memory leak, which may further lead to system exceptions."
},
{
"lang": "es",
"value": "Huawei Secospace AntiDDoS8000 V500R001C20SPC500 tiene una vulnerabilidad de fuga de memoria debido a que la memoria no se libera cuando el sistema abre algunas funciones. Un atacante podr\u00eda aprovecharse de esto para provocar una fuga de memoria, lo que podr\u00eda conducir a excepciones del sistema."
}
],
"id": "CVE-2017-17164",
"lastModified": "2024-11-21T03:17:37.300",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2018-02-15T16:29:02.203",
"references": [
{
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171213-01-antidos-en"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171213-01-antidos-en"
}
],
"sourceIdentifier": "psirt@huawei.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-772"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2016-4576
Vulnerability from fkie_nvd - Published: 2016-05-23 19:59 - Updated: 2025-04-12 10:46
Severity ?
Summary
Buffer overflow in the Application Specific Packet Filtering (ASPF) functionality in the Huawei IPS Module, NGFW Module, NIP6300, NIP6600, Secospace USG6300, USG6500, USG6600, USG9500, and AntiDDoS8000 devices with software before V500R001C20SPC100 allows remote attackers to cause a denial of service or execute arbitrary code via a crafted packet, related to "illegitimate parameters."
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| huawei | nip6300 | - | |
| huawei | nip6300_firmware | v500r001c00 | |
| huawei | secospace_usg6500 | - | |
| huawei | secospace_usg6500_firmware | v500r001c00 | |
| huawei | secospace_antiddos8000 | - | |
| huawei | secospace_antiddos8000_firmware | v500r001c00 | |
| huawei | usg9500 | - | |
| huawei | usg9500_firmware | v500r001c00 | |
| huawei | secospace_usg6300 | - | |
| huawei | secospace_usg6300_firmware | v500r001c00 | |
| huawei | ngfw_module | - | |
| huawei | ngfw_module_firmware | v500r001c00 | |
| huawei | secospace_usg6600 | - | |
| huawei | secospace_usg6600_firmware | v500r001c00 | |
| huawei | nip6600 | - | |
| huawei | nip6600_firmware | v500r001c00 | |
| huawei | ips_module | - | |
| huawei | ips_module_firmware | v500r001c00 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E054182-CE33-45E3-8595-159A75BA5162",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
"matchCriteriaId": "4B469A91-4CD0-44D2-A982-3E612B855E71",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
"matchCriteriaId": "3189382E-6846-4713-A92F-ABD03683F4A5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:secospace_antiddos8000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EE75ACF-D29C-4846-932D-FB9C84E1D35F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c00:*:*:*:*:*:*:*",
"matchCriteriaId": "7CA7ED4D-0BDB-4535-B121-F6D75D809D2D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
"matchCriteriaId": "22007E6A-68FC-4AF4-A570-95873AFBF882",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
"matchCriteriaId": "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
"matchCriteriaId": "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
"matchCriteriaId": "80411236-6B22-4937-87F3-E06C991B14D6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE469876-F873-4705-9760-097AE840A818",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
"matchCriteriaId": "E990766D-FBD4-404E-A783-3D2D0BC210F3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE8CA649-7AE1-497C-869B-B4DD315F342C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
"matchCriteriaId": "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
"matchCriteriaId": "84477B1C-413A-4F74-86DC-55E58AD07AB9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the Application Specific Packet Filtering (ASPF) functionality in the Huawei IPS Module, NGFW Module, NIP6300, NIP6600, Secospace USG6300, USG6500, USG6600, USG9500, and AntiDDoS8000 devices with software before V500R001C20SPC100 allows remote attackers to cause a denial of service or execute arbitrary code via a crafted packet, related to \"illegitimate parameters.\""
},
{
"lang": "es",
"value": "Desbordamiento de buffer en la funcionalidad Application Specific Packet Filtering (ASPF) en dispositivos Huawei IPS Module, NGFW Module, NIP6300, NIP6600, Secospace USG6300, USG6500, USG6600, USG9500 y AntiDDoS8000 con software en versiones anteriores a V500R001C20SPC100 permite a atacantes remotos provocar una denegaci\u00f3n de servicio o ejecutar c\u00f3digo arbitrario a trav\u00e9s de un paquete manipulado, relacionado con \"illegitimate parameters\"."
}
],
"id": "CVE-2016-4576",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2016-05-23T19:59:09.980",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160511-01-aspf-en"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/90530"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160511-01-aspf-en"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/90530"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2020-1864 (GCVE-0-2020-1864)
Vulnerability from cvelistv5 – Published: 2020-03-20 14:58 – Updated: 2024-08-04 06:53
VLAI?
Summary
Some Huawei products have a security vulnerability due to improper authentication. A remote attacker needs to obtain some information and forge the peer device to send specific packets to the affected device. Due to the improper implementation of the authentication function, attackers can exploit the vulnerability to connect to affected devices and execute a series of commands.Affected product versions include:Secospace AntiDDoS8000 versions V500R001C00,V500R001C20,V500R001C60,V500R005C00.
Severity ?
No CVSS data available.
CWE
- Improper Authentication
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Secospace AntiDDoS8000 |
Affected:
V500R001C00,V500R001C20,V500R001C60,V500R005C00
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T06:53:59.881Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200318-01-authentication-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Secospace AntiDDoS8000",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "V500R001C00,V500R001C20,V500R001C60,V500R005C00"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Some Huawei products have a security vulnerability due to improper authentication. A remote attacker needs to obtain some information and forge the peer device to send specific packets to the affected device. Due to the improper implementation of the authentication function, attackers can exploit the vulnerability to connect to affected devices and execute a series of commands.Affected product versions include:Secospace AntiDDoS8000 versions V500R001C00,V500R001C20,V500R001C60,V500R005C00."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Improper Authentication",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-03-20T14:58:57",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200318-01-authentication-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2020-1864",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Secospace AntiDDoS8000",
"version": {
"version_data": [
{
"version_value": "V500R001C00,V500R001C20,V500R001C60,V500R005C00"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Some Huawei products have a security vulnerability due to improper authentication. A remote attacker needs to obtain some information and forge the peer device to send specific packets to the affected device. Due to the improper implementation of the authentication function, attackers can exploit the vulnerability to connect to affected devices and execute a series of commands.Affected product versions include:Secospace AntiDDoS8000 versions V500R001C00,V500R001C20,V500R001C60,V500R005C00."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Authentication"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200318-01-authentication-en",
"refsource": "MISC",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200318-01-authentication-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2020-1864",
"datePublished": "2020-03-20T14:58:57",
"dateReserved": "2019-11-29T00:00:00",
"dateUpdated": "2024-08-04T06:53:59.881Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-5304 (GCVE-0-2019-5304)
Vulnerability from cvelistv5 – Published: 2020-01-03 14:33 – Updated: 2024-08-04 19:54
VLAI?
Summary
Some Huawei products have a buffer error vulnerability. An unauthenticated, remote attacker could send specific MPLS Echo Request messages to the target products. Due to insufficient input validation of some parameters in the messages, successful exploit may cause the device to reset.
Severity ?
No CVSS data available.
CWE
- Buffer Error
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | AR120-S;AR1200;AR1200-S;AR150;AR150-S;AR160;AR200;AR200-S;AR2200;AR2200-S;AR3200;AR3600;IPS Module;NGFW Module;NIP6300;NIP6600;NetEngine16EX;S5700;S6700;SRG1300;SRG2300;SRG3300;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600 |
Affected:
V200R006C10
Affected: V200R007C00 Affected: V200R008C20 Affected: V200R008C50 Affected: V200R003C01 Affected: V200R005C20 Affected: V500R001C20 Affected: V500R001C30 Affected: V500R002C00 Affected: V200R005C00 Affected: V200R005C02 Affected: V200R005C03 Affected: V200R006C00 Affected: V200R008C00 Affected: V200R010C00 Affected: V200R011C00 Affected: V200R005C01 Affected: V500R001C60 Affected: V500R005C00 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T19:54:53.290Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200102-01-buffer-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "AR120-S;AR1200;AR1200-S;AR150;AR150-S;AR160;AR200;AR200-S;AR2200;AR2200-S;AR3200;AR3600;IPS Module;NGFW Module;NIP6300;NIP6600;NetEngine16EX;S5700;S6700;SRG1300;SRG2300;SRG3300;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "V200R006C10"
},
{
"status": "affected",
"version": "V200R007C00"
},
{
"status": "affected",
"version": "V200R008C20"
},
{
"status": "affected",
"version": "V200R008C50"
},
{
"status": "affected",
"version": "V200R003C01"
},
{
"status": "affected",
"version": "V200R005C20"
},
{
"status": "affected",
"version": "V500R001C20"
},
{
"status": "affected",
"version": "V500R001C30"
},
{
"status": "affected",
"version": "V500R002C00"
},
{
"status": "affected",
"version": "V200R005C00"
},
{
"status": "affected",
"version": "V200R005C02"
},
{
"status": "affected",
"version": "V200R005C03"
},
{
"status": "affected",
"version": "V200R006C00"
},
{
"status": "affected",
"version": "V200R008C00"
},
{
"status": "affected",
"version": "V200R010C00"
},
{
"status": "affected",
"version": "V200R011C00"
},
{
"status": "affected",
"version": "V200R005C01"
},
{
"status": "affected",
"version": "V500R001C60"
},
{
"status": "affected",
"version": "V500R005C00"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Some Huawei products have a buffer error vulnerability. An unauthenticated, remote attacker could send specific MPLS Echo Request messages to the target products. Due to insufficient input validation of some parameters in the messages, successful exploit may cause the device to reset."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Buffer Error",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-01-03T14:33:41",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200102-01-buffer-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2019-5304",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "AR120-S;AR1200;AR1200-S;AR150;AR150-S;AR160;AR200;AR200-S;AR2200;AR2200-S;AR3200;AR3600;IPS Module;NGFW Module;NIP6300;NIP6600;NetEngine16EX;S5700;S6700;SRG1300;SRG2300;SRG3300;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600",
"version": {
"version_data": [
{
"version_value": "V200R006C10"
},
{
"version_value": "V200R007C00"
},
{
"version_value": "V200R008C20"
},
{
"version_value": "V200R008C50"
},
{
"version_value": "V200R003C01"
},
{
"version_value": "V200R005C20"
},
{
"version_value": "V500R001C20"
},
{
"version_value": "V500R001C30"
},
{
"version_value": "V500R002C00"
},
{
"version_value": "V200R005C00"
},
{
"version_value": "V200R005C02"
},
{
"version_value": "V200R005C03"
},
{
"version_value": "V200R006C00"
},
{
"version_value": "V200R008C00"
},
{
"version_value": "V200R010C00"
},
{
"version_value": "V200R011C00"
},
{
"version_value": "V200R005C01"
},
{
"version_value": "V500R001C60"
},
{
"version_value": "V500R005C00"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Some Huawei products have a buffer error vulnerability. An unauthenticated, remote attacker could send specific MPLS Echo Request messages to the target products. Due to insufficient input validation of some parameters in the messages, successful exploit may cause the device to reset."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Buffer Error"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200102-01-buffer-en",
"refsource": "MISC",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200102-01-buffer-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2019-5304",
"datePublished": "2020-01-03T14:33:41",
"dateReserved": "2019-01-04T00:00:00",
"dateUpdated": "2024-08-04T19:54:53.290Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-5254 (GCVE-0-2019-5254)
Vulnerability from cvelistv5 – Published: 2019-12-13 22:51 – Updated: 2024-08-04 19:47
VLAI?
Summary
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board may send crafted messages from the internal network port or tamper with inter-process message packets to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the affected board to be abnormal.
Severity ?
No CVSS data available.
CWE
- out-of-bounds read
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981 |
Affected:
V200R005C30
Affected: V200R006C10 Affected: V200R006C20 Affected: V200R007C10 Affected: V200R007C20 Affected: V200R008C00 Affected: V200R008C10 Affected: V200R009C00 Affected: V500R001C00SPC300 Affected: V500R001C00SPC500 Affected: V500R001C00SPH303 Affected: V500R001C00SPH508 Affected: V500R001C20 Affected: V500R001C20SPC100 Affected: V500R001C20SPC100PWE Affected: V500R001C20SPC200 Affected: V500R001C20SPC200B062 Affected: V500R001C20SPC200PWE Affected: V500R001C20SPC300B078 Affected: V500R001C20SPC300PWE Affected: V500R001C30 Affected: V500R001C30SPC100 Affected: V500R001C30SPC100PWE Affected: V500R001C30SPC200 Affected: V500R001C30SPC200PWE Affected: V500R001C30SPC300 Affected: V500R001C50 Affected: V500R001C50PWE Affected: V500R001C80 Affected: V500R005C00 Affected: V500R001C00SPC500PWE Affected: V500R002C00 Affected: V500R002C00SPC100 Affected: V500R002C00SPC100PWE Affected: V500R002C00SPC200 Affected: V500R002C00SPC200PWE Affected: V500R002C00SPC300 Affected: V500R002C10 Affected: V500R002C10PWE Affected: V500R002C30 Affected: V500R002C30PWE Affected: V200R005C03 Affected: V200R003C00SPC100 Affected: V500R002C20 Affected: V500R001C00 Affected: V500R001C00SPC200 Affected: V500R001C00SPC600 Affected: V500R001C00SPC700 Affected: V500R001C20SPC300 Affected: V500R001C20SPC500 Affected: V500R001C20SPC600 Affected: V500R001C60SPC100 Affected: V500R001C60SPC101 Affected: V500R001C60SPC200 Affected: V500R001C60SPC300 Affected: V500R001C60SPC500 Affected: V500R001C60SPC600 Affected: V500R005C00SPC100 Affected: V100R001C20SPC100 Affected: V500R001C20SPC101 Affected: V500R001C80PWE Affected: V100R001C00SPC200 Affected: V100R001C10SPC200 Affected: V100R001C10SPC201 Affected: V100R001C20SPC200 Affected: V500R001C00SPC050 Affected: V500R001C00SPC090 Affected: V500R001C30SPC500 Affected: V500R001C30SPC600 Affected: V500R001C30SPC600PWE Affected: V500R001C30SPC601 Affected: V500R001C50SPC009 Affected: V500R001C50SPC100 Affected: V500R001C50SPC100PWE Affected: V500R001C50SPC200 Affected: V500R001C50SPC200PWE Affected: V500R001C50SPC300 Affected: V500R001C60 Affected: V500R001C60SPC100PWE Affected: V500R001C60SPC200PWE Affected: V500R005C00SPC102 Affected: V500R001C10 Affected: V500R001C10SPC100 Affected: V500R001C10SPC200 Affected: V500R003C00 Affected: V500R003C00SPC100 Affected: V200R003C50SPC700 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T19:47:56.865Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "V200R005C30"
},
{
"status": "affected",
"version": "V200R006C10"
},
{
"status": "affected",
"version": "V200R006C20"
},
{
"status": "affected",
"version": "V200R007C10"
},
{
"status": "affected",
"version": "V200R007C20"
},
{
"status": "affected",
"version": "V200R008C00"
},
{
"status": "affected",
"version": "V200R008C10"
},
{
"status": "affected",
"version": "V200R009C00"
},
{
"status": "affected",
"version": "V500R001C00SPC300"
},
{
"status": "affected",
"version": "V500R001C00SPC500"
},
{
"status": "affected",
"version": "V500R001C00SPH303"
},
{
"status": "affected",
"version": "V500R001C00SPH508"
},
{
"status": "affected",
"version": "V500R001C20"
},
{
"status": "affected",
"version": "V500R001C20SPC100"
},
{
"status": "affected",
"version": "V500R001C20SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C20SPC200"
},
{
"status": "affected",
"version": "V500R001C20SPC200B062"
},
{
"status": "affected",
"version": "V500R001C20SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C20SPC300B078"
},
{
"status": "affected",
"version": "V500R001C20SPC300PWE"
},
{
"status": "affected",
"version": "V500R001C30"
},
{
"status": "affected",
"version": "V500R001C30SPC100"
},
{
"status": "affected",
"version": "V500R001C30SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC200"
},
{
"status": "affected",
"version": "V500R001C30SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC300"
},
{
"status": "affected",
"version": "V500R001C50"
},
{
"status": "affected",
"version": "V500R001C50PWE"
},
{
"status": "affected",
"version": "V500R001C80"
},
{
"status": "affected",
"version": "V500R005C00"
},
{
"status": "affected",
"version": "V500R001C00SPC500PWE"
},
{
"status": "affected",
"version": "V500R002C00"
},
{
"status": "affected",
"version": "V500R002C00SPC100"
},
{
"status": "affected",
"version": "V500R002C00SPC100PWE"
},
{
"status": "affected",
"version": "V500R002C00SPC200"
},
{
"status": "affected",
"version": "V500R002C00SPC200PWE"
},
{
"status": "affected",
"version": "V500R002C00SPC300"
},
{
"status": "affected",
"version": "V500R002C10"
},
{
"status": "affected",
"version": "V500R002C10PWE"
},
{
"status": "affected",
"version": "V500R002C30"
},
{
"status": "affected",
"version": "V500R002C30PWE"
},
{
"status": "affected",
"version": "V200R005C03"
},
{
"status": "affected",
"version": "V200R003C00SPC100"
},
{
"status": "affected",
"version": "V500R002C20"
},
{
"status": "affected",
"version": "V500R001C00"
},
{
"status": "affected",
"version": "V500R001C00SPC200"
},
{
"status": "affected",
"version": "V500R001C00SPC600"
},
{
"status": "affected",
"version": "V500R001C00SPC700"
},
{
"status": "affected",
"version": "V500R001C20SPC300"
},
{
"status": "affected",
"version": "V500R001C20SPC500"
},
{
"status": "affected",
"version": "V500R001C20SPC600"
},
{
"status": "affected",
"version": "V500R001C60SPC100"
},
{
"status": "affected",
"version": "V500R001C60SPC101"
},
{
"status": "affected",
"version": "V500R001C60SPC200"
},
{
"status": "affected",
"version": "V500R001C60SPC300"
},
{
"status": "affected",
"version": "V500R001C60SPC500"
},
{
"status": "affected",
"version": "V500R001C60SPC600"
},
{
"status": "affected",
"version": "V500R005C00SPC100"
},
{
"status": "affected",
"version": "V100R001C20SPC100"
},
{
"status": "affected",
"version": "V500R001C20SPC101"
},
{
"status": "affected",
"version": "V500R001C80PWE"
},
{
"status": "affected",
"version": "V100R001C00SPC200"
},
{
"status": "affected",
"version": "V100R001C10SPC200"
},
{
"status": "affected",
"version": "V100R001C10SPC201"
},
{
"status": "affected",
"version": "V100R001C20SPC200"
},
{
"status": "affected",
"version": "V500R001C00SPC050"
},
{
"status": "affected",
"version": "V500R001C00SPC090"
},
{
"status": "affected",
"version": "V500R001C30SPC500"
},
{
"status": "affected",
"version": "V500R001C30SPC600"
},
{
"status": "affected",
"version": "V500R001C30SPC600PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC601"
},
{
"status": "affected",
"version": "V500R001C50SPC009"
},
{
"status": "affected",
"version": "V500R001C50SPC100"
},
{
"status": "affected",
"version": "V500R001C50SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C50SPC200"
},
{
"status": "affected",
"version": "V500R001C50SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C50SPC300"
},
{
"status": "affected",
"version": "V500R001C60"
},
{
"status": "affected",
"version": "V500R001C60SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C60SPC200PWE"
},
{
"status": "affected",
"version": "V500R005C00SPC102"
},
{
"status": "affected",
"version": "V500R001C10"
},
{
"status": "affected",
"version": "V500R001C10SPC100"
},
{
"status": "affected",
"version": "V500R001C10SPC200"
},
{
"status": "affected",
"version": "V500R003C00"
},
{
"status": "affected",
"version": "V500R003C00SPC100"
},
{
"status": "affected",
"version": "V200R003C50SPC700"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board may send crafted messages from the internal network port or tamper with inter-process message packets to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the affected board to be abnormal."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "out-of-bounds read",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-12-13T22:51:29",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2019-5254",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981",
"version": {
"version_data": [
{
"version_value": "V200R005C30"
},
{
"version_value": "V200R006C10"
},
{
"version_value": "V200R006C20"
},
{
"version_value": "V200R007C10"
},
{
"version_value": "V200R007C20"
},
{
"version_value": "V200R008C00"
},
{
"version_value": "V200R008C10"
},
{
"version_value": "V200R009C00"
},
{
"version_value": "V500R001C00SPC300"
},
{
"version_value": "V500R001C00SPC500"
},
{
"version_value": "V500R001C00SPH303"
},
{
"version_value": "V500R001C00SPH508"
},
{
"version_value": "V500R001C20"
},
{
"version_value": "V500R001C20SPC100"
},
{
"version_value": "V500R001C20SPC100PWE"
},
{
"version_value": "V500R001C20SPC200"
},
{
"version_value": "V500R001C20SPC200B062"
},
{
"version_value": "V500R001C20SPC200PWE"
},
{
"version_value": "V500R001C20SPC300B078"
},
{
"version_value": "V500R001C20SPC300PWE"
},
{
"version_value": "V500R001C30"
},
{
"version_value": "V500R001C30SPC100"
},
{
"version_value": "V500R001C30SPC100PWE"
},
{
"version_value": "V500R001C30SPC200"
},
{
"version_value": "V500R001C30SPC200PWE"
},
{
"version_value": "V500R001C30SPC300"
},
{
"version_value": "V500R001C50"
},
{
"version_value": "V500R001C50PWE"
},
{
"version_value": "V500R001C80"
},
{
"version_value": "V500R005C00"
},
{
"version_value": "V500R001C00SPC500PWE"
},
{
"version_value": "V500R002C00"
},
{
"version_value": "V500R002C00SPC100"
},
{
"version_value": "V500R002C00SPC100PWE"
},
{
"version_value": "V500R002C00SPC200"
},
{
"version_value": "V500R002C00SPC200PWE"
},
{
"version_value": "V500R002C00SPC300"
},
{
"version_value": "V500R002C10"
},
{
"version_value": "V500R002C10PWE"
},
{
"version_value": "V500R002C30"
},
{
"version_value": "V500R002C30PWE"
},
{
"version_value": "V200R005C03"
},
{
"version_value": "V200R003C00SPC100"
},
{
"version_value": "V500R002C20"
},
{
"version_value": "V500R001C00"
},
{
"version_value": "V500R001C00SPC200"
},
{
"version_value": "V500R001C00SPC600"
},
{
"version_value": "V500R001C00SPC700"
},
{
"version_value": "V500R001C20SPC300"
},
{
"version_value": "V500R001C20SPC500"
},
{
"version_value": "V500R001C20SPC600"
},
{
"version_value": "V500R001C60SPC100"
},
{
"version_value": "V500R001C60SPC101"
},
{
"version_value": "V500R001C60SPC200"
},
{
"version_value": "V500R001C60SPC300"
},
{
"version_value": "V500R001C60SPC500"
},
{
"version_value": "V500R001C60SPC600"
},
{
"version_value": "V500R005C00SPC100"
},
{
"version_value": "V100R001C20SPC100"
},
{
"version_value": "V500R001C20SPC101"
},
{
"version_value": "V500R001C80PWE"
},
{
"version_value": "V100R001C00SPC200"
},
{
"version_value": "V100R001C10SPC200"
},
{
"version_value": "V100R001C10SPC201"
},
{
"version_value": "V100R001C20SPC200"
},
{
"version_value": "V500R001C00SPC050"
},
{
"version_value": "V500R001C00SPC090"
},
{
"version_value": "V500R001C30SPC500"
},
{
"version_value": "V500R001C30SPC600"
},
{
"version_value": "V500R001C30SPC600PWE"
},
{
"version_value": "V500R001C30SPC601"
},
{
"version_value": "V500R001C50SPC009"
},
{
"version_value": "V500R001C50SPC100"
},
{
"version_value": "V500R001C50SPC100PWE"
},
{
"version_value": "V500R001C50SPC200"
},
{
"version_value": "V500R001C50SPC200PWE"
},
{
"version_value": "V500R001C50SPC300"
},
{
"version_value": "V500R001C60"
},
{
"version_value": "V500R001C60SPC100PWE"
},
{
"version_value": "V500R001C60SPC200PWE"
},
{
"version_value": "V500R005C00SPC102"
},
{
"version_value": "V500R001C10"
},
{
"version_value": "V500R001C10SPC100"
},
{
"version_value": "V500R001C10SPC200"
},
{
"version_value": "V500R003C00"
},
{
"version_value": "V500R003C00SPC100"
},
{
"version_value": "V200R003C50SPC700"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board may send crafted messages from the internal network port or tamper with inter-process message packets to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the affected board to be abnormal."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "out-of-bounds read"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en",
"refsource": "MISC",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2019-5254",
"datePublished": "2019-12-13T22:51:29",
"dateReserved": "2019-01-04T00:00:00",
"dateUpdated": "2024-08-04T19:47:56.865Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-5255 (GCVE-0-2019-5255)
Vulnerability from cvelistv5 – Published: 2019-12-13 22:48 – Updated: 2024-08-04 19:47
VLAI?
Summary
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have a DoS vulnerability. An attacker may send crafted messages from a FTP client to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the system out-of-bounds read and result in a denial of service condition of the affected service.
Severity ?
No CVSS data available.
CWE
- DoS
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981 |
Affected:
V200R005C30
Affected: V200R006C10 Affected: V200R006C20 Affected: V200R007C10 Affected: V200R007C20 Affected: V200R008C00 Affected: V200R008C10 Affected: V200R009C00 Affected: V500R001C00SPC300 Affected: V500R001C00SPC500 Affected: V500R001C00SPH303 Affected: V500R001C00SPH508 Affected: V500R001C20 Affected: V500R001C20SPC100 Affected: V500R001C20SPC100PWE Affected: V500R001C20SPC200 Affected: V500R001C20SPC200B062 Affected: V500R001C20SPC200PWE Affected: V500R001C20SPC300B078 Affected: V500R001C20SPC300PWE Affected: V500R001C30 Affected: V500R001C30SPC100 Affected: V500R001C30SPC100PWE Affected: V500R001C30SPC200 Affected: V500R001C30SPC200PWE Affected: V500R001C30SPC300 Affected: V500R001C50 Affected: V500R001C50PWE Affected: V500R001C80 Affected: V500R005C00 Affected: V500R001C00SPC500PWE Affected: V500R002C00 Affected: V500R002C00SPC100 Affected: V500R002C00SPC100PWE Affected: V500R002C00SPC200 Affected: V500R002C00SPC200PWE Affected: V500R002C00SPC300 Affected: V500R002C10 Affected: V500R002C10PWE Affected: V500R002C30 Affected: V500R002C30PWE Affected: V200R005C03 Affected: V200R003C00SPC100 Affected: V500R002C20 Affected: V500R001C00 Affected: V500R001C00SPC200 Affected: V500R001C00SPC600 Affected: V500R001C00SPC700 Affected: V500R001C20SPC300 Affected: V500R001C20SPC500 Affected: V500R001C20SPC600 Affected: V500R001C60SPC100 Affected: V500R001C60SPC101 Affected: V500R001C60SPC200 Affected: V500R001C60SPC300 Affected: V500R001C60SPC500 Affected: V500R001C60SPC600 Affected: V500R005C00SPC100 Affected: V100R001C20SPC100 Affected: V500R001C20SPC101 Affected: V500R001C80PWE Affected: V100R001C00SPC200 Affected: V100R001C10SPC200 Affected: V100R001C10SPC201 Affected: V100R001C20SPC200 Affected: V500R001C00SPC050 Affected: V500R001C00SPC090 Affected: V500R001C30SPC500 Affected: V500R001C30SPC600 Affected: V500R001C30SPC600PWE Affected: V500R001C30SPC601 Affected: V500R001C50SPC009 Affected: V500R001C50SPC100 Affected: V500R001C50SPC100PWE Affected: V500R001C50SPC200 Affected: V500R001C50SPC200PWE Affected: V500R001C50SPC300 Affected: V500R001C60 Affected: V500R001C60SPC100PWE Affected: V500R001C60SPC200PWE Affected: V500R005C00SPC102 Affected: V500R001C10 Affected: V500R001C10SPC100 Affected: V500R001C10SPC200 Affected: V500R003C00 Affected: V500R003C00SPC100 Affected: V200R003C50SPC700 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T19:47:56.961Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "V200R005C30"
},
{
"status": "affected",
"version": "V200R006C10"
},
{
"status": "affected",
"version": "V200R006C20"
},
{
"status": "affected",
"version": "V200R007C10"
},
{
"status": "affected",
"version": "V200R007C20"
},
{
"status": "affected",
"version": "V200R008C00"
},
{
"status": "affected",
"version": "V200R008C10"
},
{
"status": "affected",
"version": "V200R009C00"
},
{
"status": "affected",
"version": "V500R001C00SPC300"
},
{
"status": "affected",
"version": "V500R001C00SPC500"
},
{
"status": "affected",
"version": "V500R001C00SPH303"
},
{
"status": "affected",
"version": "V500R001C00SPH508"
},
{
"status": "affected",
"version": "V500R001C20"
},
{
"status": "affected",
"version": "V500R001C20SPC100"
},
{
"status": "affected",
"version": "V500R001C20SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C20SPC200"
},
{
"status": "affected",
"version": "V500R001C20SPC200B062"
},
{
"status": "affected",
"version": "V500R001C20SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C20SPC300B078"
},
{
"status": "affected",
"version": "V500R001C20SPC300PWE"
},
{
"status": "affected",
"version": "V500R001C30"
},
{
"status": "affected",
"version": "V500R001C30SPC100"
},
{
"status": "affected",
"version": "V500R001C30SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC200"
},
{
"status": "affected",
"version": "V500R001C30SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC300"
},
{
"status": "affected",
"version": "V500R001C50"
},
{
"status": "affected",
"version": "V500R001C50PWE"
},
{
"status": "affected",
"version": "V500R001C80"
},
{
"status": "affected",
"version": "V500R005C00"
},
{
"status": "affected",
"version": "V500R001C00SPC500PWE"
},
{
"status": "affected",
"version": "V500R002C00"
},
{
"status": "affected",
"version": "V500R002C00SPC100"
},
{
"status": "affected",
"version": "V500R002C00SPC100PWE"
},
{
"status": "affected",
"version": "V500R002C00SPC200"
},
{
"status": "affected",
"version": "V500R002C00SPC200PWE"
},
{
"status": "affected",
"version": "V500R002C00SPC300"
},
{
"status": "affected",
"version": "V500R002C10"
},
{
"status": "affected",
"version": "V500R002C10PWE"
},
{
"status": "affected",
"version": "V500R002C30"
},
{
"status": "affected",
"version": "V500R002C30PWE"
},
{
"status": "affected",
"version": "V200R005C03"
},
{
"status": "affected",
"version": "V200R003C00SPC100"
},
{
"status": "affected",
"version": "V500R002C20"
},
{
"status": "affected",
"version": "V500R001C00"
},
{
"status": "affected",
"version": "V500R001C00SPC200"
},
{
"status": "affected",
"version": "V500R001C00SPC600"
},
{
"status": "affected",
"version": "V500R001C00SPC700"
},
{
"status": "affected",
"version": "V500R001C20SPC300"
},
{
"status": "affected",
"version": "V500R001C20SPC500"
},
{
"status": "affected",
"version": "V500R001C20SPC600"
},
{
"status": "affected",
"version": "V500R001C60SPC100"
},
{
"status": "affected",
"version": "V500R001C60SPC101"
},
{
"status": "affected",
"version": "V500R001C60SPC200"
},
{
"status": "affected",
"version": "V500R001C60SPC300"
},
{
"status": "affected",
"version": "V500R001C60SPC500"
},
{
"status": "affected",
"version": "V500R001C60SPC600"
},
{
"status": "affected",
"version": "V500R005C00SPC100"
},
{
"status": "affected",
"version": "V100R001C20SPC100"
},
{
"status": "affected",
"version": "V500R001C20SPC101"
},
{
"status": "affected",
"version": "V500R001C80PWE"
},
{
"status": "affected",
"version": "V100R001C00SPC200"
},
{
"status": "affected",
"version": "V100R001C10SPC200"
},
{
"status": "affected",
"version": "V100R001C10SPC201"
},
{
"status": "affected",
"version": "V100R001C20SPC200"
},
{
"status": "affected",
"version": "V500R001C00SPC050"
},
{
"status": "affected",
"version": "V500R001C00SPC090"
},
{
"status": "affected",
"version": "V500R001C30SPC500"
},
{
"status": "affected",
"version": "V500R001C30SPC600"
},
{
"status": "affected",
"version": "V500R001C30SPC600PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC601"
},
{
"status": "affected",
"version": "V500R001C50SPC009"
},
{
"status": "affected",
"version": "V500R001C50SPC100"
},
{
"status": "affected",
"version": "V500R001C50SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C50SPC200"
},
{
"status": "affected",
"version": "V500R001C50SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C50SPC300"
},
{
"status": "affected",
"version": "V500R001C60"
},
{
"status": "affected",
"version": "V500R001C60SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C60SPC200PWE"
},
{
"status": "affected",
"version": "V500R005C00SPC102"
},
{
"status": "affected",
"version": "V500R001C10"
},
{
"status": "affected",
"version": "V500R001C10SPC100"
},
{
"status": "affected",
"version": "V500R001C10SPC200"
},
{
"status": "affected",
"version": "V500R003C00"
},
{
"status": "affected",
"version": "V500R003C00SPC100"
},
{
"status": "affected",
"version": "V200R003C50SPC700"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have a DoS vulnerability. An attacker may send crafted messages from a FTP client to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the system out-of-bounds read and result in a denial of service condition of the affected service."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "DoS",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-12-13T22:48:31",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2019-5255",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981",
"version": {
"version_data": [
{
"version_value": "V200R005C30"
},
{
"version_value": "V200R006C10"
},
{
"version_value": "V200R006C20"
},
{
"version_value": "V200R007C10"
},
{
"version_value": "V200R007C20"
},
{
"version_value": "V200R008C00"
},
{
"version_value": "V200R008C10"
},
{
"version_value": "V200R009C00"
},
{
"version_value": "V500R001C00SPC300"
},
{
"version_value": "V500R001C00SPC500"
},
{
"version_value": "V500R001C00SPH303"
},
{
"version_value": "V500R001C00SPH508"
},
{
"version_value": "V500R001C20"
},
{
"version_value": "V500R001C20SPC100"
},
{
"version_value": "V500R001C20SPC100PWE"
},
{
"version_value": "V500R001C20SPC200"
},
{
"version_value": "V500R001C20SPC200B062"
},
{
"version_value": "V500R001C20SPC200PWE"
},
{
"version_value": "V500R001C20SPC300B078"
},
{
"version_value": "V500R001C20SPC300PWE"
},
{
"version_value": "V500R001C30"
},
{
"version_value": "V500R001C30SPC100"
},
{
"version_value": "V500R001C30SPC100PWE"
},
{
"version_value": "V500R001C30SPC200"
},
{
"version_value": "V500R001C30SPC200PWE"
},
{
"version_value": "V500R001C30SPC300"
},
{
"version_value": "V500R001C50"
},
{
"version_value": "V500R001C50PWE"
},
{
"version_value": "V500R001C80"
},
{
"version_value": "V500R005C00"
},
{
"version_value": "V500R001C00SPC500PWE"
},
{
"version_value": "V500R002C00"
},
{
"version_value": "V500R002C00SPC100"
},
{
"version_value": "V500R002C00SPC100PWE"
},
{
"version_value": "V500R002C00SPC200"
},
{
"version_value": "V500R002C00SPC200PWE"
},
{
"version_value": "V500R002C00SPC300"
},
{
"version_value": "V500R002C10"
},
{
"version_value": "V500R002C10PWE"
},
{
"version_value": "V500R002C30"
},
{
"version_value": "V500R002C30PWE"
},
{
"version_value": "V200R005C03"
},
{
"version_value": "V200R003C00SPC100"
},
{
"version_value": "V500R002C20"
},
{
"version_value": "V500R001C00"
},
{
"version_value": "V500R001C00SPC200"
},
{
"version_value": "V500R001C00SPC600"
},
{
"version_value": "V500R001C00SPC700"
},
{
"version_value": "V500R001C20SPC300"
},
{
"version_value": "V500R001C20SPC500"
},
{
"version_value": "V500R001C20SPC600"
},
{
"version_value": "V500R001C60SPC100"
},
{
"version_value": "V500R001C60SPC101"
},
{
"version_value": "V500R001C60SPC200"
},
{
"version_value": "V500R001C60SPC300"
},
{
"version_value": "V500R001C60SPC500"
},
{
"version_value": "V500R001C60SPC600"
},
{
"version_value": "V500R005C00SPC100"
},
{
"version_value": "V100R001C20SPC100"
},
{
"version_value": "V500R001C20SPC101"
},
{
"version_value": "V500R001C80PWE"
},
{
"version_value": "V100R001C00SPC200"
},
{
"version_value": "V100R001C10SPC200"
},
{
"version_value": "V100R001C10SPC201"
},
{
"version_value": "V100R001C20SPC200"
},
{
"version_value": "V500R001C00SPC050"
},
{
"version_value": "V500R001C00SPC090"
},
{
"version_value": "V500R001C30SPC500"
},
{
"version_value": "V500R001C30SPC600"
},
{
"version_value": "V500R001C30SPC600PWE"
},
{
"version_value": "V500R001C30SPC601"
},
{
"version_value": "V500R001C50SPC009"
},
{
"version_value": "V500R001C50SPC100"
},
{
"version_value": "V500R001C50SPC100PWE"
},
{
"version_value": "V500R001C50SPC200"
},
{
"version_value": "V500R001C50SPC200PWE"
},
{
"version_value": "V500R001C50SPC300"
},
{
"version_value": "V500R001C60"
},
{
"version_value": "V500R001C60SPC100PWE"
},
{
"version_value": "V500R001C60SPC200PWE"
},
{
"version_value": "V500R005C00SPC102"
},
{
"version_value": "V500R001C10"
},
{
"version_value": "V500R001C10SPC100"
},
{
"version_value": "V500R001C10SPC200"
},
{
"version_value": "V500R003C00"
},
{
"version_value": "V500R003C00SPC100"
},
{
"version_value": "V200R003C50SPC700"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have a DoS vulnerability. An attacker may send crafted messages from a FTP client to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the system out-of-bounds read and result in a denial of service condition of the affected service."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "DoS"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en",
"refsource": "MISC",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2019-5255",
"datePublished": "2019-12-13T22:48:31",
"dateReserved": "2019-01-04T00:00:00",
"dateUpdated": "2024-08-04T19:47:56.961Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-5256 (GCVE-0-2019-5256)
Vulnerability from cvelistv5 – Published: 2019-12-13 22:45 – Updated: 2024-08-04 19:47
VLAI?
Summary
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have a null pointer dereference vulnerability. The system dereferences a pointer that it expects to be valid, but is NULL. A local attacker could exploit this vulnerability by sending crafted parameters. A successful exploit could cause a denial of service and the process reboot.
Severity ?
No CVSS data available.
CWE
- null pointer dereference
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981 |
Affected:
V200R005C30
Affected: V200R006C10 Affected: V200R006C20 Affected: V200R007C10 Affected: V200R007C20 Affected: V200R008C00 Affected: V200R008C10 Affected: V200R009C00 Affected: V500R001C00SPC300 Affected: V500R001C00SPC500 Affected: V500R001C00SPH303 Affected: V500R001C00SPH508 Affected: V500R001C20 Affected: V500R001C20SPC100 Affected: V500R001C20SPC100PWE Affected: V500R001C20SPC200 Affected: V500R001C20SPC200B062 Affected: V500R001C20SPC200PWE Affected: V500R001C20SPC300B078 Affected: V500R001C20SPC300PWE Affected: V500R001C30 Affected: V500R001C30SPC100 Affected: V500R001C30SPC100PWE Affected: V500R001C30SPC200 Affected: V500R001C30SPC200PWE Affected: V500R001C30SPC300 Affected: V500R001C50 Affected: V500R001C50PWE Affected: V500R001C80 Affected: V500R005C00 Affected: V500R001C00SPC500PWE Affected: V500R002C00 Affected: V500R002C00SPC100 Affected: V500R002C00SPC100PWE Affected: V500R002C00SPC200 Affected: V500R002C00SPC200PWE Affected: V500R002C00SPC300 Affected: V500R002C10 Affected: V500R002C10PWE Affected: V500R002C30 Affected: V500R002C30PWE Affected: V200R005C03 Affected: V200R003C00SPC100 Affected: V500R002C20 Affected: V500R001C00 Affected: V500R001C00SPC200 Affected: V500R001C00SPC600 Affected: V500R001C00SPC700 Affected: V500R001C20SPC300 Affected: V500R001C20SPC500 Affected: V500R001C20SPC600 Affected: V500R001C60SPC100 Affected: V500R001C60SPC101 Affected: V500R001C60SPC200 Affected: V500R001C60SPC300 Affected: V500R001C60SPC500 Affected: V500R001C60SPC600 Affected: V500R005C00SPC100 Affected: V100R001C20SPC100 Affected: V500R001C20SPC101 Affected: V500R001C80PWE Affected: V100R001C00SPC200 Affected: V100R001C10SPC200 Affected: V100R001C10SPC201 Affected: V100R001C20SPC200 Affected: V500R001C00SPC050 Affected: V500R001C00SPC090 Affected: V500R001C30SPC500 Affected: V500R001C30SPC600 Affected: V500R001C30SPC600PWE Affected: V500R001C30SPC601 Affected: V500R001C50SPC009 Affected: V500R001C50SPC100 Affected: V500R001C50SPC100PWE Affected: V500R001C50SPC200 Affected: V500R001C50SPC200PWE Affected: V500R001C50SPC300 Affected: V500R001C60 Affected: V500R001C60SPC100PWE Affected: V500R001C60SPC200PWE Affected: V500R005C00SPC102 Affected: V500R001C10 Affected: V500R001C10SPC100 Affected: V500R001C10SPC200 Affected: V500R003C00 Affected: V500R003C00SPC100 Affected: V200R003C50SPC700 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T19:47:56.652Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "V200R005C30"
},
{
"status": "affected",
"version": "V200R006C10"
},
{
"status": "affected",
"version": "V200R006C20"
},
{
"status": "affected",
"version": "V200R007C10"
},
{
"status": "affected",
"version": "V200R007C20"
},
{
"status": "affected",
"version": "V200R008C00"
},
{
"status": "affected",
"version": "V200R008C10"
},
{
"status": "affected",
"version": "V200R009C00"
},
{
"status": "affected",
"version": "V500R001C00SPC300"
},
{
"status": "affected",
"version": "V500R001C00SPC500"
},
{
"status": "affected",
"version": "V500R001C00SPH303"
},
{
"status": "affected",
"version": "V500R001C00SPH508"
},
{
"status": "affected",
"version": "V500R001C20"
},
{
"status": "affected",
"version": "V500R001C20SPC100"
},
{
"status": "affected",
"version": "V500R001C20SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C20SPC200"
},
{
"status": "affected",
"version": "V500R001C20SPC200B062"
},
{
"status": "affected",
"version": "V500R001C20SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C20SPC300B078"
},
{
"status": "affected",
"version": "V500R001C20SPC300PWE"
},
{
"status": "affected",
"version": "V500R001C30"
},
{
"status": "affected",
"version": "V500R001C30SPC100"
},
{
"status": "affected",
"version": "V500R001C30SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC200"
},
{
"status": "affected",
"version": "V500R001C30SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC300"
},
{
"status": "affected",
"version": "V500R001C50"
},
{
"status": "affected",
"version": "V500R001C50PWE"
},
{
"status": "affected",
"version": "V500R001C80"
},
{
"status": "affected",
"version": "V500R005C00"
},
{
"status": "affected",
"version": "V500R001C00SPC500PWE"
},
{
"status": "affected",
"version": "V500R002C00"
},
{
"status": "affected",
"version": "V500R002C00SPC100"
},
{
"status": "affected",
"version": "V500R002C00SPC100PWE"
},
{
"status": "affected",
"version": "V500R002C00SPC200"
},
{
"status": "affected",
"version": "V500R002C00SPC200PWE"
},
{
"status": "affected",
"version": "V500R002C00SPC300"
},
{
"status": "affected",
"version": "V500R002C10"
},
{
"status": "affected",
"version": "V500R002C10PWE"
},
{
"status": "affected",
"version": "V500R002C30"
},
{
"status": "affected",
"version": "V500R002C30PWE"
},
{
"status": "affected",
"version": "V200R005C03"
},
{
"status": "affected",
"version": "V200R003C00SPC100"
},
{
"status": "affected",
"version": "V500R002C20"
},
{
"status": "affected",
"version": "V500R001C00"
},
{
"status": "affected",
"version": "V500R001C00SPC200"
},
{
"status": "affected",
"version": "V500R001C00SPC600"
},
{
"status": "affected",
"version": "V500R001C00SPC700"
},
{
"status": "affected",
"version": "V500R001C20SPC300"
},
{
"status": "affected",
"version": "V500R001C20SPC500"
},
{
"status": "affected",
"version": "V500R001C20SPC600"
},
{
"status": "affected",
"version": "V500R001C60SPC100"
},
{
"status": "affected",
"version": "V500R001C60SPC101"
},
{
"status": "affected",
"version": "V500R001C60SPC200"
},
{
"status": "affected",
"version": "V500R001C60SPC300"
},
{
"status": "affected",
"version": "V500R001C60SPC500"
},
{
"status": "affected",
"version": "V500R001C60SPC600"
},
{
"status": "affected",
"version": "V500R005C00SPC100"
},
{
"status": "affected",
"version": "V100R001C20SPC100"
},
{
"status": "affected",
"version": "V500R001C20SPC101"
},
{
"status": "affected",
"version": "V500R001C80PWE"
},
{
"status": "affected",
"version": "V100R001C00SPC200"
},
{
"status": "affected",
"version": "V100R001C10SPC200"
},
{
"status": "affected",
"version": "V100R001C10SPC201"
},
{
"status": "affected",
"version": "V100R001C20SPC200"
},
{
"status": "affected",
"version": "V500R001C00SPC050"
},
{
"status": "affected",
"version": "V500R001C00SPC090"
},
{
"status": "affected",
"version": "V500R001C30SPC500"
},
{
"status": "affected",
"version": "V500R001C30SPC600"
},
{
"status": "affected",
"version": "V500R001C30SPC600PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC601"
},
{
"status": "affected",
"version": "V500R001C50SPC009"
},
{
"status": "affected",
"version": "V500R001C50SPC100"
},
{
"status": "affected",
"version": "V500R001C50SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C50SPC200"
},
{
"status": "affected",
"version": "V500R001C50SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C50SPC300"
},
{
"status": "affected",
"version": "V500R001C60"
},
{
"status": "affected",
"version": "V500R001C60SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C60SPC200PWE"
},
{
"status": "affected",
"version": "V500R005C00SPC102"
},
{
"status": "affected",
"version": "V500R001C10"
},
{
"status": "affected",
"version": "V500R001C10SPC100"
},
{
"status": "affected",
"version": "V500R001C10SPC200"
},
{
"status": "affected",
"version": "V500R003C00"
},
{
"status": "affected",
"version": "V500R003C00SPC100"
},
{
"status": "affected",
"version": "V200R003C50SPC700"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have a null pointer dereference vulnerability. The system dereferences a pointer that it expects to be valid, but is NULL. A local attacker could exploit this vulnerability by sending crafted parameters. A successful exploit could cause a denial of service and the process reboot."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "null pointer dereference",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-12-13T22:45:34",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2019-5256",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981",
"version": {
"version_data": [
{
"version_value": "V200R005C30"
},
{
"version_value": "V200R006C10"
},
{
"version_value": "V200R006C20"
},
{
"version_value": "V200R007C10"
},
{
"version_value": "V200R007C20"
},
{
"version_value": "V200R008C00"
},
{
"version_value": "V200R008C10"
},
{
"version_value": "V200R009C00"
},
{
"version_value": "V500R001C00SPC300"
},
{
"version_value": "V500R001C00SPC500"
},
{
"version_value": "V500R001C00SPH303"
},
{
"version_value": "V500R001C00SPH508"
},
{
"version_value": "V500R001C20"
},
{
"version_value": "V500R001C20SPC100"
},
{
"version_value": "V500R001C20SPC100PWE"
},
{
"version_value": "V500R001C20SPC200"
},
{
"version_value": "V500R001C20SPC200B062"
},
{
"version_value": "V500R001C20SPC200PWE"
},
{
"version_value": "V500R001C20SPC300B078"
},
{
"version_value": "V500R001C20SPC300PWE"
},
{
"version_value": "V500R001C30"
},
{
"version_value": "V500R001C30SPC100"
},
{
"version_value": "V500R001C30SPC100PWE"
},
{
"version_value": "V500R001C30SPC200"
},
{
"version_value": "V500R001C30SPC200PWE"
},
{
"version_value": "V500R001C30SPC300"
},
{
"version_value": "V500R001C50"
},
{
"version_value": "V500R001C50PWE"
},
{
"version_value": "V500R001C80"
},
{
"version_value": "V500R005C00"
},
{
"version_value": "V500R001C00SPC500PWE"
},
{
"version_value": "V500R002C00"
},
{
"version_value": "V500R002C00SPC100"
},
{
"version_value": "V500R002C00SPC100PWE"
},
{
"version_value": "V500R002C00SPC200"
},
{
"version_value": "V500R002C00SPC200PWE"
},
{
"version_value": "V500R002C00SPC300"
},
{
"version_value": "V500R002C10"
},
{
"version_value": "V500R002C10PWE"
},
{
"version_value": "V500R002C30"
},
{
"version_value": "V500R002C30PWE"
},
{
"version_value": "V200R005C03"
},
{
"version_value": "V200R003C00SPC100"
},
{
"version_value": "V500R002C20"
},
{
"version_value": "V500R001C00"
},
{
"version_value": "V500R001C00SPC200"
},
{
"version_value": "V500R001C00SPC600"
},
{
"version_value": "V500R001C00SPC700"
},
{
"version_value": "V500R001C20SPC300"
},
{
"version_value": "V500R001C20SPC500"
},
{
"version_value": "V500R001C20SPC600"
},
{
"version_value": "V500R001C60SPC100"
},
{
"version_value": "V500R001C60SPC101"
},
{
"version_value": "V500R001C60SPC200"
},
{
"version_value": "V500R001C60SPC300"
},
{
"version_value": "V500R001C60SPC500"
},
{
"version_value": "V500R001C60SPC600"
},
{
"version_value": "V500R005C00SPC100"
},
{
"version_value": "V100R001C20SPC100"
},
{
"version_value": "V500R001C20SPC101"
},
{
"version_value": "V500R001C80PWE"
},
{
"version_value": "V100R001C00SPC200"
},
{
"version_value": "V100R001C10SPC200"
},
{
"version_value": "V100R001C10SPC201"
},
{
"version_value": "V100R001C20SPC200"
},
{
"version_value": "V500R001C00SPC050"
},
{
"version_value": "V500R001C00SPC090"
},
{
"version_value": "V500R001C30SPC500"
},
{
"version_value": "V500R001C30SPC600"
},
{
"version_value": "V500R001C30SPC600PWE"
},
{
"version_value": "V500R001C30SPC601"
},
{
"version_value": "V500R001C50SPC009"
},
{
"version_value": "V500R001C50SPC100"
},
{
"version_value": "V500R001C50SPC100PWE"
},
{
"version_value": "V500R001C50SPC200"
},
{
"version_value": "V500R001C50SPC200PWE"
},
{
"version_value": "V500R001C50SPC300"
},
{
"version_value": "V500R001C60"
},
{
"version_value": "V500R001C60SPC100PWE"
},
{
"version_value": "V500R001C60SPC200PWE"
},
{
"version_value": "V500R005C00SPC102"
},
{
"version_value": "V500R001C10"
},
{
"version_value": "V500R001C10SPC100"
},
{
"version_value": "V500R001C10SPC200"
},
{
"version_value": "V500R003C00"
},
{
"version_value": "V500R003C00SPC100"
},
{
"version_value": "V200R003C50SPC700"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have a null pointer dereference vulnerability. The system dereferences a pointer that it expects to be valid, but is NULL. A local attacker could exploit this vulnerability by sending crafted parameters. A successful exploit could cause a denial of service and the process reboot."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "null pointer dereference"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en",
"refsource": "MISC",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2019-5256",
"datePublished": "2019-12-13T22:45:34",
"dateReserved": "2019-01-04T00:00:00",
"dateUpdated": "2024-08-04T19:47:56.652Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-5258 (GCVE-0-2019-5258)
Vulnerability from cvelistv5 – Published: 2019-12-13 22:41 – Updated: 2024-08-04 19:47
VLAI?
Summary
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have a buffer overflow vulnerability. An attacker who logs in to the board may send crafted messages from the internal network port or tamper with inter-process message packets to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the affected board to be abnormal.
Severity ?
No CVSS data available.
CWE
- buffer overflow
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981 |
Affected:
V200R005C30
Affected: V200R006C10 Affected: V200R006C20 Affected: V200R007C10 Affected: V200R007C20 Affected: V200R008C00 Affected: V200R008C10 Affected: V200R009C00 Affected: V500R001C00SPC300 Affected: V500R001C00SPC500 Affected: V500R001C00SPH303 Affected: V500R001C00SPH508 Affected: V500R001C20 Affected: V500R001C20SPC100 Affected: V500R001C20SPC100PWE Affected: V500R001C20SPC200 Affected: V500R001C20SPC200B062 Affected: V500R001C20SPC200PWE Affected: V500R001C20SPC300B078 Affected: V500R001C20SPC300PWE Affected: V500R001C30 Affected: V500R001C30SPC100 Affected: V500R001C30SPC100PWE Affected: V500R001C30SPC200 Affected: V500R001C30SPC200PWE Affected: V500R001C30SPC300 Affected: V500R001C50 Affected: V500R001C50PWE Affected: V500R001C80 Affected: V500R005C00 Affected: V500R001C00SPC500PWE Affected: V500R002C00 Affected: V500R002C00SPC100 Affected: V500R002C00SPC100PWE Affected: V500R002C00SPC200 Affected: V500R002C00SPC200PWE Affected: V500R002C00SPC300 Affected: V500R002C10 Affected: V500R002C10PWE Affected: V500R002C30 Affected: V500R002C30PWE Affected: V200R005C03 Affected: V200R003C00SPC100 Affected: V500R002C20 Affected: V500R001C00 Affected: V500R001C00SPC200 Affected: V500R001C00SPC600 Affected: V500R001C00SPC700 Affected: V500R001C20SPC300 Affected: V500R001C20SPC500 Affected: V500R001C20SPC600 Affected: V500R001C60SPC100 Affected: V500R001C60SPC101 Affected: V500R001C60SPC200 Affected: V500R001C60SPC300 Affected: V500R001C60SPC500 Affected: V500R001C60SPC600 Affected: V500R005C00SPC100 Affected: V100R001C20SPC100 Affected: V500R001C20SPC101 Affected: V500R001C80PWE Affected: V100R001C00SPC200 Affected: V100R001C10SPC200 Affected: V100R001C10SPC201 Affected: V100R001C20SPC200 Affected: V500R001C00SPC050 Affected: V500R001C00SPC090 Affected: V500R001C30SPC500 Affected: V500R001C30SPC600 Affected: V500R001C30SPC600PWE Affected: V500R001C30SPC601 Affected: V500R001C50SPC009 Affected: V500R001C50SPC100 Affected: V500R001C50SPC100PWE Affected: V500R001C50SPC200 Affected: V500R001C50SPC200PWE Affected: V500R001C50SPC300 Affected: V500R001C60 Affected: V500R001C60SPC100PWE Affected: V500R001C60SPC200PWE Affected: V500R005C00SPC102 Affected: V500R001C10 Affected: V500R001C10SPC100 Affected: V500R001C10SPC200 Affected: V500R003C00 Affected: V500R003C00SPC100 Affected: V200R003C50SPC700 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T19:47:56.829Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "V200R005C30"
},
{
"status": "affected",
"version": "V200R006C10"
},
{
"status": "affected",
"version": "V200R006C20"
},
{
"status": "affected",
"version": "V200R007C10"
},
{
"status": "affected",
"version": "V200R007C20"
},
{
"status": "affected",
"version": "V200R008C00"
},
{
"status": "affected",
"version": "V200R008C10"
},
{
"status": "affected",
"version": "V200R009C00"
},
{
"status": "affected",
"version": "V500R001C00SPC300"
},
{
"status": "affected",
"version": "V500R001C00SPC500"
},
{
"status": "affected",
"version": "V500R001C00SPH303"
},
{
"status": "affected",
"version": "V500R001C00SPH508"
},
{
"status": "affected",
"version": "V500R001C20"
},
{
"status": "affected",
"version": "V500R001C20SPC100"
},
{
"status": "affected",
"version": "V500R001C20SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C20SPC200"
},
{
"status": "affected",
"version": "V500R001C20SPC200B062"
},
{
"status": "affected",
"version": "V500R001C20SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C20SPC300B078"
},
{
"status": "affected",
"version": "V500R001C20SPC300PWE"
},
{
"status": "affected",
"version": "V500R001C30"
},
{
"status": "affected",
"version": "V500R001C30SPC100"
},
{
"status": "affected",
"version": "V500R001C30SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC200"
},
{
"status": "affected",
"version": "V500R001C30SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC300"
},
{
"status": "affected",
"version": "V500R001C50"
},
{
"status": "affected",
"version": "V500R001C50PWE"
},
{
"status": "affected",
"version": "V500R001C80"
},
{
"status": "affected",
"version": "V500R005C00"
},
{
"status": "affected",
"version": "V500R001C00SPC500PWE"
},
{
"status": "affected",
"version": "V500R002C00"
},
{
"status": "affected",
"version": "V500R002C00SPC100"
},
{
"status": "affected",
"version": "V500R002C00SPC100PWE"
},
{
"status": "affected",
"version": "V500R002C00SPC200"
},
{
"status": "affected",
"version": "V500R002C00SPC200PWE"
},
{
"status": "affected",
"version": "V500R002C00SPC300"
},
{
"status": "affected",
"version": "V500R002C10"
},
{
"status": "affected",
"version": "V500R002C10PWE"
},
{
"status": "affected",
"version": "V500R002C30"
},
{
"status": "affected",
"version": "V500R002C30PWE"
},
{
"status": "affected",
"version": "V200R005C03"
},
{
"status": "affected",
"version": "V200R003C00SPC100"
},
{
"status": "affected",
"version": "V500R002C20"
},
{
"status": "affected",
"version": "V500R001C00"
},
{
"status": "affected",
"version": "V500R001C00SPC200"
},
{
"status": "affected",
"version": "V500R001C00SPC600"
},
{
"status": "affected",
"version": "V500R001C00SPC700"
},
{
"status": "affected",
"version": "V500R001C20SPC300"
},
{
"status": "affected",
"version": "V500R001C20SPC500"
},
{
"status": "affected",
"version": "V500R001C20SPC600"
},
{
"status": "affected",
"version": "V500R001C60SPC100"
},
{
"status": "affected",
"version": "V500R001C60SPC101"
},
{
"status": "affected",
"version": "V500R001C60SPC200"
},
{
"status": "affected",
"version": "V500R001C60SPC300"
},
{
"status": "affected",
"version": "V500R001C60SPC500"
},
{
"status": "affected",
"version": "V500R001C60SPC600"
},
{
"status": "affected",
"version": "V500R005C00SPC100"
},
{
"status": "affected",
"version": "V100R001C20SPC100"
},
{
"status": "affected",
"version": "V500R001C20SPC101"
},
{
"status": "affected",
"version": "V500R001C80PWE"
},
{
"status": "affected",
"version": "V100R001C00SPC200"
},
{
"status": "affected",
"version": "V100R001C10SPC200"
},
{
"status": "affected",
"version": "V100R001C10SPC201"
},
{
"status": "affected",
"version": "V100R001C20SPC200"
},
{
"status": "affected",
"version": "V500R001C00SPC050"
},
{
"status": "affected",
"version": "V500R001C00SPC090"
},
{
"status": "affected",
"version": "V500R001C30SPC500"
},
{
"status": "affected",
"version": "V500R001C30SPC600"
},
{
"status": "affected",
"version": "V500R001C30SPC600PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC601"
},
{
"status": "affected",
"version": "V500R001C50SPC009"
},
{
"status": "affected",
"version": "V500R001C50SPC100"
},
{
"status": "affected",
"version": "V500R001C50SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C50SPC200"
},
{
"status": "affected",
"version": "V500R001C50SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C50SPC300"
},
{
"status": "affected",
"version": "V500R001C60"
},
{
"status": "affected",
"version": "V500R001C60SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C60SPC200PWE"
},
{
"status": "affected",
"version": "V500R005C00SPC102"
},
{
"status": "affected",
"version": "V500R001C10"
},
{
"status": "affected",
"version": "V500R001C10SPC100"
},
{
"status": "affected",
"version": "V500R001C10SPC200"
},
{
"status": "affected",
"version": "V500R003C00"
},
{
"status": "affected",
"version": "V500R003C00SPC100"
},
{
"status": "affected",
"version": "V200R003C50SPC700"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have a buffer overflow vulnerability. An attacker who logs in to the board may send crafted messages from the internal network port or tamper with inter-process message packets to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the affected board to be abnormal."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "buffer overflow",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-12-13T22:41:04",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2019-5258",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981",
"version": {
"version_data": [
{
"version_value": "V200R005C30"
},
{
"version_value": "V200R006C10"
},
{
"version_value": "V200R006C20"
},
{
"version_value": "V200R007C10"
},
{
"version_value": "V200R007C20"
},
{
"version_value": "V200R008C00"
},
{
"version_value": "V200R008C10"
},
{
"version_value": "V200R009C00"
},
{
"version_value": "V500R001C00SPC300"
},
{
"version_value": "V500R001C00SPC500"
},
{
"version_value": "V500R001C00SPH303"
},
{
"version_value": "V500R001C00SPH508"
},
{
"version_value": "V500R001C20"
},
{
"version_value": "V500R001C20SPC100"
},
{
"version_value": "V500R001C20SPC100PWE"
},
{
"version_value": "V500R001C20SPC200"
},
{
"version_value": "V500R001C20SPC200B062"
},
{
"version_value": "V500R001C20SPC200PWE"
},
{
"version_value": "V500R001C20SPC300B078"
},
{
"version_value": "V500R001C20SPC300PWE"
},
{
"version_value": "V500R001C30"
},
{
"version_value": "V500R001C30SPC100"
},
{
"version_value": "V500R001C30SPC100PWE"
},
{
"version_value": "V500R001C30SPC200"
},
{
"version_value": "V500R001C30SPC200PWE"
},
{
"version_value": "V500R001C30SPC300"
},
{
"version_value": "V500R001C50"
},
{
"version_value": "V500R001C50PWE"
},
{
"version_value": "V500R001C80"
},
{
"version_value": "V500R005C00"
},
{
"version_value": "V500R001C00SPC500PWE"
},
{
"version_value": "V500R002C00"
},
{
"version_value": "V500R002C00SPC100"
},
{
"version_value": "V500R002C00SPC100PWE"
},
{
"version_value": "V500R002C00SPC200"
},
{
"version_value": "V500R002C00SPC200PWE"
},
{
"version_value": "V500R002C00SPC300"
},
{
"version_value": "V500R002C10"
},
{
"version_value": "V500R002C10PWE"
},
{
"version_value": "V500R002C30"
},
{
"version_value": "V500R002C30PWE"
},
{
"version_value": "V200R005C03"
},
{
"version_value": "V200R003C00SPC100"
},
{
"version_value": "V500R002C20"
},
{
"version_value": "V500R001C00"
},
{
"version_value": "V500R001C00SPC200"
},
{
"version_value": "V500R001C00SPC600"
},
{
"version_value": "V500R001C00SPC700"
},
{
"version_value": "V500R001C20SPC300"
},
{
"version_value": "V500R001C20SPC500"
},
{
"version_value": "V500R001C20SPC600"
},
{
"version_value": "V500R001C60SPC100"
},
{
"version_value": "V500R001C60SPC101"
},
{
"version_value": "V500R001C60SPC200"
},
{
"version_value": "V500R001C60SPC300"
},
{
"version_value": "V500R001C60SPC500"
},
{
"version_value": "V500R001C60SPC600"
},
{
"version_value": "V500R005C00SPC100"
},
{
"version_value": "V100R001C20SPC100"
},
{
"version_value": "V500R001C20SPC101"
},
{
"version_value": "V500R001C80PWE"
},
{
"version_value": "V100R001C00SPC200"
},
{
"version_value": "V100R001C10SPC200"
},
{
"version_value": "V100R001C10SPC201"
},
{
"version_value": "V100R001C20SPC200"
},
{
"version_value": "V500R001C00SPC050"
},
{
"version_value": "V500R001C00SPC090"
},
{
"version_value": "V500R001C30SPC500"
},
{
"version_value": "V500R001C30SPC600"
},
{
"version_value": "V500R001C30SPC600PWE"
},
{
"version_value": "V500R001C30SPC601"
},
{
"version_value": "V500R001C50SPC009"
},
{
"version_value": "V500R001C50SPC100"
},
{
"version_value": "V500R001C50SPC100PWE"
},
{
"version_value": "V500R001C50SPC200"
},
{
"version_value": "V500R001C50SPC200PWE"
},
{
"version_value": "V500R001C50SPC300"
},
{
"version_value": "V500R001C60"
},
{
"version_value": "V500R001C60SPC100PWE"
},
{
"version_value": "V500R001C60SPC200PWE"
},
{
"version_value": "V500R005C00SPC102"
},
{
"version_value": "V500R001C10"
},
{
"version_value": "V500R001C10SPC100"
},
{
"version_value": "V500R001C10SPC200"
},
{
"version_value": "V500R003C00"
},
{
"version_value": "V500R003C00SPC100"
},
{
"version_value": "V200R003C50SPC700"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have a buffer overflow vulnerability. An attacker who logs in to the board may send crafted messages from the internal network port or tamper with inter-process message packets to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the affected board to be abnormal."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "buffer overflow"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en",
"refsource": "MISC",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2019-5258",
"datePublished": "2019-12-13T22:41:04",
"dateReserved": "2019-01-04T00:00:00",
"dateUpdated": "2024-08-04T19:47:56.829Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-5257 (GCVE-0-2019-5257)
Vulnerability from cvelistv5 – Published: 2019-12-13 22:16 – Updated: 2024-08-04 19:47
VLAI?
Summary
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace) have a resource management vulnerability. An attacker who logs in to the board may send crafted messages from the internal network.
Severity ?
No CVSS data available.
CWE
- resource management
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981 |
Affected:
V200R005C30
Affected: V200R006C10 Affected: V200R006C20 Affected: V200R007C10 Affected: V200R007C20 Affected: V200R008C00 Affected: V200R008C10 Affected: V200R009C00 Affected: V500R001C00SPC300 Affected: V500R001C00SPC500 Affected: V500R001C00SPH303 Affected: V500R001C00SPH508 Affected: V500R001C20 Affected: V500R001C20SPC100 Affected: V500R001C20SPC100PWE Affected: V500R001C20SPC200 Affected: V500R001C20SPC200B062 Affected: V500R001C20SPC200PWE Affected: V500R001C20SPC300B078 Affected: V500R001C20SPC300PWE Affected: V500R001C30 Affected: V500R001C30SPC100 Affected: V500R001C30SPC100PWE Affected: V500R001C30SPC200 Affected: V500R001C30SPC200PWE Affected: V500R001C30SPC300 Affected: V500R001C50 Affected: V500R001C50PWE Affected: V500R001C80 Affected: V500R005C00 Affected: V500R001C00SPC500PWE Affected: V500R002C00 Affected: V500R002C00SPC100 Affected: V500R002C00SPC100PWE Affected: V500R002C00SPC200 Affected: V500R002C00SPC200PWE Affected: V500R002C00SPC300 Affected: V500R002C10 Affected: V500R002C10PWE Affected: V500R002C30 Affected: V500R002C30PWE Affected: V200R005C03 Affected: V200R003C00SPC100 Affected: V500R002C20 Affected: V500R001C00 Affected: V500R001C00SPC200 Affected: V500R001C00SPC600 Affected: V500R001C00SPC700 Affected: V500R001C20SPC300 Affected: V500R001C20SPC500 Affected: V500R001C20SPC600 Affected: V500R001C60SPC100 Affected: V500R001C60SPC101 Affected: V500R001C60SPC200 Affected: V500R001C60SPC300 Affected: V500R001C60SPC500 Affected: V500R001C60SPC600 Affected: V500R005C00SPC100 Affected: V100R001C20SPC100 Affected: V500R001C20SPC101 Affected: V500R001C80PWE Affected: V100R001C00SPC200 Affected: V100R001C10SPC200 Affected: V100R001C10SPC201 Affected: V100R001C20SPC200 Affected: V500R001C00SPC050 Affected: V500R001C00SPC090 Affected: V500R001C30SPC500 Affected: V500R001C30SPC600 Affected: V500R001C30SPC600PWE Affected: V500R001C30SPC601 Affected: V500R001C50SPC009 Affected: V500R001C50SPC100 Affected: V500R001C50SPC100PWE Affected: V500R001C50SPC200 Affected: V500R001C50SPC200PWE Affected: V500R001C50SPC300 Affected: V500R001C60 Affected: V500R001C60SPC100PWE Affected: V500R001C60SPC200PWE Affected: V500R005C00SPC102 Affected: V500R001C10 Affected: V500R001C10SPC100 Affected: V500R001C10SPC200 Affected: V500R003C00 Affected: V500R003C00SPC100 Affected: V200R003C50SPC700 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T19:47:56.752Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "V200R005C30"
},
{
"status": "affected",
"version": "V200R006C10"
},
{
"status": "affected",
"version": "V200R006C20"
},
{
"status": "affected",
"version": "V200R007C10"
},
{
"status": "affected",
"version": "V200R007C20"
},
{
"status": "affected",
"version": "V200R008C00"
},
{
"status": "affected",
"version": "V200R008C10"
},
{
"status": "affected",
"version": "V200R009C00"
},
{
"status": "affected",
"version": "V500R001C00SPC300"
},
{
"status": "affected",
"version": "V500R001C00SPC500"
},
{
"status": "affected",
"version": "V500R001C00SPH303"
},
{
"status": "affected",
"version": "V500R001C00SPH508"
},
{
"status": "affected",
"version": "V500R001C20"
},
{
"status": "affected",
"version": "V500R001C20SPC100"
},
{
"status": "affected",
"version": "V500R001C20SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C20SPC200"
},
{
"status": "affected",
"version": "V500R001C20SPC200B062"
},
{
"status": "affected",
"version": "V500R001C20SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C20SPC300B078"
},
{
"status": "affected",
"version": "V500R001C20SPC300PWE"
},
{
"status": "affected",
"version": "V500R001C30"
},
{
"status": "affected",
"version": "V500R001C30SPC100"
},
{
"status": "affected",
"version": "V500R001C30SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC200"
},
{
"status": "affected",
"version": "V500R001C30SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC300"
},
{
"status": "affected",
"version": "V500R001C50"
},
{
"status": "affected",
"version": "V500R001C50PWE"
},
{
"status": "affected",
"version": "V500R001C80"
},
{
"status": "affected",
"version": "V500R005C00"
},
{
"status": "affected",
"version": "V500R001C00SPC500PWE"
},
{
"status": "affected",
"version": "V500R002C00"
},
{
"status": "affected",
"version": "V500R002C00SPC100"
},
{
"status": "affected",
"version": "V500R002C00SPC100PWE"
},
{
"status": "affected",
"version": "V500R002C00SPC200"
},
{
"status": "affected",
"version": "V500R002C00SPC200PWE"
},
{
"status": "affected",
"version": "V500R002C00SPC300"
},
{
"status": "affected",
"version": "V500R002C10"
},
{
"status": "affected",
"version": "V500R002C10PWE"
},
{
"status": "affected",
"version": "V500R002C30"
},
{
"status": "affected",
"version": "V500R002C30PWE"
},
{
"status": "affected",
"version": "V200R005C03"
},
{
"status": "affected",
"version": "V200R003C00SPC100"
},
{
"status": "affected",
"version": "V500R002C20"
},
{
"status": "affected",
"version": "V500R001C00"
},
{
"status": "affected",
"version": "V500R001C00SPC200"
},
{
"status": "affected",
"version": "V500R001C00SPC600"
},
{
"status": "affected",
"version": "V500R001C00SPC700"
},
{
"status": "affected",
"version": "V500R001C20SPC300"
},
{
"status": "affected",
"version": "V500R001C20SPC500"
},
{
"status": "affected",
"version": "V500R001C20SPC600"
},
{
"status": "affected",
"version": "V500R001C60SPC100"
},
{
"status": "affected",
"version": "V500R001C60SPC101"
},
{
"status": "affected",
"version": "V500R001C60SPC200"
},
{
"status": "affected",
"version": "V500R001C60SPC300"
},
{
"status": "affected",
"version": "V500R001C60SPC500"
},
{
"status": "affected",
"version": "V500R001C60SPC600"
},
{
"status": "affected",
"version": "V500R005C00SPC100"
},
{
"status": "affected",
"version": "V100R001C20SPC100"
},
{
"status": "affected",
"version": "V500R001C20SPC101"
},
{
"status": "affected",
"version": "V500R001C80PWE"
},
{
"status": "affected",
"version": "V100R001C00SPC200"
},
{
"status": "affected",
"version": "V100R001C10SPC200"
},
{
"status": "affected",
"version": "V100R001C10SPC201"
},
{
"status": "affected",
"version": "V100R001C20SPC200"
},
{
"status": "affected",
"version": "V500R001C00SPC050"
},
{
"status": "affected",
"version": "V500R001C00SPC090"
},
{
"status": "affected",
"version": "V500R001C30SPC500"
},
{
"status": "affected",
"version": "V500R001C30SPC600"
},
{
"status": "affected",
"version": "V500R001C30SPC600PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC601"
},
{
"status": "affected",
"version": "V500R001C50SPC009"
},
{
"status": "affected",
"version": "V500R001C50SPC100"
},
{
"status": "affected",
"version": "V500R001C50SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C50SPC200"
},
{
"status": "affected",
"version": "V500R001C50SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C50SPC300"
},
{
"status": "affected",
"version": "V500R001C60"
},
{
"status": "affected",
"version": "V500R001C60SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C60SPC200PWE"
},
{
"status": "affected",
"version": "V500R005C00SPC102"
},
{
"status": "affected",
"version": "V500R001C10"
},
{
"status": "affected",
"version": "V500R001C10SPC100"
},
{
"status": "affected",
"version": "V500R001C10SPC200"
},
{
"status": "affected",
"version": "V500R003C00"
},
{
"status": "affected",
"version": "V500R003C00SPC100"
},
{
"status": "affected",
"version": "V200R003C50SPC700"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace) have a resource management vulnerability. An attacker who logs in to the board may send crafted messages from the internal network."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "resource management",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-12-13T22:16:22",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2019-5257",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981",
"version": {
"version_data": [
{
"version_value": "V200R005C30"
},
{
"version_value": "V200R006C10"
},
{
"version_value": "V200R006C20"
},
{
"version_value": "V200R007C10"
},
{
"version_value": "V200R007C20"
},
{
"version_value": "V200R008C00"
},
{
"version_value": "V200R008C10"
},
{
"version_value": "V200R009C00"
},
{
"version_value": "V500R001C00SPC300"
},
{
"version_value": "V500R001C00SPC500"
},
{
"version_value": "V500R001C00SPH303"
},
{
"version_value": "V500R001C00SPH508"
},
{
"version_value": "V500R001C20"
},
{
"version_value": "V500R001C20SPC100"
},
{
"version_value": "V500R001C20SPC100PWE"
},
{
"version_value": "V500R001C20SPC200"
},
{
"version_value": "V500R001C20SPC200B062"
},
{
"version_value": "V500R001C20SPC200PWE"
},
{
"version_value": "V500R001C20SPC300B078"
},
{
"version_value": "V500R001C20SPC300PWE"
},
{
"version_value": "V500R001C30"
},
{
"version_value": "V500R001C30SPC100"
},
{
"version_value": "V500R001C30SPC100PWE"
},
{
"version_value": "V500R001C30SPC200"
},
{
"version_value": "V500R001C30SPC200PWE"
},
{
"version_value": "V500R001C30SPC300"
},
{
"version_value": "V500R001C50"
},
{
"version_value": "V500R001C50PWE"
},
{
"version_value": "V500R001C80"
},
{
"version_value": "V500R005C00"
},
{
"version_value": "V500R001C00SPC500PWE"
},
{
"version_value": "V500R002C00"
},
{
"version_value": "V500R002C00SPC100"
},
{
"version_value": "V500R002C00SPC100PWE"
},
{
"version_value": "V500R002C00SPC200"
},
{
"version_value": "V500R002C00SPC200PWE"
},
{
"version_value": "V500R002C00SPC300"
},
{
"version_value": "V500R002C10"
},
{
"version_value": "V500R002C10PWE"
},
{
"version_value": "V500R002C30"
},
{
"version_value": "V500R002C30PWE"
},
{
"version_value": "V200R005C03"
},
{
"version_value": "V200R003C00SPC100"
},
{
"version_value": "V500R002C20"
},
{
"version_value": "V500R001C00"
},
{
"version_value": "V500R001C00SPC200"
},
{
"version_value": "V500R001C00SPC600"
},
{
"version_value": "V500R001C00SPC700"
},
{
"version_value": "V500R001C20SPC300"
},
{
"version_value": "V500R001C20SPC500"
},
{
"version_value": "V500R001C20SPC600"
},
{
"version_value": "V500R001C60SPC100"
},
{
"version_value": "V500R001C60SPC101"
},
{
"version_value": "V500R001C60SPC200"
},
{
"version_value": "V500R001C60SPC300"
},
{
"version_value": "V500R001C60SPC500"
},
{
"version_value": "V500R001C60SPC600"
},
{
"version_value": "V500R005C00SPC100"
},
{
"version_value": "V100R001C20SPC100"
},
{
"version_value": "V500R001C20SPC101"
},
{
"version_value": "V500R001C80PWE"
},
{
"version_value": "V100R001C00SPC200"
},
{
"version_value": "V100R001C10SPC200"
},
{
"version_value": "V100R001C10SPC201"
},
{
"version_value": "V100R001C20SPC200"
},
{
"version_value": "V500R001C00SPC050"
},
{
"version_value": "V500R001C00SPC090"
},
{
"version_value": "V500R001C30SPC500"
},
{
"version_value": "V500R001C30SPC600"
},
{
"version_value": "V500R001C30SPC600PWE"
},
{
"version_value": "V500R001C30SPC601"
},
{
"version_value": "V500R001C50SPC009"
},
{
"version_value": "V500R001C50SPC100"
},
{
"version_value": "V500R001C50SPC100PWE"
},
{
"version_value": "V500R001C50SPC200"
},
{
"version_value": "V500R001C50SPC200PWE"
},
{
"version_value": "V500R001C50SPC300"
},
{
"version_value": "V500R001C60"
},
{
"version_value": "V500R001C60SPC100PWE"
},
{
"version_value": "V500R001C60SPC200PWE"
},
{
"version_value": "V500R005C00SPC102"
},
{
"version_value": "V500R001C10"
},
{
"version_value": "V500R001C10SPC100"
},
{
"version_value": "V500R001C10SPC200"
},
{
"version_value": "V500R003C00"
},
{
"version_value": "V500R003C00SPC100"
},
{
"version_value": "V200R003C50SPC700"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace) have a resource management vulnerability. An attacker who logs in to the board may send crafted messages from the internal network."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "resource management"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en",
"refsource": "MISC",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2019-5257",
"datePublished": "2019-12-13T22:16:22",
"dateReserved": "2019-01-04T00:00:00",
"dateUpdated": "2024-08-04T19:47:56.752Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2017-17164 (GCVE-0-2017-17164)
Vulnerability from cvelistv5 – Published: 2018-02-15 16:00 – Updated: 2024-08-05 20:43
VLAI?
Summary
Huawei Secospace AntiDDoS8000 V500R001C20SPC500 have a memory leak vulnerability due to memory don't be released when the system open some function. An attacker could exploit it to cause memory leak, which may further lead to system exceptions.
Severity ?
No CVSS data available.
CWE
- memory leak
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Huawei Technologies Co., Ltd. | Secospace AntiDDoS8000 |
Affected:
V500R001C20SPC500
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T20:43:59.752Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171213-01-antidos-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Secospace AntiDDoS8000",
"vendor": "Huawei Technologies Co., Ltd.",
"versions": [
{
"status": "affected",
"version": "V500R001C20SPC500"
}
]
}
],
"datePublic": "2017-12-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Huawei Secospace AntiDDoS8000 V500R001C20SPC500 have a memory leak vulnerability due to memory don\u0027t be released when the system open some function. An attacker could exploit it to cause memory leak, which may further lead to system exceptions."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "memory leak",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-02-15T15:57:02",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171213-01-antidos-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2017-17164",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Secospace AntiDDoS8000",
"version": {
"version_data": [
{
"version_value": "V500R001C20SPC500"
}
]
}
}
]
},
"vendor_name": "Huawei Technologies Co., Ltd."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Huawei Secospace AntiDDoS8000 V500R001C20SPC500 have a memory leak vulnerability due to memory don\u0027t be released when the system open some function. An attacker could exploit it to cause memory leak, which may further lead to system exceptions."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "memory leak"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171213-01-antidos-en",
"refsource": "CONFIRM",
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171213-01-antidos-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2017-17164",
"datePublished": "2018-02-15T16:00:00",
"dateReserved": "2017-12-04T00:00:00",
"dateUpdated": "2024-08-05T20:43:59.752Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2016-4576 (GCVE-0-2016-4576)
Vulnerability from cvelistv5 – Published: 2016-05-23 19:00 – Updated: 2024-08-06 00:32
VLAI?
Summary
Buffer overflow in the Application Specific Packet Filtering (ASPF) functionality in the Huawei IPS Module, NGFW Module, NIP6300, NIP6600, Secospace USG6300, USG6500, USG6600, USG9500, and AntiDDoS8000 devices with software before V500R001C20SPC100 allows remote attackers to cause a denial of service or execute arbitrary code via a crafted packet, related to "illegitimate parameters."
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T00:32:26.013Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "90530",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/90530"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160511-01-aspf-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2016-05-11T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the Application Specific Packet Filtering (ASPF) functionality in the Huawei IPS Module, NGFW Module, NIP6300, NIP6600, Secospace USG6300, USG6500, USG6600, USG9500, and AntiDDoS8000 devices with software before V500R001C20SPC100 allows remote attackers to cause a denial of service or execute arbitrary code via a crafted packet, related to \"illegitimate parameters.\""
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-11-25T19:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "90530",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/90530"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160511-01-aspf-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-4576",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in the Application Specific Packet Filtering (ASPF) functionality in the Huawei IPS Module, NGFW Module, NIP6300, NIP6600, Secospace USG6300, USG6500, USG6600, USG9500, and AntiDDoS8000 devices with software before V500R001C20SPC100 allows remote attackers to cause a denial of service or execute arbitrary code via a crafted packet, related to \"illegitimate parameters.\""
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "90530",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/90530"
},
{
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160511-01-aspf-en",
"refsource": "CONFIRM",
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160511-01-aspf-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2016-4576",
"datePublished": "2016-05-23T19:00:00",
"dateReserved": "2016-05-11T00:00:00",
"dateUpdated": "2024-08-06T00:32:26.013Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-1864 (GCVE-0-2020-1864)
Vulnerability from nvd – Published: 2020-03-20 14:58 – Updated: 2024-08-04 06:53
VLAI?
Summary
Some Huawei products have a security vulnerability due to improper authentication. A remote attacker needs to obtain some information and forge the peer device to send specific packets to the affected device. Due to the improper implementation of the authentication function, attackers can exploit the vulnerability to connect to affected devices and execute a series of commands.Affected product versions include:Secospace AntiDDoS8000 versions V500R001C00,V500R001C20,V500R001C60,V500R005C00.
Severity ?
No CVSS data available.
CWE
- Improper Authentication
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Secospace AntiDDoS8000 |
Affected:
V500R001C00,V500R001C20,V500R001C60,V500R005C00
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T06:53:59.881Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200318-01-authentication-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Secospace AntiDDoS8000",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "V500R001C00,V500R001C20,V500R001C60,V500R005C00"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Some Huawei products have a security vulnerability due to improper authentication. A remote attacker needs to obtain some information and forge the peer device to send specific packets to the affected device. Due to the improper implementation of the authentication function, attackers can exploit the vulnerability to connect to affected devices and execute a series of commands.Affected product versions include:Secospace AntiDDoS8000 versions V500R001C00,V500R001C20,V500R001C60,V500R005C00."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Improper Authentication",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-03-20T14:58:57",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200318-01-authentication-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2020-1864",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Secospace AntiDDoS8000",
"version": {
"version_data": [
{
"version_value": "V500R001C00,V500R001C20,V500R001C60,V500R005C00"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Some Huawei products have a security vulnerability due to improper authentication. A remote attacker needs to obtain some information and forge the peer device to send specific packets to the affected device. Due to the improper implementation of the authentication function, attackers can exploit the vulnerability to connect to affected devices and execute a series of commands.Affected product versions include:Secospace AntiDDoS8000 versions V500R001C00,V500R001C20,V500R001C60,V500R005C00."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Authentication"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200318-01-authentication-en",
"refsource": "MISC",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200318-01-authentication-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2020-1864",
"datePublished": "2020-03-20T14:58:57",
"dateReserved": "2019-11-29T00:00:00",
"dateUpdated": "2024-08-04T06:53:59.881Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-5304 (GCVE-0-2019-5304)
Vulnerability from nvd – Published: 2020-01-03 14:33 – Updated: 2024-08-04 19:54
VLAI?
Summary
Some Huawei products have a buffer error vulnerability. An unauthenticated, remote attacker could send specific MPLS Echo Request messages to the target products. Due to insufficient input validation of some parameters in the messages, successful exploit may cause the device to reset.
Severity ?
No CVSS data available.
CWE
- Buffer Error
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | AR120-S;AR1200;AR1200-S;AR150;AR150-S;AR160;AR200;AR200-S;AR2200;AR2200-S;AR3200;AR3600;IPS Module;NGFW Module;NIP6300;NIP6600;NetEngine16EX;S5700;S6700;SRG1300;SRG2300;SRG3300;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600 |
Affected:
V200R006C10
Affected: V200R007C00 Affected: V200R008C20 Affected: V200R008C50 Affected: V200R003C01 Affected: V200R005C20 Affected: V500R001C20 Affected: V500R001C30 Affected: V500R002C00 Affected: V200R005C00 Affected: V200R005C02 Affected: V200R005C03 Affected: V200R006C00 Affected: V200R008C00 Affected: V200R010C00 Affected: V200R011C00 Affected: V200R005C01 Affected: V500R001C60 Affected: V500R005C00 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T19:54:53.290Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200102-01-buffer-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "AR120-S;AR1200;AR1200-S;AR150;AR150-S;AR160;AR200;AR200-S;AR2200;AR2200-S;AR3200;AR3600;IPS Module;NGFW Module;NIP6300;NIP6600;NetEngine16EX;S5700;S6700;SRG1300;SRG2300;SRG3300;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "V200R006C10"
},
{
"status": "affected",
"version": "V200R007C00"
},
{
"status": "affected",
"version": "V200R008C20"
},
{
"status": "affected",
"version": "V200R008C50"
},
{
"status": "affected",
"version": "V200R003C01"
},
{
"status": "affected",
"version": "V200R005C20"
},
{
"status": "affected",
"version": "V500R001C20"
},
{
"status": "affected",
"version": "V500R001C30"
},
{
"status": "affected",
"version": "V500R002C00"
},
{
"status": "affected",
"version": "V200R005C00"
},
{
"status": "affected",
"version": "V200R005C02"
},
{
"status": "affected",
"version": "V200R005C03"
},
{
"status": "affected",
"version": "V200R006C00"
},
{
"status": "affected",
"version": "V200R008C00"
},
{
"status": "affected",
"version": "V200R010C00"
},
{
"status": "affected",
"version": "V200R011C00"
},
{
"status": "affected",
"version": "V200R005C01"
},
{
"status": "affected",
"version": "V500R001C60"
},
{
"status": "affected",
"version": "V500R005C00"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Some Huawei products have a buffer error vulnerability. An unauthenticated, remote attacker could send specific MPLS Echo Request messages to the target products. Due to insufficient input validation of some parameters in the messages, successful exploit may cause the device to reset."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Buffer Error",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-01-03T14:33:41",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200102-01-buffer-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2019-5304",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "AR120-S;AR1200;AR1200-S;AR150;AR150-S;AR160;AR200;AR200-S;AR2200;AR2200-S;AR3200;AR3600;IPS Module;NGFW Module;NIP6300;NIP6600;NetEngine16EX;S5700;S6700;SRG1300;SRG2300;SRG3300;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600",
"version": {
"version_data": [
{
"version_value": "V200R006C10"
},
{
"version_value": "V200R007C00"
},
{
"version_value": "V200R008C20"
},
{
"version_value": "V200R008C50"
},
{
"version_value": "V200R003C01"
},
{
"version_value": "V200R005C20"
},
{
"version_value": "V500R001C20"
},
{
"version_value": "V500R001C30"
},
{
"version_value": "V500R002C00"
},
{
"version_value": "V200R005C00"
},
{
"version_value": "V200R005C02"
},
{
"version_value": "V200R005C03"
},
{
"version_value": "V200R006C00"
},
{
"version_value": "V200R008C00"
},
{
"version_value": "V200R010C00"
},
{
"version_value": "V200R011C00"
},
{
"version_value": "V200R005C01"
},
{
"version_value": "V500R001C60"
},
{
"version_value": "V500R005C00"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Some Huawei products have a buffer error vulnerability. An unauthenticated, remote attacker could send specific MPLS Echo Request messages to the target products. Due to insufficient input validation of some parameters in the messages, successful exploit may cause the device to reset."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Buffer Error"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200102-01-buffer-en",
"refsource": "MISC",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200102-01-buffer-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2019-5304",
"datePublished": "2020-01-03T14:33:41",
"dateReserved": "2019-01-04T00:00:00",
"dateUpdated": "2024-08-04T19:54:53.290Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-5254 (GCVE-0-2019-5254)
Vulnerability from nvd – Published: 2019-12-13 22:51 – Updated: 2024-08-04 19:47
VLAI?
Summary
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board may send crafted messages from the internal network port or tamper with inter-process message packets to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the affected board to be abnormal.
Severity ?
No CVSS data available.
CWE
- out-of-bounds read
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981 |
Affected:
V200R005C30
Affected: V200R006C10 Affected: V200R006C20 Affected: V200R007C10 Affected: V200R007C20 Affected: V200R008C00 Affected: V200R008C10 Affected: V200R009C00 Affected: V500R001C00SPC300 Affected: V500R001C00SPC500 Affected: V500R001C00SPH303 Affected: V500R001C00SPH508 Affected: V500R001C20 Affected: V500R001C20SPC100 Affected: V500R001C20SPC100PWE Affected: V500R001C20SPC200 Affected: V500R001C20SPC200B062 Affected: V500R001C20SPC200PWE Affected: V500R001C20SPC300B078 Affected: V500R001C20SPC300PWE Affected: V500R001C30 Affected: V500R001C30SPC100 Affected: V500R001C30SPC100PWE Affected: V500R001C30SPC200 Affected: V500R001C30SPC200PWE Affected: V500R001C30SPC300 Affected: V500R001C50 Affected: V500R001C50PWE Affected: V500R001C80 Affected: V500R005C00 Affected: V500R001C00SPC500PWE Affected: V500R002C00 Affected: V500R002C00SPC100 Affected: V500R002C00SPC100PWE Affected: V500R002C00SPC200 Affected: V500R002C00SPC200PWE Affected: V500R002C00SPC300 Affected: V500R002C10 Affected: V500R002C10PWE Affected: V500R002C30 Affected: V500R002C30PWE Affected: V200R005C03 Affected: V200R003C00SPC100 Affected: V500R002C20 Affected: V500R001C00 Affected: V500R001C00SPC200 Affected: V500R001C00SPC600 Affected: V500R001C00SPC700 Affected: V500R001C20SPC300 Affected: V500R001C20SPC500 Affected: V500R001C20SPC600 Affected: V500R001C60SPC100 Affected: V500R001C60SPC101 Affected: V500R001C60SPC200 Affected: V500R001C60SPC300 Affected: V500R001C60SPC500 Affected: V500R001C60SPC600 Affected: V500R005C00SPC100 Affected: V100R001C20SPC100 Affected: V500R001C20SPC101 Affected: V500R001C80PWE Affected: V100R001C00SPC200 Affected: V100R001C10SPC200 Affected: V100R001C10SPC201 Affected: V100R001C20SPC200 Affected: V500R001C00SPC050 Affected: V500R001C00SPC090 Affected: V500R001C30SPC500 Affected: V500R001C30SPC600 Affected: V500R001C30SPC600PWE Affected: V500R001C30SPC601 Affected: V500R001C50SPC009 Affected: V500R001C50SPC100 Affected: V500R001C50SPC100PWE Affected: V500R001C50SPC200 Affected: V500R001C50SPC200PWE Affected: V500R001C50SPC300 Affected: V500R001C60 Affected: V500R001C60SPC100PWE Affected: V500R001C60SPC200PWE Affected: V500R005C00SPC102 Affected: V500R001C10 Affected: V500R001C10SPC100 Affected: V500R001C10SPC200 Affected: V500R003C00 Affected: V500R003C00SPC100 Affected: V200R003C50SPC700 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T19:47:56.865Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "V200R005C30"
},
{
"status": "affected",
"version": "V200R006C10"
},
{
"status": "affected",
"version": "V200R006C20"
},
{
"status": "affected",
"version": "V200R007C10"
},
{
"status": "affected",
"version": "V200R007C20"
},
{
"status": "affected",
"version": "V200R008C00"
},
{
"status": "affected",
"version": "V200R008C10"
},
{
"status": "affected",
"version": "V200R009C00"
},
{
"status": "affected",
"version": "V500R001C00SPC300"
},
{
"status": "affected",
"version": "V500R001C00SPC500"
},
{
"status": "affected",
"version": "V500R001C00SPH303"
},
{
"status": "affected",
"version": "V500R001C00SPH508"
},
{
"status": "affected",
"version": "V500R001C20"
},
{
"status": "affected",
"version": "V500R001C20SPC100"
},
{
"status": "affected",
"version": "V500R001C20SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C20SPC200"
},
{
"status": "affected",
"version": "V500R001C20SPC200B062"
},
{
"status": "affected",
"version": "V500R001C20SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C20SPC300B078"
},
{
"status": "affected",
"version": "V500R001C20SPC300PWE"
},
{
"status": "affected",
"version": "V500R001C30"
},
{
"status": "affected",
"version": "V500R001C30SPC100"
},
{
"status": "affected",
"version": "V500R001C30SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC200"
},
{
"status": "affected",
"version": "V500R001C30SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC300"
},
{
"status": "affected",
"version": "V500R001C50"
},
{
"status": "affected",
"version": "V500R001C50PWE"
},
{
"status": "affected",
"version": "V500R001C80"
},
{
"status": "affected",
"version": "V500R005C00"
},
{
"status": "affected",
"version": "V500R001C00SPC500PWE"
},
{
"status": "affected",
"version": "V500R002C00"
},
{
"status": "affected",
"version": "V500R002C00SPC100"
},
{
"status": "affected",
"version": "V500R002C00SPC100PWE"
},
{
"status": "affected",
"version": "V500R002C00SPC200"
},
{
"status": "affected",
"version": "V500R002C00SPC200PWE"
},
{
"status": "affected",
"version": "V500R002C00SPC300"
},
{
"status": "affected",
"version": "V500R002C10"
},
{
"status": "affected",
"version": "V500R002C10PWE"
},
{
"status": "affected",
"version": "V500R002C30"
},
{
"status": "affected",
"version": "V500R002C30PWE"
},
{
"status": "affected",
"version": "V200R005C03"
},
{
"status": "affected",
"version": "V200R003C00SPC100"
},
{
"status": "affected",
"version": "V500R002C20"
},
{
"status": "affected",
"version": "V500R001C00"
},
{
"status": "affected",
"version": "V500R001C00SPC200"
},
{
"status": "affected",
"version": "V500R001C00SPC600"
},
{
"status": "affected",
"version": "V500R001C00SPC700"
},
{
"status": "affected",
"version": "V500R001C20SPC300"
},
{
"status": "affected",
"version": "V500R001C20SPC500"
},
{
"status": "affected",
"version": "V500R001C20SPC600"
},
{
"status": "affected",
"version": "V500R001C60SPC100"
},
{
"status": "affected",
"version": "V500R001C60SPC101"
},
{
"status": "affected",
"version": "V500R001C60SPC200"
},
{
"status": "affected",
"version": "V500R001C60SPC300"
},
{
"status": "affected",
"version": "V500R001C60SPC500"
},
{
"status": "affected",
"version": "V500R001C60SPC600"
},
{
"status": "affected",
"version": "V500R005C00SPC100"
},
{
"status": "affected",
"version": "V100R001C20SPC100"
},
{
"status": "affected",
"version": "V500R001C20SPC101"
},
{
"status": "affected",
"version": "V500R001C80PWE"
},
{
"status": "affected",
"version": "V100R001C00SPC200"
},
{
"status": "affected",
"version": "V100R001C10SPC200"
},
{
"status": "affected",
"version": "V100R001C10SPC201"
},
{
"status": "affected",
"version": "V100R001C20SPC200"
},
{
"status": "affected",
"version": "V500R001C00SPC050"
},
{
"status": "affected",
"version": "V500R001C00SPC090"
},
{
"status": "affected",
"version": "V500R001C30SPC500"
},
{
"status": "affected",
"version": "V500R001C30SPC600"
},
{
"status": "affected",
"version": "V500R001C30SPC600PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC601"
},
{
"status": "affected",
"version": "V500R001C50SPC009"
},
{
"status": "affected",
"version": "V500R001C50SPC100"
},
{
"status": "affected",
"version": "V500R001C50SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C50SPC200"
},
{
"status": "affected",
"version": "V500R001C50SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C50SPC300"
},
{
"status": "affected",
"version": "V500R001C60"
},
{
"status": "affected",
"version": "V500R001C60SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C60SPC200PWE"
},
{
"status": "affected",
"version": "V500R005C00SPC102"
},
{
"status": "affected",
"version": "V500R001C10"
},
{
"status": "affected",
"version": "V500R001C10SPC100"
},
{
"status": "affected",
"version": "V500R001C10SPC200"
},
{
"status": "affected",
"version": "V500R003C00"
},
{
"status": "affected",
"version": "V500R003C00SPC100"
},
{
"status": "affected",
"version": "V200R003C50SPC700"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board may send crafted messages from the internal network port or tamper with inter-process message packets to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the affected board to be abnormal."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "out-of-bounds read",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-12-13T22:51:29",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2019-5254",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981",
"version": {
"version_data": [
{
"version_value": "V200R005C30"
},
{
"version_value": "V200R006C10"
},
{
"version_value": "V200R006C20"
},
{
"version_value": "V200R007C10"
},
{
"version_value": "V200R007C20"
},
{
"version_value": "V200R008C00"
},
{
"version_value": "V200R008C10"
},
{
"version_value": "V200R009C00"
},
{
"version_value": "V500R001C00SPC300"
},
{
"version_value": "V500R001C00SPC500"
},
{
"version_value": "V500R001C00SPH303"
},
{
"version_value": "V500R001C00SPH508"
},
{
"version_value": "V500R001C20"
},
{
"version_value": "V500R001C20SPC100"
},
{
"version_value": "V500R001C20SPC100PWE"
},
{
"version_value": "V500R001C20SPC200"
},
{
"version_value": "V500R001C20SPC200B062"
},
{
"version_value": "V500R001C20SPC200PWE"
},
{
"version_value": "V500R001C20SPC300B078"
},
{
"version_value": "V500R001C20SPC300PWE"
},
{
"version_value": "V500R001C30"
},
{
"version_value": "V500R001C30SPC100"
},
{
"version_value": "V500R001C30SPC100PWE"
},
{
"version_value": "V500R001C30SPC200"
},
{
"version_value": "V500R001C30SPC200PWE"
},
{
"version_value": "V500R001C30SPC300"
},
{
"version_value": "V500R001C50"
},
{
"version_value": "V500R001C50PWE"
},
{
"version_value": "V500R001C80"
},
{
"version_value": "V500R005C00"
},
{
"version_value": "V500R001C00SPC500PWE"
},
{
"version_value": "V500R002C00"
},
{
"version_value": "V500R002C00SPC100"
},
{
"version_value": "V500R002C00SPC100PWE"
},
{
"version_value": "V500R002C00SPC200"
},
{
"version_value": "V500R002C00SPC200PWE"
},
{
"version_value": "V500R002C00SPC300"
},
{
"version_value": "V500R002C10"
},
{
"version_value": "V500R002C10PWE"
},
{
"version_value": "V500R002C30"
},
{
"version_value": "V500R002C30PWE"
},
{
"version_value": "V200R005C03"
},
{
"version_value": "V200R003C00SPC100"
},
{
"version_value": "V500R002C20"
},
{
"version_value": "V500R001C00"
},
{
"version_value": "V500R001C00SPC200"
},
{
"version_value": "V500R001C00SPC600"
},
{
"version_value": "V500R001C00SPC700"
},
{
"version_value": "V500R001C20SPC300"
},
{
"version_value": "V500R001C20SPC500"
},
{
"version_value": "V500R001C20SPC600"
},
{
"version_value": "V500R001C60SPC100"
},
{
"version_value": "V500R001C60SPC101"
},
{
"version_value": "V500R001C60SPC200"
},
{
"version_value": "V500R001C60SPC300"
},
{
"version_value": "V500R001C60SPC500"
},
{
"version_value": "V500R001C60SPC600"
},
{
"version_value": "V500R005C00SPC100"
},
{
"version_value": "V100R001C20SPC100"
},
{
"version_value": "V500R001C20SPC101"
},
{
"version_value": "V500R001C80PWE"
},
{
"version_value": "V100R001C00SPC200"
},
{
"version_value": "V100R001C10SPC200"
},
{
"version_value": "V100R001C10SPC201"
},
{
"version_value": "V100R001C20SPC200"
},
{
"version_value": "V500R001C00SPC050"
},
{
"version_value": "V500R001C00SPC090"
},
{
"version_value": "V500R001C30SPC500"
},
{
"version_value": "V500R001C30SPC600"
},
{
"version_value": "V500R001C30SPC600PWE"
},
{
"version_value": "V500R001C30SPC601"
},
{
"version_value": "V500R001C50SPC009"
},
{
"version_value": "V500R001C50SPC100"
},
{
"version_value": "V500R001C50SPC100PWE"
},
{
"version_value": "V500R001C50SPC200"
},
{
"version_value": "V500R001C50SPC200PWE"
},
{
"version_value": "V500R001C50SPC300"
},
{
"version_value": "V500R001C60"
},
{
"version_value": "V500R001C60SPC100PWE"
},
{
"version_value": "V500R001C60SPC200PWE"
},
{
"version_value": "V500R005C00SPC102"
},
{
"version_value": "V500R001C10"
},
{
"version_value": "V500R001C10SPC100"
},
{
"version_value": "V500R001C10SPC200"
},
{
"version_value": "V500R003C00"
},
{
"version_value": "V500R003C00SPC100"
},
{
"version_value": "V200R003C50SPC700"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board may send crafted messages from the internal network port or tamper with inter-process message packets to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the affected board to be abnormal."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "out-of-bounds read"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en",
"refsource": "MISC",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2019-5254",
"datePublished": "2019-12-13T22:51:29",
"dateReserved": "2019-01-04T00:00:00",
"dateUpdated": "2024-08-04T19:47:56.865Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-5255 (GCVE-0-2019-5255)
Vulnerability from nvd – Published: 2019-12-13 22:48 – Updated: 2024-08-04 19:47
VLAI?
Summary
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have a DoS vulnerability. An attacker may send crafted messages from a FTP client to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the system out-of-bounds read and result in a denial of service condition of the affected service.
Severity ?
No CVSS data available.
CWE
- DoS
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981 |
Affected:
V200R005C30
Affected: V200R006C10 Affected: V200R006C20 Affected: V200R007C10 Affected: V200R007C20 Affected: V200R008C00 Affected: V200R008C10 Affected: V200R009C00 Affected: V500R001C00SPC300 Affected: V500R001C00SPC500 Affected: V500R001C00SPH303 Affected: V500R001C00SPH508 Affected: V500R001C20 Affected: V500R001C20SPC100 Affected: V500R001C20SPC100PWE Affected: V500R001C20SPC200 Affected: V500R001C20SPC200B062 Affected: V500R001C20SPC200PWE Affected: V500R001C20SPC300B078 Affected: V500R001C20SPC300PWE Affected: V500R001C30 Affected: V500R001C30SPC100 Affected: V500R001C30SPC100PWE Affected: V500R001C30SPC200 Affected: V500R001C30SPC200PWE Affected: V500R001C30SPC300 Affected: V500R001C50 Affected: V500R001C50PWE Affected: V500R001C80 Affected: V500R005C00 Affected: V500R001C00SPC500PWE Affected: V500R002C00 Affected: V500R002C00SPC100 Affected: V500R002C00SPC100PWE Affected: V500R002C00SPC200 Affected: V500R002C00SPC200PWE Affected: V500R002C00SPC300 Affected: V500R002C10 Affected: V500R002C10PWE Affected: V500R002C30 Affected: V500R002C30PWE Affected: V200R005C03 Affected: V200R003C00SPC100 Affected: V500R002C20 Affected: V500R001C00 Affected: V500R001C00SPC200 Affected: V500R001C00SPC600 Affected: V500R001C00SPC700 Affected: V500R001C20SPC300 Affected: V500R001C20SPC500 Affected: V500R001C20SPC600 Affected: V500R001C60SPC100 Affected: V500R001C60SPC101 Affected: V500R001C60SPC200 Affected: V500R001C60SPC300 Affected: V500R001C60SPC500 Affected: V500R001C60SPC600 Affected: V500R005C00SPC100 Affected: V100R001C20SPC100 Affected: V500R001C20SPC101 Affected: V500R001C80PWE Affected: V100R001C00SPC200 Affected: V100R001C10SPC200 Affected: V100R001C10SPC201 Affected: V100R001C20SPC200 Affected: V500R001C00SPC050 Affected: V500R001C00SPC090 Affected: V500R001C30SPC500 Affected: V500R001C30SPC600 Affected: V500R001C30SPC600PWE Affected: V500R001C30SPC601 Affected: V500R001C50SPC009 Affected: V500R001C50SPC100 Affected: V500R001C50SPC100PWE Affected: V500R001C50SPC200 Affected: V500R001C50SPC200PWE Affected: V500R001C50SPC300 Affected: V500R001C60 Affected: V500R001C60SPC100PWE Affected: V500R001C60SPC200PWE Affected: V500R005C00SPC102 Affected: V500R001C10 Affected: V500R001C10SPC100 Affected: V500R001C10SPC200 Affected: V500R003C00 Affected: V500R003C00SPC100 Affected: V200R003C50SPC700 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T19:47:56.961Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "V200R005C30"
},
{
"status": "affected",
"version": "V200R006C10"
},
{
"status": "affected",
"version": "V200R006C20"
},
{
"status": "affected",
"version": "V200R007C10"
},
{
"status": "affected",
"version": "V200R007C20"
},
{
"status": "affected",
"version": "V200R008C00"
},
{
"status": "affected",
"version": "V200R008C10"
},
{
"status": "affected",
"version": "V200R009C00"
},
{
"status": "affected",
"version": "V500R001C00SPC300"
},
{
"status": "affected",
"version": "V500R001C00SPC500"
},
{
"status": "affected",
"version": "V500R001C00SPH303"
},
{
"status": "affected",
"version": "V500R001C00SPH508"
},
{
"status": "affected",
"version": "V500R001C20"
},
{
"status": "affected",
"version": "V500R001C20SPC100"
},
{
"status": "affected",
"version": "V500R001C20SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C20SPC200"
},
{
"status": "affected",
"version": "V500R001C20SPC200B062"
},
{
"status": "affected",
"version": "V500R001C20SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C20SPC300B078"
},
{
"status": "affected",
"version": "V500R001C20SPC300PWE"
},
{
"status": "affected",
"version": "V500R001C30"
},
{
"status": "affected",
"version": "V500R001C30SPC100"
},
{
"status": "affected",
"version": "V500R001C30SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC200"
},
{
"status": "affected",
"version": "V500R001C30SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC300"
},
{
"status": "affected",
"version": "V500R001C50"
},
{
"status": "affected",
"version": "V500R001C50PWE"
},
{
"status": "affected",
"version": "V500R001C80"
},
{
"status": "affected",
"version": "V500R005C00"
},
{
"status": "affected",
"version": "V500R001C00SPC500PWE"
},
{
"status": "affected",
"version": "V500R002C00"
},
{
"status": "affected",
"version": "V500R002C00SPC100"
},
{
"status": "affected",
"version": "V500R002C00SPC100PWE"
},
{
"status": "affected",
"version": "V500R002C00SPC200"
},
{
"status": "affected",
"version": "V500R002C00SPC200PWE"
},
{
"status": "affected",
"version": "V500R002C00SPC300"
},
{
"status": "affected",
"version": "V500R002C10"
},
{
"status": "affected",
"version": "V500R002C10PWE"
},
{
"status": "affected",
"version": "V500R002C30"
},
{
"status": "affected",
"version": "V500R002C30PWE"
},
{
"status": "affected",
"version": "V200R005C03"
},
{
"status": "affected",
"version": "V200R003C00SPC100"
},
{
"status": "affected",
"version": "V500R002C20"
},
{
"status": "affected",
"version": "V500R001C00"
},
{
"status": "affected",
"version": "V500R001C00SPC200"
},
{
"status": "affected",
"version": "V500R001C00SPC600"
},
{
"status": "affected",
"version": "V500R001C00SPC700"
},
{
"status": "affected",
"version": "V500R001C20SPC300"
},
{
"status": "affected",
"version": "V500R001C20SPC500"
},
{
"status": "affected",
"version": "V500R001C20SPC600"
},
{
"status": "affected",
"version": "V500R001C60SPC100"
},
{
"status": "affected",
"version": "V500R001C60SPC101"
},
{
"status": "affected",
"version": "V500R001C60SPC200"
},
{
"status": "affected",
"version": "V500R001C60SPC300"
},
{
"status": "affected",
"version": "V500R001C60SPC500"
},
{
"status": "affected",
"version": "V500R001C60SPC600"
},
{
"status": "affected",
"version": "V500R005C00SPC100"
},
{
"status": "affected",
"version": "V100R001C20SPC100"
},
{
"status": "affected",
"version": "V500R001C20SPC101"
},
{
"status": "affected",
"version": "V500R001C80PWE"
},
{
"status": "affected",
"version": "V100R001C00SPC200"
},
{
"status": "affected",
"version": "V100R001C10SPC200"
},
{
"status": "affected",
"version": "V100R001C10SPC201"
},
{
"status": "affected",
"version": "V100R001C20SPC200"
},
{
"status": "affected",
"version": "V500R001C00SPC050"
},
{
"status": "affected",
"version": "V500R001C00SPC090"
},
{
"status": "affected",
"version": "V500R001C30SPC500"
},
{
"status": "affected",
"version": "V500R001C30SPC600"
},
{
"status": "affected",
"version": "V500R001C30SPC600PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC601"
},
{
"status": "affected",
"version": "V500R001C50SPC009"
},
{
"status": "affected",
"version": "V500R001C50SPC100"
},
{
"status": "affected",
"version": "V500R001C50SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C50SPC200"
},
{
"status": "affected",
"version": "V500R001C50SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C50SPC300"
},
{
"status": "affected",
"version": "V500R001C60"
},
{
"status": "affected",
"version": "V500R001C60SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C60SPC200PWE"
},
{
"status": "affected",
"version": "V500R005C00SPC102"
},
{
"status": "affected",
"version": "V500R001C10"
},
{
"status": "affected",
"version": "V500R001C10SPC100"
},
{
"status": "affected",
"version": "V500R001C10SPC200"
},
{
"status": "affected",
"version": "V500R003C00"
},
{
"status": "affected",
"version": "V500R003C00SPC100"
},
{
"status": "affected",
"version": "V200R003C50SPC700"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have a DoS vulnerability. An attacker may send crafted messages from a FTP client to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the system out-of-bounds read and result in a denial of service condition of the affected service."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "DoS",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-12-13T22:48:31",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2019-5255",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981",
"version": {
"version_data": [
{
"version_value": "V200R005C30"
},
{
"version_value": "V200R006C10"
},
{
"version_value": "V200R006C20"
},
{
"version_value": "V200R007C10"
},
{
"version_value": "V200R007C20"
},
{
"version_value": "V200R008C00"
},
{
"version_value": "V200R008C10"
},
{
"version_value": "V200R009C00"
},
{
"version_value": "V500R001C00SPC300"
},
{
"version_value": "V500R001C00SPC500"
},
{
"version_value": "V500R001C00SPH303"
},
{
"version_value": "V500R001C00SPH508"
},
{
"version_value": "V500R001C20"
},
{
"version_value": "V500R001C20SPC100"
},
{
"version_value": "V500R001C20SPC100PWE"
},
{
"version_value": "V500R001C20SPC200"
},
{
"version_value": "V500R001C20SPC200B062"
},
{
"version_value": "V500R001C20SPC200PWE"
},
{
"version_value": "V500R001C20SPC300B078"
},
{
"version_value": "V500R001C20SPC300PWE"
},
{
"version_value": "V500R001C30"
},
{
"version_value": "V500R001C30SPC100"
},
{
"version_value": "V500R001C30SPC100PWE"
},
{
"version_value": "V500R001C30SPC200"
},
{
"version_value": "V500R001C30SPC200PWE"
},
{
"version_value": "V500R001C30SPC300"
},
{
"version_value": "V500R001C50"
},
{
"version_value": "V500R001C50PWE"
},
{
"version_value": "V500R001C80"
},
{
"version_value": "V500R005C00"
},
{
"version_value": "V500R001C00SPC500PWE"
},
{
"version_value": "V500R002C00"
},
{
"version_value": "V500R002C00SPC100"
},
{
"version_value": "V500R002C00SPC100PWE"
},
{
"version_value": "V500R002C00SPC200"
},
{
"version_value": "V500R002C00SPC200PWE"
},
{
"version_value": "V500R002C00SPC300"
},
{
"version_value": "V500R002C10"
},
{
"version_value": "V500R002C10PWE"
},
{
"version_value": "V500R002C30"
},
{
"version_value": "V500R002C30PWE"
},
{
"version_value": "V200R005C03"
},
{
"version_value": "V200R003C00SPC100"
},
{
"version_value": "V500R002C20"
},
{
"version_value": "V500R001C00"
},
{
"version_value": "V500R001C00SPC200"
},
{
"version_value": "V500R001C00SPC600"
},
{
"version_value": "V500R001C00SPC700"
},
{
"version_value": "V500R001C20SPC300"
},
{
"version_value": "V500R001C20SPC500"
},
{
"version_value": "V500R001C20SPC600"
},
{
"version_value": "V500R001C60SPC100"
},
{
"version_value": "V500R001C60SPC101"
},
{
"version_value": "V500R001C60SPC200"
},
{
"version_value": "V500R001C60SPC300"
},
{
"version_value": "V500R001C60SPC500"
},
{
"version_value": "V500R001C60SPC600"
},
{
"version_value": "V500R005C00SPC100"
},
{
"version_value": "V100R001C20SPC100"
},
{
"version_value": "V500R001C20SPC101"
},
{
"version_value": "V500R001C80PWE"
},
{
"version_value": "V100R001C00SPC200"
},
{
"version_value": "V100R001C10SPC200"
},
{
"version_value": "V100R001C10SPC201"
},
{
"version_value": "V100R001C20SPC200"
},
{
"version_value": "V500R001C00SPC050"
},
{
"version_value": "V500R001C00SPC090"
},
{
"version_value": "V500R001C30SPC500"
},
{
"version_value": "V500R001C30SPC600"
},
{
"version_value": "V500R001C30SPC600PWE"
},
{
"version_value": "V500R001C30SPC601"
},
{
"version_value": "V500R001C50SPC009"
},
{
"version_value": "V500R001C50SPC100"
},
{
"version_value": "V500R001C50SPC100PWE"
},
{
"version_value": "V500R001C50SPC200"
},
{
"version_value": "V500R001C50SPC200PWE"
},
{
"version_value": "V500R001C50SPC300"
},
{
"version_value": "V500R001C60"
},
{
"version_value": "V500R001C60SPC100PWE"
},
{
"version_value": "V500R001C60SPC200PWE"
},
{
"version_value": "V500R005C00SPC102"
},
{
"version_value": "V500R001C10"
},
{
"version_value": "V500R001C10SPC100"
},
{
"version_value": "V500R001C10SPC200"
},
{
"version_value": "V500R003C00"
},
{
"version_value": "V500R003C00SPC100"
},
{
"version_value": "V200R003C50SPC700"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have a DoS vulnerability. An attacker may send crafted messages from a FTP client to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the system out-of-bounds read and result in a denial of service condition of the affected service."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "DoS"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en",
"refsource": "MISC",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2019-5255",
"datePublished": "2019-12-13T22:48:31",
"dateReserved": "2019-01-04T00:00:00",
"dateUpdated": "2024-08-04T19:47:56.961Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-5256 (GCVE-0-2019-5256)
Vulnerability from nvd – Published: 2019-12-13 22:45 – Updated: 2024-08-04 19:47
VLAI?
Summary
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have a null pointer dereference vulnerability. The system dereferences a pointer that it expects to be valid, but is NULL. A local attacker could exploit this vulnerability by sending crafted parameters. A successful exploit could cause a denial of service and the process reboot.
Severity ?
No CVSS data available.
CWE
- null pointer dereference
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981 |
Affected:
V200R005C30
Affected: V200R006C10 Affected: V200R006C20 Affected: V200R007C10 Affected: V200R007C20 Affected: V200R008C00 Affected: V200R008C10 Affected: V200R009C00 Affected: V500R001C00SPC300 Affected: V500R001C00SPC500 Affected: V500R001C00SPH303 Affected: V500R001C00SPH508 Affected: V500R001C20 Affected: V500R001C20SPC100 Affected: V500R001C20SPC100PWE Affected: V500R001C20SPC200 Affected: V500R001C20SPC200B062 Affected: V500R001C20SPC200PWE Affected: V500R001C20SPC300B078 Affected: V500R001C20SPC300PWE Affected: V500R001C30 Affected: V500R001C30SPC100 Affected: V500R001C30SPC100PWE Affected: V500R001C30SPC200 Affected: V500R001C30SPC200PWE Affected: V500R001C30SPC300 Affected: V500R001C50 Affected: V500R001C50PWE Affected: V500R001C80 Affected: V500R005C00 Affected: V500R001C00SPC500PWE Affected: V500R002C00 Affected: V500R002C00SPC100 Affected: V500R002C00SPC100PWE Affected: V500R002C00SPC200 Affected: V500R002C00SPC200PWE Affected: V500R002C00SPC300 Affected: V500R002C10 Affected: V500R002C10PWE Affected: V500R002C30 Affected: V500R002C30PWE Affected: V200R005C03 Affected: V200R003C00SPC100 Affected: V500R002C20 Affected: V500R001C00 Affected: V500R001C00SPC200 Affected: V500R001C00SPC600 Affected: V500R001C00SPC700 Affected: V500R001C20SPC300 Affected: V500R001C20SPC500 Affected: V500R001C20SPC600 Affected: V500R001C60SPC100 Affected: V500R001C60SPC101 Affected: V500R001C60SPC200 Affected: V500R001C60SPC300 Affected: V500R001C60SPC500 Affected: V500R001C60SPC600 Affected: V500R005C00SPC100 Affected: V100R001C20SPC100 Affected: V500R001C20SPC101 Affected: V500R001C80PWE Affected: V100R001C00SPC200 Affected: V100R001C10SPC200 Affected: V100R001C10SPC201 Affected: V100R001C20SPC200 Affected: V500R001C00SPC050 Affected: V500R001C00SPC090 Affected: V500R001C30SPC500 Affected: V500R001C30SPC600 Affected: V500R001C30SPC600PWE Affected: V500R001C30SPC601 Affected: V500R001C50SPC009 Affected: V500R001C50SPC100 Affected: V500R001C50SPC100PWE Affected: V500R001C50SPC200 Affected: V500R001C50SPC200PWE Affected: V500R001C50SPC300 Affected: V500R001C60 Affected: V500R001C60SPC100PWE Affected: V500R001C60SPC200PWE Affected: V500R005C00SPC102 Affected: V500R001C10 Affected: V500R001C10SPC100 Affected: V500R001C10SPC200 Affected: V500R003C00 Affected: V500R003C00SPC100 Affected: V200R003C50SPC700 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T19:47:56.652Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "V200R005C30"
},
{
"status": "affected",
"version": "V200R006C10"
},
{
"status": "affected",
"version": "V200R006C20"
},
{
"status": "affected",
"version": "V200R007C10"
},
{
"status": "affected",
"version": "V200R007C20"
},
{
"status": "affected",
"version": "V200R008C00"
},
{
"status": "affected",
"version": "V200R008C10"
},
{
"status": "affected",
"version": "V200R009C00"
},
{
"status": "affected",
"version": "V500R001C00SPC300"
},
{
"status": "affected",
"version": "V500R001C00SPC500"
},
{
"status": "affected",
"version": "V500R001C00SPH303"
},
{
"status": "affected",
"version": "V500R001C00SPH508"
},
{
"status": "affected",
"version": "V500R001C20"
},
{
"status": "affected",
"version": "V500R001C20SPC100"
},
{
"status": "affected",
"version": "V500R001C20SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C20SPC200"
},
{
"status": "affected",
"version": "V500R001C20SPC200B062"
},
{
"status": "affected",
"version": "V500R001C20SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C20SPC300B078"
},
{
"status": "affected",
"version": "V500R001C20SPC300PWE"
},
{
"status": "affected",
"version": "V500R001C30"
},
{
"status": "affected",
"version": "V500R001C30SPC100"
},
{
"status": "affected",
"version": "V500R001C30SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC200"
},
{
"status": "affected",
"version": "V500R001C30SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC300"
},
{
"status": "affected",
"version": "V500R001C50"
},
{
"status": "affected",
"version": "V500R001C50PWE"
},
{
"status": "affected",
"version": "V500R001C80"
},
{
"status": "affected",
"version": "V500R005C00"
},
{
"status": "affected",
"version": "V500R001C00SPC500PWE"
},
{
"status": "affected",
"version": "V500R002C00"
},
{
"status": "affected",
"version": "V500R002C00SPC100"
},
{
"status": "affected",
"version": "V500R002C00SPC100PWE"
},
{
"status": "affected",
"version": "V500R002C00SPC200"
},
{
"status": "affected",
"version": "V500R002C00SPC200PWE"
},
{
"status": "affected",
"version": "V500R002C00SPC300"
},
{
"status": "affected",
"version": "V500R002C10"
},
{
"status": "affected",
"version": "V500R002C10PWE"
},
{
"status": "affected",
"version": "V500R002C30"
},
{
"status": "affected",
"version": "V500R002C30PWE"
},
{
"status": "affected",
"version": "V200R005C03"
},
{
"status": "affected",
"version": "V200R003C00SPC100"
},
{
"status": "affected",
"version": "V500R002C20"
},
{
"status": "affected",
"version": "V500R001C00"
},
{
"status": "affected",
"version": "V500R001C00SPC200"
},
{
"status": "affected",
"version": "V500R001C00SPC600"
},
{
"status": "affected",
"version": "V500R001C00SPC700"
},
{
"status": "affected",
"version": "V500R001C20SPC300"
},
{
"status": "affected",
"version": "V500R001C20SPC500"
},
{
"status": "affected",
"version": "V500R001C20SPC600"
},
{
"status": "affected",
"version": "V500R001C60SPC100"
},
{
"status": "affected",
"version": "V500R001C60SPC101"
},
{
"status": "affected",
"version": "V500R001C60SPC200"
},
{
"status": "affected",
"version": "V500R001C60SPC300"
},
{
"status": "affected",
"version": "V500R001C60SPC500"
},
{
"status": "affected",
"version": "V500R001C60SPC600"
},
{
"status": "affected",
"version": "V500R005C00SPC100"
},
{
"status": "affected",
"version": "V100R001C20SPC100"
},
{
"status": "affected",
"version": "V500R001C20SPC101"
},
{
"status": "affected",
"version": "V500R001C80PWE"
},
{
"status": "affected",
"version": "V100R001C00SPC200"
},
{
"status": "affected",
"version": "V100R001C10SPC200"
},
{
"status": "affected",
"version": "V100R001C10SPC201"
},
{
"status": "affected",
"version": "V100R001C20SPC200"
},
{
"status": "affected",
"version": "V500R001C00SPC050"
},
{
"status": "affected",
"version": "V500R001C00SPC090"
},
{
"status": "affected",
"version": "V500R001C30SPC500"
},
{
"status": "affected",
"version": "V500R001C30SPC600"
},
{
"status": "affected",
"version": "V500R001C30SPC600PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC601"
},
{
"status": "affected",
"version": "V500R001C50SPC009"
},
{
"status": "affected",
"version": "V500R001C50SPC100"
},
{
"status": "affected",
"version": "V500R001C50SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C50SPC200"
},
{
"status": "affected",
"version": "V500R001C50SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C50SPC300"
},
{
"status": "affected",
"version": "V500R001C60"
},
{
"status": "affected",
"version": "V500R001C60SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C60SPC200PWE"
},
{
"status": "affected",
"version": "V500R005C00SPC102"
},
{
"status": "affected",
"version": "V500R001C10"
},
{
"status": "affected",
"version": "V500R001C10SPC100"
},
{
"status": "affected",
"version": "V500R001C10SPC200"
},
{
"status": "affected",
"version": "V500R003C00"
},
{
"status": "affected",
"version": "V500R003C00SPC100"
},
{
"status": "affected",
"version": "V200R003C50SPC700"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have a null pointer dereference vulnerability. The system dereferences a pointer that it expects to be valid, but is NULL. A local attacker could exploit this vulnerability by sending crafted parameters. A successful exploit could cause a denial of service and the process reboot."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "null pointer dereference",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-12-13T22:45:34",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2019-5256",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981",
"version": {
"version_data": [
{
"version_value": "V200R005C30"
},
{
"version_value": "V200R006C10"
},
{
"version_value": "V200R006C20"
},
{
"version_value": "V200R007C10"
},
{
"version_value": "V200R007C20"
},
{
"version_value": "V200R008C00"
},
{
"version_value": "V200R008C10"
},
{
"version_value": "V200R009C00"
},
{
"version_value": "V500R001C00SPC300"
},
{
"version_value": "V500R001C00SPC500"
},
{
"version_value": "V500R001C00SPH303"
},
{
"version_value": "V500R001C00SPH508"
},
{
"version_value": "V500R001C20"
},
{
"version_value": "V500R001C20SPC100"
},
{
"version_value": "V500R001C20SPC100PWE"
},
{
"version_value": "V500R001C20SPC200"
},
{
"version_value": "V500R001C20SPC200B062"
},
{
"version_value": "V500R001C20SPC200PWE"
},
{
"version_value": "V500R001C20SPC300B078"
},
{
"version_value": "V500R001C20SPC300PWE"
},
{
"version_value": "V500R001C30"
},
{
"version_value": "V500R001C30SPC100"
},
{
"version_value": "V500R001C30SPC100PWE"
},
{
"version_value": "V500R001C30SPC200"
},
{
"version_value": "V500R001C30SPC200PWE"
},
{
"version_value": "V500R001C30SPC300"
},
{
"version_value": "V500R001C50"
},
{
"version_value": "V500R001C50PWE"
},
{
"version_value": "V500R001C80"
},
{
"version_value": "V500R005C00"
},
{
"version_value": "V500R001C00SPC500PWE"
},
{
"version_value": "V500R002C00"
},
{
"version_value": "V500R002C00SPC100"
},
{
"version_value": "V500R002C00SPC100PWE"
},
{
"version_value": "V500R002C00SPC200"
},
{
"version_value": "V500R002C00SPC200PWE"
},
{
"version_value": "V500R002C00SPC300"
},
{
"version_value": "V500R002C10"
},
{
"version_value": "V500R002C10PWE"
},
{
"version_value": "V500R002C30"
},
{
"version_value": "V500R002C30PWE"
},
{
"version_value": "V200R005C03"
},
{
"version_value": "V200R003C00SPC100"
},
{
"version_value": "V500R002C20"
},
{
"version_value": "V500R001C00"
},
{
"version_value": "V500R001C00SPC200"
},
{
"version_value": "V500R001C00SPC600"
},
{
"version_value": "V500R001C00SPC700"
},
{
"version_value": "V500R001C20SPC300"
},
{
"version_value": "V500R001C20SPC500"
},
{
"version_value": "V500R001C20SPC600"
},
{
"version_value": "V500R001C60SPC100"
},
{
"version_value": "V500R001C60SPC101"
},
{
"version_value": "V500R001C60SPC200"
},
{
"version_value": "V500R001C60SPC300"
},
{
"version_value": "V500R001C60SPC500"
},
{
"version_value": "V500R001C60SPC600"
},
{
"version_value": "V500R005C00SPC100"
},
{
"version_value": "V100R001C20SPC100"
},
{
"version_value": "V500R001C20SPC101"
},
{
"version_value": "V500R001C80PWE"
},
{
"version_value": "V100R001C00SPC200"
},
{
"version_value": "V100R001C10SPC200"
},
{
"version_value": "V100R001C10SPC201"
},
{
"version_value": "V100R001C20SPC200"
},
{
"version_value": "V500R001C00SPC050"
},
{
"version_value": "V500R001C00SPC090"
},
{
"version_value": "V500R001C30SPC500"
},
{
"version_value": "V500R001C30SPC600"
},
{
"version_value": "V500R001C30SPC600PWE"
},
{
"version_value": "V500R001C30SPC601"
},
{
"version_value": "V500R001C50SPC009"
},
{
"version_value": "V500R001C50SPC100"
},
{
"version_value": "V500R001C50SPC100PWE"
},
{
"version_value": "V500R001C50SPC200"
},
{
"version_value": "V500R001C50SPC200PWE"
},
{
"version_value": "V500R001C50SPC300"
},
{
"version_value": "V500R001C60"
},
{
"version_value": "V500R001C60SPC100PWE"
},
{
"version_value": "V500R001C60SPC200PWE"
},
{
"version_value": "V500R005C00SPC102"
},
{
"version_value": "V500R001C10"
},
{
"version_value": "V500R001C10SPC100"
},
{
"version_value": "V500R001C10SPC200"
},
{
"version_value": "V500R003C00"
},
{
"version_value": "V500R003C00SPC100"
},
{
"version_value": "V200R003C50SPC700"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have a null pointer dereference vulnerability. The system dereferences a pointer that it expects to be valid, but is NULL. A local attacker could exploit this vulnerability by sending crafted parameters. A successful exploit could cause a denial of service and the process reboot."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "null pointer dereference"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en",
"refsource": "MISC",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2019-5256",
"datePublished": "2019-12-13T22:45:34",
"dateReserved": "2019-01-04T00:00:00",
"dateUpdated": "2024-08-04T19:47:56.652Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-5258 (GCVE-0-2019-5258)
Vulnerability from nvd – Published: 2019-12-13 22:41 – Updated: 2024-08-04 19:47
VLAI?
Summary
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have a buffer overflow vulnerability. An attacker who logs in to the board may send crafted messages from the internal network port or tamper with inter-process message packets to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the affected board to be abnormal.
Severity ?
No CVSS data available.
CWE
- buffer overflow
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981 |
Affected:
V200R005C30
Affected: V200R006C10 Affected: V200R006C20 Affected: V200R007C10 Affected: V200R007C20 Affected: V200R008C00 Affected: V200R008C10 Affected: V200R009C00 Affected: V500R001C00SPC300 Affected: V500R001C00SPC500 Affected: V500R001C00SPH303 Affected: V500R001C00SPH508 Affected: V500R001C20 Affected: V500R001C20SPC100 Affected: V500R001C20SPC100PWE Affected: V500R001C20SPC200 Affected: V500R001C20SPC200B062 Affected: V500R001C20SPC200PWE Affected: V500R001C20SPC300B078 Affected: V500R001C20SPC300PWE Affected: V500R001C30 Affected: V500R001C30SPC100 Affected: V500R001C30SPC100PWE Affected: V500R001C30SPC200 Affected: V500R001C30SPC200PWE Affected: V500R001C30SPC300 Affected: V500R001C50 Affected: V500R001C50PWE Affected: V500R001C80 Affected: V500R005C00 Affected: V500R001C00SPC500PWE Affected: V500R002C00 Affected: V500R002C00SPC100 Affected: V500R002C00SPC100PWE Affected: V500R002C00SPC200 Affected: V500R002C00SPC200PWE Affected: V500R002C00SPC300 Affected: V500R002C10 Affected: V500R002C10PWE Affected: V500R002C30 Affected: V500R002C30PWE Affected: V200R005C03 Affected: V200R003C00SPC100 Affected: V500R002C20 Affected: V500R001C00 Affected: V500R001C00SPC200 Affected: V500R001C00SPC600 Affected: V500R001C00SPC700 Affected: V500R001C20SPC300 Affected: V500R001C20SPC500 Affected: V500R001C20SPC600 Affected: V500R001C60SPC100 Affected: V500R001C60SPC101 Affected: V500R001C60SPC200 Affected: V500R001C60SPC300 Affected: V500R001C60SPC500 Affected: V500R001C60SPC600 Affected: V500R005C00SPC100 Affected: V100R001C20SPC100 Affected: V500R001C20SPC101 Affected: V500R001C80PWE Affected: V100R001C00SPC200 Affected: V100R001C10SPC200 Affected: V100R001C10SPC201 Affected: V100R001C20SPC200 Affected: V500R001C00SPC050 Affected: V500R001C00SPC090 Affected: V500R001C30SPC500 Affected: V500R001C30SPC600 Affected: V500R001C30SPC600PWE Affected: V500R001C30SPC601 Affected: V500R001C50SPC009 Affected: V500R001C50SPC100 Affected: V500R001C50SPC100PWE Affected: V500R001C50SPC200 Affected: V500R001C50SPC200PWE Affected: V500R001C50SPC300 Affected: V500R001C60 Affected: V500R001C60SPC100PWE Affected: V500R001C60SPC200PWE Affected: V500R005C00SPC102 Affected: V500R001C10 Affected: V500R001C10SPC100 Affected: V500R001C10SPC200 Affected: V500R003C00 Affected: V500R003C00SPC100 Affected: V200R003C50SPC700 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T19:47:56.829Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "V200R005C30"
},
{
"status": "affected",
"version": "V200R006C10"
},
{
"status": "affected",
"version": "V200R006C20"
},
{
"status": "affected",
"version": "V200R007C10"
},
{
"status": "affected",
"version": "V200R007C20"
},
{
"status": "affected",
"version": "V200R008C00"
},
{
"status": "affected",
"version": "V200R008C10"
},
{
"status": "affected",
"version": "V200R009C00"
},
{
"status": "affected",
"version": "V500R001C00SPC300"
},
{
"status": "affected",
"version": "V500R001C00SPC500"
},
{
"status": "affected",
"version": "V500R001C00SPH303"
},
{
"status": "affected",
"version": "V500R001C00SPH508"
},
{
"status": "affected",
"version": "V500R001C20"
},
{
"status": "affected",
"version": "V500R001C20SPC100"
},
{
"status": "affected",
"version": "V500R001C20SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C20SPC200"
},
{
"status": "affected",
"version": "V500R001C20SPC200B062"
},
{
"status": "affected",
"version": "V500R001C20SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C20SPC300B078"
},
{
"status": "affected",
"version": "V500R001C20SPC300PWE"
},
{
"status": "affected",
"version": "V500R001C30"
},
{
"status": "affected",
"version": "V500R001C30SPC100"
},
{
"status": "affected",
"version": "V500R001C30SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC200"
},
{
"status": "affected",
"version": "V500R001C30SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC300"
},
{
"status": "affected",
"version": "V500R001C50"
},
{
"status": "affected",
"version": "V500R001C50PWE"
},
{
"status": "affected",
"version": "V500R001C80"
},
{
"status": "affected",
"version": "V500R005C00"
},
{
"status": "affected",
"version": "V500R001C00SPC500PWE"
},
{
"status": "affected",
"version": "V500R002C00"
},
{
"status": "affected",
"version": "V500R002C00SPC100"
},
{
"status": "affected",
"version": "V500R002C00SPC100PWE"
},
{
"status": "affected",
"version": "V500R002C00SPC200"
},
{
"status": "affected",
"version": "V500R002C00SPC200PWE"
},
{
"status": "affected",
"version": "V500R002C00SPC300"
},
{
"status": "affected",
"version": "V500R002C10"
},
{
"status": "affected",
"version": "V500R002C10PWE"
},
{
"status": "affected",
"version": "V500R002C30"
},
{
"status": "affected",
"version": "V500R002C30PWE"
},
{
"status": "affected",
"version": "V200R005C03"
},
{
"status": "affected",
"version": "V200R003C00SPC100"
},
{
"status": "affected",
"version": "V500R002C20"
},
{
"status": "affected",
"version": "V500R001C00"
},
{
"status": "affected",
"version": "V500R001C00SPC200"
},
{
"status": "affected",
"version": "V500R001C00SPC600"
},
{
"status": "affected",
"version": "V500R001C00SPC700"
},
{
"status": "affected",
"version": "V500R001C20SPC300"
},
{
"status": "affected",
"version": "V500R001C20SPC500"
},
{
"status": "affected",
"version": "V500R001C20SPC600"
},
{
"status": "affected",
"version": "V500R001C60SPC100"
},
{
"status": "affected",
"version": "V500R001C60SPC101"
},
{
"status": "affected",
"version": "V500R001C60SPC200"
},
{
"status": "affected",
"version": "V500R001C60SPC300"
},
{
"status": "affected",
"version": "V500R001C60SPC500"
},
{
"status": "affected",
"version": "V500R001C60SPC600"
},
{
"status": "affected",
"version": "V500R005C00SPC100"
},
{
"status": "affected",
"version": "V100R001C20SPC100"
},
{
"status": "affected",
"version": "V500R001C20SPC101"
},
{
"status": "affected",
"version": "V500R001C80PWE"
},
{
"status": "affected",
"version": "V100R001C00SPC200"
},
{
"status": "affected",
"version": "V100R001C10SPC200"
},
{
"status": "affected",
"version": "V100R001C10SPC201"
},
{
"status": "affected",
"version": "V100R001C20SPC200"
},
{
"status": "affected",
"version": "V500R001C00SPC050"
},
{
"status": "affected",
"version": "V500R001C00SPC090"
},
{
"status": "affected",
"version": "V500R001C30SPC500"
},
{
"status": "affected",
"version": "V500R001C30SPC600"
},
{
"status": "affected",
"version": "V500R001C30SPC600PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC601"
},
{
"status": "affected",
"version": "V500R001C50SPC009"
},
{
"status": "affected",
"version": "V500R001C50SPC100"
},
{
"status": "affected",
"version": "V500R001C50SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C50SPC200"
},
{
"status": "affected",
"version": "V500R001C50SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C50SPC300"
},
{
"status": "affected",
"version": "V500R001C60"
},
{
"status": "affected",
"version": "V500R001C60SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C60SPC200PWE"
},
{
"status": "affected",
"version": "V500R005C00SPC102"
},
{
"status": "affected",
"version": "V500R001C10"
},
{
"status": "affected",
"version": "V500R001C10SPC100"
},
{
"status": "affected",
"version": "V500R001C10SPC200"
},
{
"status": "affected",
"version": "V500R003C00"
},
{
"status": "affected",
"version": "V500R003C00SPC100"
},
{
"status": "affected",
"version": "V200R003C50SPC700"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have a buffer overflow vulnerability. An attacker who logs in to the board may send crafted messages from the internal network port or tamper with inter-process message packets to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the affected board to be abnormal."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "buffer overflow",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-12-13T22:41:04",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2019-5258",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981",
"version": {
"version_data": [
{
"version_value": "V200R005C30"
},
{
"version_value": "V200R006C10"
},
{
"version_value": "V200R006C20"
},
{
"version_value": "V200R007C10"
},
{
"version_value": "V200R007C20"
},
{
"version_value": "V200R008C00"
},
{
"version_value": "V200R008C10"
},
{
"version_value": "V200R009C00"
},
{
"version_value": "V500R001C00SPC300"
},
{
"version_value": "V500R001C00SPC500"
},
{
"version_value": "V500R001C00SPH303"
},
{
"version_value": "V500R001C00SPH508"
},
{
"version_value": "V500R001C20"
},
{
"version_value": "V500R001C20SPC100"
},
{
"version_value": "V500R001C20SPC100PWE"
},
{
"version_value": "V500R001C20SPC200"
},
{
"version_value": "V500R001C20SPC200B062"
},
{
"version_value": "V500R001C20SPC200PWE"
},
{
"version_value": "V500R001C20SPC300B078"
},
{
"version_value": "V500R001C20SPC300PWE"
},
{
"version_value": "V500R001C30"
},
{
"version_value": "V500R001C30SPC100"
},
{
"version_value": "V500R001C30SPC100PWE"
},
{
"version_value": "V500R001C30SPC200"
},
{
"version_value": "V500R001C30SPC200PWE"
},
{
"version_value": "V500R001C30SPC300"
},
{
"version_value": "V500R001C50"
},
{
"version_value": "V500R001C50PWE"
},
{
"version_value": "V500R001C80"
},
{
"version_value": "V500R005C00"
},
{
"version_value": "V500R001C00SPC500PWE"
},
{
"version_value": "V500R002C00"
},
{
"version_value": "V500R002C00SPC100"
},
{
"version_value": "V500R002C00SPC100PWE"
},
{
"version_value": "V500R002C00SPC200"
},
{
"version_value": "V500R002C00SPC200PWE"
},
{
"version_value": "V500R002C00SPC300"
},
{
"version_value": "V500R002C10"
},
{
"version_value": "V500R002C10PWE"
},
{
"version_value": "V500R002C30"
},
{
"version_value": "V500R002C30PWE"
},
{
"version_value": "V200R005C03"
},
{
"version_value": "V200R003C00SPC100"
},
{
"version_value": "V500R002C20"
},
{
"version_value": "V500R001C00"
},
{
"version_value": "V500R001C00SPC200"
},
{
"version_value": "V500R001C00SPC600"
},
{
"version_value": "V500R001C00SPC700"
},
{
"version_value": "V500R001C20SPC300"
},
{
"version_value": "V500R001C20SPC500"
},
{
"version_value": "V500R001C20SPC600"
},
{
"version_value": "V500R001C60SPC100"
},
{
"version_value": "V500R001C60SPC101"
},
{
"version_value": "V500R001C60SPC200"
},
{
"version_value": "V500R001C60SPC300"
},
{
"version_value": "V500R001C60SPC500"
},
{
"version_value": "V500R001C60SPC600"
},
{
"version_value": "V500R005C00SPC100"
},
{
"version_value": "V100R001C20SPC100"
},
{
"version_value": "V500R001C20SPC101"
},
{
"version_value": "V500R001C80PWE"
},
{
"version_value": "V100R001C00SPC200"
},
{
"version_value": "V100R001C10SPC200"
},
{
"version_value": "V100R001C10SPC201"
},
{
"version_value": "V100R001C20SPC200"
},
{
"version_value": "V500R001C00SPC050"
},
{
"version_value": "V500R001C00SPC090"
},
{
"version_value": "V500R001C30SPC500"
},
{
"version_value": "V500R001C30SPC600"
},
{
"version_value": "V500R001C30SPC600PWE"
},
{
"version_value": "V500R001C30SPC601"
},
{
"version_value": "V500R001C50SPC009"
},
{
"version_value": "V500R001C50SPC100"
},
{
"version_value": "V500R001C50SPC100PWE"
},
{
"version_value": "V500R001C50SPC200"
},
{
"version_value": "V500R001C50SPC200PWE"
},
{
"version_value": "V500R001C50SPC300"
},
{
"version_value": "V500R001C60"
},
{
"version_value": "V500R001C60SPC100PWE"
},
{
"version_value": "V500R001C60SPC200PWE"
},
{
"version_value": "V500R005C00SPC102"
},
{
"version_value": "V500R001C10"
},
{
"version_value": "V500R001C10SPC100"
},
{
"version_value": "V500R001C10SPC200"
},
{
"version_value": "V500R003C00"
},
{
"version_value": "V500R003C00SPC100"
},
{
"version_value": "V200R003C50SPC700"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have a buffer overflow vulnerability. An attacker who logs in to the board may send crafted messages from the internal network port or tamper with inter-process message packets to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the affected board to be abnormal."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "buffer overflow"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en",
"refsource": "MISC",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2019-5258",
"datePublished": "2019-12-13T22:41:04",
"dateReserved": "2019-01-04T00:00:00",
"dateUpdated": "2024-08-04T19:47:56.829Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-5257 (GCVE-0-2019-5257)
Vulnerability from nvd – Published: 2019-12-13 22:16 – Updated: 2024-08-04 19:47
VLAI?
Summary
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace) have a resource management vulnerability. An attacker who logs in to the board may send crafted messages from the internal network.
Severity ?
No CVSS data available.
CWE
- resource management
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981 |
Affected:
V200R005C30
Affected: V200R006C10 Affected: V200R006C20 Affected: V200R007C10 Affected: V200R007C20 Affected: V200R008C00 Affected: V200R008C10 Affected: V200R009C00 Affected: V500R001C00SPC300 Affected: V500R001C00SPC500 Affected: V500R001C00SPH303 Affected: V500R001C00SPH508 Affected: V500R001C20 Affected: V500R001C20SPC100 Affected: V500R001C20SPC100PWE Affected: V500R001C20SPC200 Affected: V500R001C20SPC200B062 Affected: V500R001C20SPC200PWE Affected: V500R001C20SPC300B078 Affected: V500R001C20SPC300PWE Affected: V500R001C30 Affected: V500R001C30SPC100 Affected: V500R001C30SPC100PWE Affected: V500R001C30SPC200 Affected: V500R001C30SPC200PWE Affected: V500R001C30SPC300 Affected: V500R001C50 Affected: V500R001C50PWE Affected: V500R001C80 Affected: V500R005C00 Affected: V500R001C00SPC500PWE Affected: V500R002C00 Affected: V500R002C00SPC100 Affected: V500R002C00SPC100PWE Affected: V500R002C00SPC200 Affected: V500R002C00SPC200PWE Affected: V500R002C00SPC300 Affected: V500R002C10 Affected: V500R002C10PWE Affected: V500R002C30 Affected: V500R002C30PWE Affected: V200R005C03 Affected: V200R003C00SPC100 Affected: V500R002C20 Affected: V500R001C00 Affected: V500R001C00SPC200 Affected: V500R001C00SPC600 Affected: V500R001C00SPC700 Affected: V500R001C20SPC300 Affected: V500R001C20SPC500 Affected: V500R001C20SPC600 Affected: V500R001C60SPC100 Affected: V500R001C60SPC101 Affected: V500R001C60SPC200 Affected: V500R001C60SPC300 Affected: V500R001C60SPC500 Affected: V500R001C60SPC600 Affected: V500R005C00SPC100 Affected: V100R001C20SPC100 Affected: V500R001C20SPC101 Affected: V500R001C80PWE Affected: V100R001C00SPC200 Affected: V100R001C10SPC200 Affected: V100R001C10SPC201 Affected: V100R001C20SPC200 Affected: V500R001C00SPC050 Affected: V500R001C00SPC090 Affected: V500R001C30SPC500 Affected: V500R001C30SPC600 Affected: V500R001C30SPC600PWE Affected: V500R001C30SPC601 Affected: V500R001C50SPC009 Affected: V500R001C50SPC100 Affected: V500R001C50SPC100PWE Affected: V500R001C50SPC200 Affected: V500R001C50SPC200PWE Affected: V500R001C50SPC300 Affected: V500R001C60 Affected: V500R001C60SPC100PWE Affected: V500R001C60SPC200PWE Affected: V500R005C00SPC102 Affected: V500R001C10 Affected: V500R001C10SPC100 Affected: V500R001C10SPC200 Affected: V500R003C00 Affected: V500R003C00SPC100 Affected: V200R003C50SPC700 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T19:47:56.752Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "V200R005C30"
},
{
"status": "affected",
"version": "V200R006C10"
},
{
"status": "affected",
"version": "V200R006C20"
},
{
"status": "affected",
"version": "V200R007C10"
},
{
"status": "affected",
"version": "V200R007C20"
},
{
"status": "affected",
"version": "V200R008C00"
},
{
"status": "affected",
"version": "V200R008C10"
},
{
"status": "affected",
"version": "V200R009C00"
},
{
"status": "affected",
"version": "V500R001C00SPC300"
},
{
"status": "affected",
"version": "V500R001C00SPC500"
},
{
"status": "affected",
"version": "V500R001C00SPH303"
},
{
"status": "affected",
"version": "V500R001C00SPH508"
},
{
"status": "affected",
"version": "V500R001C20"
},
{
"status": "affected",
"version": "V500R001C20SPC100"
},
{
"status": "affected",
"version": "V500R001C20SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C20SPC200"
},
{
"status": "affected",
"version": "V500R001C20SPC200B062"
},
{
"status": "affected",
"version": "V500R001C20SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C20SPC300B078"
},
{
"status": "affected",
"version": "V500R001C20SPC300PWE"
},
{
"status": "affected",
"version": "V500R001C30"
},
{
"status": "affected",
"version": "V500R001C30SPC100"
},
{
"status": "affected",
"version": "V500R001C30SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC200"
},
{
"status": "affected",
"version": "V500R001C30SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC300"
},
{
"status": "affected",
"version": "V500R001C50"
},
{
"status": "affected",
"version": "V500R001C50PWE"
},
{
"status": "affected",
"version": "V500R001C80"
},
{
"status": "affected",
"version": "V500R005C00"
},
{
"status": "affected",
"version": "V500R001C00SPC500PWE"
},
{
"status": "affected",
"version": "V500R002C00"
},
{
"status": "affected",
"version": "V500R002C00SPC100"
},
{
"status": "affected",
"version": "V500R002C00SPC100PWE"
},
{
"status": "affected",
"version": "V500R002C00SPC200"
},
{
"status": "affected",
"version": "V500R002C00SPC200PWE"
},
{
"status": "affected",
"version": "V500R002C00SPC300"
},
{
"status": "affected",
"version": "V500R002C10"
},
{
"status": "affected",
"version": "V500R002C10PWE"
},
{
"status": "affected",
"version": "V500R002C30"
},
{
"status": "affected",
"version": "V500R002C30PWE"
},
{
"status": "affected",
"version": "V200R005C03"
},
{
"status": "affected",
"version": "V200R003C00SPC100"
},
{
"status": "affected",
"version": "V500R002C20"
},
{
"status": "affected",
"version": "V500R001C00"
},
{
"status": "affected",
"version": "V500R001C00SPC200"
},
{
"status": "affected",
"version": "V500R001C00SPC600"
},
{
"status": "affected",
"version": "V500R001C00SPC700"
},
{
"status": "affected",
"version": "V500R001C20SPC300"
},
{
"status": "affected",
"version": "V500R001C20SPC500"
},
{
"status": "affected",
"version": "V500R001C20SPC600"
},
{
"status": "affected",
"version": "V500R001C60SPC100"
},
{
"status": "affected",
"version": "V500R001C60SPC101"
},
{
"status": "affected",
"version": "V500R001C60SPC200"
},
{
"status": "affected",
"version": "V500R001C60SPC300"
},
{
"status": "affected",
"version": "V500R001C60SPC500"
},
{
"status": "affected",
"version": "V500R001C60SPC600"
},
{
"status": "affected",
"version": "V500R005C00SPC100"
},
{
"status": "affected",
"version": "V100R001C20SPC100"
},
{
"status": "affected",
"version": "V500R001C20SPC101"
},
{
"status": "affected",
"version": "V500R001C80PWE"
},
{
"status": "affected",
"version": "V100R001C00SPC200"
},
{
"status": "affected",
"version": "V100R001C10SPC200"
},
{
"status": "affected",
"version": "V100R001C10SPC201"
},
{
"status": "affected",
"version": "V100R001C20SPC200"
},
{
"status": "affected",
"version": "V500R001C00SPC050"
},
{
"status": "affected",
"version": "V500R001C00SPC090"
},
{
"status": "affected",
"version": "V500R001C30SPC500"
},
{
"status": "affected",
"version": "V500R001C30SPC600"
},
{
"status": "affected",
"version": "V500R001C30SPC600PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC601"
},
{
"status": "affected",
"version": "V500R001C50SPC009"
},
{
"status": "affected",
"version": "V500R001C50SPC100"
},
{
"status": "affected",
"version": "V500R001C50SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C50SPC200"
},
{
"status": "affected",
"version": "V500R001C50SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C50SPC300"
},
{
"status": "affected",
"version": "V500R001C60"
},
{
"status": "affected",
"version": "V500R001C60SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C60SPC200PWE"
},
{
"status": "affected",
"version": "V500R005C00SPC102"
},
{
"status": "affected",
"version": "V500R001C10"
},
{
"status": "affected",
"version": "V500R001C10SPC100"
},
{
"status": "affected",
"version": "V500R001C10SPC200"
},
{
"status": "affected",
"version": "V500R003C00"
},
{
"status": "affected",
"version": "V500R003C00SPC100"
},
{
"status": "affected",
"version": "V200R003C50SPC700"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace) have a resource management vulnerability. An attacker who logs in to the board may send crafted messages from the internal network."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "resource management",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-12-13T22:16:22",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2019-5257",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981",
"version": {
"version_data": [
{
"version_value": "V200R005C30"
},
{
"version_value": "V200R006C10"
},
{
"version_value": "V200R006C20"
},
{
"version_value": "V200R007C10"
},
{
"version_value": "V200R007C20"
},
{
"version_value": "V200R008C00"
},
{
"version_value": "V200R008C10"
},
{
"version_value": "V200R009C00"
},
{
"version_value": "V500R001C00SPC300"
},
{
"version_value": "V500R001C00SPC500"
},
{
"version_value": "V500R001C00SPH303"
},
{
"version_value": "V500R001C00SPH508"
},
{
"version_value": "V500R001C20"
},
{
"version_value": "V500R001C20SPC100"
},
{
"version_value": "V500R001C20SPC100PWE"
},
{
"version_value": "V500R001C20SPC200"
},
{
"version_value": "V500R001C20SPC200B062"
},
{
"version_value": "V500R001C20SPC200PWE"
},
{
"version_value": "V500R001C20SPC300B078"
},
{
"version_value": "V500R001C20SPC300PWE"
},
{
"version_value": "V500R001C30"
},
{
"version_value": "V500R001C30SPC100"
},
{
"version_value": "V500R001C30SPC100PWE"
},
{
"version_value": "V500R001C30SPC200"
},
{
"version_value": "V500R001C30SPC200PWE"
},
{
"version_value": "V500R001C30SPC300"
},
{
"version_value": "V500R001C50"
},
{
"version_value": "V500R001C50PWE"
},
{
"version_value": "V500R001C80"
},
{
"version_value": "V500R005C00"
},
{
"version_value": "V500R001C00SPC500PWE"
},
{
"version_value": "V500R002C00"
},
{
"version_value": "V500R002C00SPC100"
},
{
"version_value": "V500R002C00SPC100PWE"
},
{
"version_value": "V500R002C00SPC200"
},
{
"version_value": "V500R002C00SPC200PWE"
},
{
"version_value": "V500R002C00SPC300"
},
{
"version_value": "V500R002C10"
},
{
"version_value": "V500R002C10PWE"
},
{
"version_value": "V500R002C30"
},
{
"version_value": "V500R002C30PWE"
},
{
"version_value": "V200R005C03"
},
{
"version_value": "V200R003C00SPC100"
},
{
"version_value": "V500R002C20"
},
{
"version_value": "V500R001C00"
},
{
"version_value": "V500R001C00SPC200"
},
{
"version_value": "V500R001C00SPC600"
},
{
"version_value": "V500R001C00SPC700"
},
{
"version_value": "V500R001C20SPC300"
},
{
"version_value": "V500R001C20SPC500"
},
{
"version_value": "V500R001C20SPC600"
},
{
"version_value": "V500R001C60SPC100"
},
{
"version_value": "V500R001C60SPC101"
},
{
"version_value": "V500R001C60SPC200"
},
{
"version_value": "V500R001C60SPC300"
},
{
"version_value": "V500R001C60SPC500"
},
{
"version_value": "V500R001C60SPC600"
},
{
"version_value": "V500R005C00SPC100"
},
{
"version_value": "V100R001C20SPC100"
},
{
"version_value": "V500R001C20SPC101"
},
{
"version_value": "V500R001C80PWE"
},
{
"version_value": "V100R001C00SPC200"
},
{
"version_value": "V100R001C10SPC200"
},
{
"version_value": "V100R001C10SPC201"
},
{
"version_value": "V100R001C20SPC200"
},
{
"version_value": "V500R001C00SPC050"
},
{
"version_value": "V500R001C00SPC090"
},
{
"version_value": "V500R001C30SPC500"
},
{
"version_value": "V500R001C30SPC600"
},
{
"version_value": "V500R001C30SPC600PWE"
},
{
"version_value": "V500R001C30SPC601"
},
{
"version_value": "V500R001C50SPC009"
},
{
"version_value": "V500R001C50SPC100"
},
{
"version_value": "V500R001C50SPC100PWE"
},
{
"version_value": "V500R001C50SPC200"
},
{
"version_value": "V500R001C50SPC200PWE"
},
{
"version_value": "V500R001C50SPC300"
},
{
"version_value": "V500R001C60"
},
{
"version_value": "V500R001C60SPC100PWE"
},
{
"version_value": "V500R001C60SPC200PWE"
},
{
"version_value": "V500R005C00SPC102"
},
{
"version_value": "V500R001C10"
},
{
"version_value": "V500R001C10SPC100"
},
{
"version_value": "V500R001C10SPC200"
},
{
"version_value": "V500R003C00"
},
{
"version_value": "V500R003C00SPC100"
},
{
"version_value": "V200R003C50SPC700"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace) have a resource management vulnerability. An attacker who logs in to the board may send crafted messages from the internal network."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "resource management"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en",
"refsource": "MISC",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2019-5257",
"datePublished": "2019-12-13T22:16:22",
"dateReserved": "2019-01-04T00:00:00",
"dateUpdated": "2024-08-04T19:47:56.752Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2017-17164 (GCVE-0-2017-17164)
Vulnerability from nvd – Published: 2018-02-15 16:00 – Updated: 2024-08-05 20:43
VLAI?
Summary
Huawei Secospace AntiDDoS8000 V500R001C20SPC500 have a memory leak vulnerability due to memory don't be released when the system open some function. An attacker could exploit it to cause memory leak, which may further lead to system exceptions.
Severity ?
No CVSS data available.
CWE
- memory leak
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Huawei Technologies Co., Ltd. | Secospace AntiDDoS8000 |
Affected:
V500R001C20SPC500
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T20:43:59.752Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171213-01-antidos-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Secospace AntiDDoS8000",
"vendor": "Huawei Technologies Co., Ltd.",
"versions": [
{
"status": "affected",
"version": "V500R001C20SPC500"
}
]
}
],
"datePublic": "2017-12-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Huawei Secospace AntiDDoS8000 V500R001C20SPC500 have a memory leak vulnerability due to memory don\u0027t be released when the system open some function. An attacker could exploit it to cause memory leak, which may further lead to system exceptions."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "memory leak",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-02-15T15:57:02",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171213-01-antidos-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2017-17164",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Secospace AntiDDoS8000",
"version": {
"version_data": [
{
"version_value": "V500R001C20SPC500"
}
]
}
}
]
},
"vendor_name": "Huawei Technologies Co., Ltd."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Huawei Secospace AntiDDoS8000 V500R001C20SPC500 have a memory leak vulnerability due to memory don\u0027t be released when the system open some function. An attacker could exploit it to cause memory leak, which may further lead to system exceptions."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "memory leak"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171213-01-antidos-en",
"refsource": "CONFIRM",
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171213-01-antidos-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2017-17164",
"datePublished": "2018-02-15T16:00:00",
"dateReserved": "2017-12-04T00:00:00",
"dateUpdated": "2024-08-05T20:43:59.752Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2016-4576 (GCVE-0-2016-4576)
Vulnerability from nvd – Published: 2016-05-23 19:00 – Updated: 2024-08-06 00:32
VLAI?
Summary
Buffer overflow in the Application Specific Packet Filtering (ASPF) functionality in the Huawei IPS Module, NGFW Module, NIP6300, NIP6600, Secospace USG6300, USG6500, USG6600, USG9500, and AntiDDoS8000 devices with software before V500R001C20SPC100 allows remote attackers to cause a denial of service or execute arbitrary code via a crafted packet, related to "illegitimate parameters."
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T00:32:26.013Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "90530",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/90530"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160511-01-aspf-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2016-05-11T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the Application Specific Packet Filtering (ASPF) functionality in the Huawei IPS Module, NGFW Module, NIP6300, NIP6600, Secospace USG6300, USG6500, USG6600, USG9500, and AntiDDoS8000 devices with software before V500R001C20SPC100 allows remote attackers to cause a denial of service or execute arbitrary code via a crafted packet, related to \"illegitimate parameters.\""
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-11-25T19:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "90530",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/90530"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160511-01-aspf-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-4576",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in the Application Specific Packet Filtering (ASPF) functionality in the Huawei IPS Module, NGFW Module, NIP6300, NIP6600, Secospace USG6300, USG6500, USG6600, USG9500, and AntiDDoS8000 devices with software before V500R001C20SPC100 allows remote attackers to cause a denial of service or execute arbitrary code via a crafted packet, related to \"illegitimate parameters.\""
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "90530",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/90530"
},
{
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160511-01-aspf-en",
"refsource": "CONFIRM",
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160511-01-aspf-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2016-4576",
"datePublished": "2016-05-23T19:00:00",
"dateReserved": "2016-05-11T00:00:00",
"dateUpdated": "2024-08-06T00:32:26.013Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}